Russia was behind a destructive cyber attack on a water utility in 2024, Denmark says
嗯,用户让我用中文总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要仔细阅读文章内容,抓住主要信息。 文章讲的是丹麦指责俄罗斯策划了2024年对水厂的网络攻击,并将其视为混合战的一部分。文中提到两个黑客组织Z-Pentest和NoName057(16),他们被认为是俄罗斯的工具。丹麦情报部门FE评估这些组织与俄罗斯有联系,目的是破坏西方国家的基础设施,并惩罚支持乌克兰的国家。 此外,文章还提到混合战的策略,包括网络攻击、虚假信息、经济压力等。丹麦因为支持乌克兰而受到攻击,国防部长谴责这些行为,并指出这些攻击暴露了丹麦在应对混合战方面的不足。 还有提到2023年5月的一次大规模网络攻击,涉及多个关键基础设施公司,利用零日漏洞。专家认为其中一个威胁来自与俄罗斯有关的Sandworm组织。 最后,CISA和国际伙伴警告说,亲俄黑客组织正在全球范围内攻击关键基础设施。 现在我要把这些信息浓缩到100字以内。重点包括:丹麦指责俄罗斯策划网络攻击,涉及水厂和选举网站;这两个黑客组织被认为是俄罗斯工具;混合战策略;丹麦支持乌克兰导致被攻击;以及关键基础设施面临的风险。 可能需要舍弃一些细节,比如具体的事件日期和一些技术细节。确保内容准确且简洁。 </think> 丹麦指责俄罗斯策划了2024年对国内水厂的破坏性网络攻击,并将其视为混合战争的一部分。两个亲俄黑客组织Z-Pentest和NoName057(16)被认为与俄国有联系,旨在破坏西方关键基础设施并惩罚支持乌克兰的国家。丹麦因支持乌克兰而成为目标,暴露其在应对混合战争方面的不足。 2025-12-20 00:46:25 Author: securityaffairs.com(查看原文) 阅读量:10 收藏

Russia was behind a destructive cyber attack on a water utility in 2024, Denmark says

Pierluigi Paganini December 20, 2025

Denmark has blamed Russia for a destructive cyberattack on a water utility, calling it part of Moscow’s hybrid campaign against Western critical infrastructure.

Denmark has accused Russia of orchestrating destructive cyberattacks against a water utility in 2024, framing them as part of broader hybrid attacks on Western critical infrastructure.

Denmark’s Defence Intelligence Service attributed a destructive attack on a water utility to the pro-Russia group Z-Pentest and DDoS attacks tied to elections to the pro-Russia hacktivist group NoName057(16). Officials said both groups act as tools of Russia’s hybrid war, aiming to create insecurity and punish countries supporting Ukraine.

“FE assesses that the pro-Russian group Z-Pentest, which was behind a destructive cyberattack against a Danish waterworks in 2024, has connections to the Russian state. FE also assesses that the group NoName057(16), which carried out overload attacks against Danish websites in the run-up to the Danish municipal and regional council elections in 2025, has connections to the Russian state.” reads the press release published by FE. “The Russian state uses both groups as part of its hybrid attacks against the West. The aim is to create insecurity in the countries that the groups attack, and to punish the countries for supporting Ukraine.”

Hybrid war is a strategy in which a state combines military and non-military tools to weaken or destabilize an adversary without declaring open war. It typically blends:

  • Cyber operations (hacking, sabotage, data leaks)
  • Disinformation and propaganda
  • Economic pressure (sanctions evasion, energy leverage)
  • Political interference (election meddling, influence campaigns)
  • Use of proxies (hacktivists, mercenaries, criminal groups)
  • Limited or deniable military actions

The goal is to create uncertainty, disrupt society, erode trust in institutions, and impose costs, while maintaining plausible deniability and staying below the threshold of conventional armed conflict.

