Amazon disrupts Russian GRU hackers attacking edge network devices
嗯,用户让我总结这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”之类的开头。好的,我得先通读一下文章,抓住主要信息。 文章讲的是亚马逊的威胁情报团队干扰了俄罗斯GRU的情报活动。他们主要攻击西方的关键基础设施,特别是能源领域,从2021年开始。攻击手段从利用漏洞转向了利用配置错误的边缘设备。2024年以后,攻击者减少了对漏洞的利用,转而更多地针对路由器、VPN等设备。亚马逊采取了措施保护客户,并建议了一些安全措施。 现在我要把这些信息浓缩到100字以内。首先说明亚马逊团队干扰了GRU的活动,目标是西方关键基础设施,特别是能源。然后提到攻击手段的变化,从漏洞转向配置错误的设备。最后提到亚马逊采取了行动并给出了建议。 这样组织起来应该能符合要求。 </think> 亚马逊威胁情报团队发现俄罗斯军事情报局(GRU)支持的黑客针对西方关键基础设施(尤其是能源领域)的网络攻击活动,并于2021年开始活跃。这些攻击最初利用零日漏洞和已知漏洞进行初始访问,但近年来逐渐转向利用配置错误的边缘设备(如企业路由器、VPN网关等)。亚马逊已采取行动保护受影响客户,并建议加强网络设备安全配置和监控。 2025-12-16 20:15:30 Author: www.bleepingcomputer.com(查看原文) 阅读量:6 收藏

Amazon disrupts Russian GRU hackers attacking edge network devices

The Amazon Threat Intelligence team has disrupted active operations attributed to hackers working for the Russian foreign military intelligence agency, the GRU, who targeted customers' cloud infrastructure.

The cloud services provider observed a focus on Western critical infrastructure, especially the energy sector, in activity that started in 2021.

Over time, the threat actor pivoted from exploiting vulnerabilities (zero-days and known ones) to leveraging misconfigured edge devices for initial access.

Wiz

Fewer vulnerabilies exploited

CJ Moses, the CISO of Amazon Integrated Security, notes that up to 2024, the "years-long" campaign exploited multiple vulnerabilities in WatchGuard, Confluence, and Veeam as the primary initial access vector and targeted misconfigured devices.

This year, though, the threat actor relied less on vulnerabilities and more on targeting misconfigured customer network edge devices, such as enterprise routers, VPN gateways, network management appliances, collaboration platforms, and cloud-based project management solutions.

"Targeting the 'low-hanging fruit' of likely misconfigured customer devices with exposed management interfaces achieves the same strategic objectives, which is persistent access to critical infrastructure networks and credential harvesting for accessing victim organizations’ online services," Moses explains.

"The threat actor’s shift in operational tempo represents a concerning evolution: while customer misconfiguration targeting has been ongoing since at least 2022, the actor maintained sustained focus on this activity in 2025 while reducing investment in zero-day and N-day exploitation," he added.

However, the tactical evolution did not reflect any change in the group’s operational objectives: stealing credentials and moving laterally on the victim network with as little exposure and as few resources as possible.

Based on targeting patterns and overlaps in infrastructure seen in attacks from Sandworm (APT44, Seashell Blizzard) and Curly COMrades, Amazon assesses with high confidence that the observed attacks were carried out by hackers working for the Russian GRU.

Amazon believes that the Curly COMRades hackers, first reported by Bitdefender, may be tasked with post-compromise activity in a  broader GRU campaing involving multiple specialized subclusters.

Spreading on the network

Although Amazon did not directly observe the extraction mechanism, evidence in the form of delays between device compromise and leveraging the credentials, and abuse of organization credentials, points to passive packet capturing and traffic interception.

Compromised devices were customer-managed network appliances hosted on AWS EC2 instances, and Amazon noted that the attacks did not leverage flaws on the AWS service itself.

After discovering the attacks, Amazon took immediate action to protect compromised EC2 instances and notified affected customers of the breach. Moreover, they shared intelligence with impacted vendors and industry partners.

"Through coordinated efforts, since our discovery of this activity, we have disrupted active threat actor operations and reduced the attack surface available to this threat activity subcluster," Amazon said.

Amazon has shared the offending IP addresses in its report but warned not to block them without first conducting a contextual investigation because they are legitimate servers that the threat actor compromised to proxy its traffic.

The company further recommended a series of “immediate priority actions” for next year, such as auditing network devices, watching for credential replay activity, and monitoring access to administrative portals.

In AWS environments specifically, it is recommended to isolate management interfaces, restrict security groups, and enable CloudTrail, GuardDuty, and VPC Flow Logs.

tines

Break down IAM silos like Bitpanda, KnowBe4, and PathAI

Broken IAM isn't just an IT problem - the impact ripples across your whole business.

This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.


文章来源: https://www.bleepingcomputer.com/news/security/amazon-disrupts-russian-gru-hackers-attacking-edge-network-devices/
如有侵权请联系:admin#unsafe.sh