The Danish intelligence service says elections were exploited to gain public attention, a tactic seen across Europe. Since Russia’s 2022 invasion, Denmark has backed Ukraine with sanctions, military aid, training, and financial support.

Denmark’s defence minister condemned the cyberattacks and labeled them as unacceptable, citing a December 2024 incident in Køge where hackers altered pump pressure at a water utility, bursting pipes.

“This is very clear evidence that we are now where the hybrid war we have been talking about is unfortunately taking place. It once again puts the spotlight on the situation we find ourselves in in Europe,” Lund Poulsen said. “It is completely unacceptable that hybrid attacks are carried out in Denmark by the Russian side,.”

Danish officials said recent cyber and drone incidents caused limited damage but exposed serious gaps in national resilience, warning Denmark is not adequately prepared for hybrid attacks from Russia.

In March, Denmark raised the cyber espionage threat level for its telecom sector from medium to high due to rising threats across Europe.

The Danish Social Security Agency published a new threat assessment for the cyber threat to the telecommunications sector that highlighted the risks for telecom companies in Europe.

Nation-state actors target telecom providers for cyber espionage to access user data, monitor communications, and potentially launch cyber or physical attacks.

The assessment warns that nation-state hackers have an extensive technical understanding of the telecommunications sector’s infrastructure and protocols in cyberattacks against the industry abroad.

Some hackers have demonstrated extensive technical understanding of the telecommunications sector’s infrastructure and protocols in cyberattacks against the industry abroad.

In May 2023, Danish critical infrastructure faced the biggest cyber attack on record that hit the country, reported SektorCERT, Denmark’s Computer Security Incident Response Team (CSIRT) for the critical infrastructure sectors.

A first wave of attacks was launched on May 11, then after a short pause, a second wave of attacks began on May 22. SektorCERT became aware of the attacks on May 22.

SektorCERT reported that threat actors compromised the networks of 22 companies operating in the energy infrastructure. According to the report, 11 companies were immediately compromised. The attackers exploited zero-day vulnerabilities in Zyxel firewalls used by many critical infrastructure operators in Denmark.

Experts believe the attackers were carried out by multiple threat actors, and at least one can be attributed to the Russia-linked Sandworm group.

Recently, CISA and international partners warned that pro-Russia hacktivist groups are actively targeting critical infrastructure worldwide.

Pro-Russia hacktivist groups like CARR, Z-Pentest, and NoName057(16) exploit poorly secured VNC connections to access OT devices in critical infrastructure, causing varying impacts, including physical damage, primarily targeting water, food, agriculture, and energy sectors. Their attacks are less sophisticated and lower-impact compared to APT groups.

“This joint Cybersecurity Advisory is being published as an addition to the Cybersecurity and Infrastructure Security Agency (CISA) May 6, 2025, joint fact sheet Primary Mitigations to Reduce Cyber Threats to Operational Technology and European Cybercrime Centre’s (EC3) Operation Eastwood
, in which CISA, Federal Bureau of Investigation (FBI), Department of Energy (DOE), Environmental Protection Agency (EPA), and EC3 shared information about cyber incidents affecting the operational technology (OT) and industrial control systems (ICS) of critical infrastructure entities in the United States and globally.” reads a joint advisory from FBI, CISA, National Security Agency (NSA), and partners countries.

CARR attacked U.S. water systems and a Los Angeles meat facility, causing spills, leaks, and damage. GRU guidance financed attacks, targeting critical infrastructure and election sites. A GRU-linked officer, using the handle “Cyber_1ce_Killer,” directed CARR targets, funded DDoS-for-hire services, and is identified as a CARR member.

The U.S. State Department offers up to $2 million for information on CARR members and up to $10 million for details on individuals linked to NoName.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Denmark)




文章来源: https://securityaffairs.com/185885/hacking/russia-was-behind-a-destructive-cyber-attack-on-a-water-utility-in-2024-denmark-says.html
如有侵权请联系:admin#unsafe.sh