Amazon Uncovers Russian Cyber Espionage Targeting Western Infrastructure

Russian APT44 Cyber Campaign Targets Western Critical Infrastructure by Exploiting Misconfigured Network Edge Devices from 2021 to 2025

  • From 2021 to 2025, a Russian state-sponsored group targeted Western critical infrastructure, focusing on misconfigured network edge devices.
  • The campaign primarily affected energy, cloud services, and telecom sectors across North America, Europe, and the Middle East.
  • The threat actor exploited known vulnerabilities in network appliances and software, then used credential harvesting to gain deeper access.
  • The group, linked to GRU’s APT44, adapted tactics from direct exploits to leveraging customer network misconfigurations.
  • Amazon intervened by notifying affected customers and disrupting ongoing operations targeting its cloud infrastructure.

Amazon security experts revealed a multi-year cyber campaign from 2021 to 2025 by a Russian government-backed group targeting critical infrastructure in Western countries. The campaign aimed at energy companies, cloud-based network services, and other key sectors in North America, Europe, and the Middle East. The activity is linked with high confidence to the GRU-affiliated Advanced Persistent Threat group known as APT44, also referred to by names including FROZENBARENTS and Sandworm.

- Advertisement -

The intrusions evolved from exploiting software vulnerabilities to focusing on misconfigured network edge devices hosted within cloud environments. This shift reduced the use of new vulnerabilities, known as zero-day and N-day flaws, with attackers instead leveraging exposed management interfaces on routers and network appliances.

Over the years, the group exploited several vulnerabilities, including the WatchGuard Firebox and XTM flaw CVE-2022-26318 from 2021 to 2022, Atlassian Confluence vulnerabilities CVE-2021-26084 and CVE-2023-22518 during 2022-2023, and the Veeam flaw CVE-2023-27532 in 2024. The campaign continued to focus heavily on misconfigured network edge devices into 2025.

Amazon reported that the attackers targeted devices such as enterprise routers, VPN concentrators, network management systems, and cloud-based collaboration platforms. By compromising these devices, the threat actors intercepted network traffic to harvest credentials. They then performed credential replay attacks to access victim organizations’ online services and strengthen their network foothold.

“Network connection analysis shows actor-controlled IP addresses establishing persistent connections to compromised EC2 instances operating customers’ network appliance software,” said CJ Moses, Amazon Integrated Security Chief Information Security Officer. “Analysis revealed persistent connections consistent with interactive access and data retrieval across multiple affected instances.”

- Advertisement -

The attack process reportedly involved compromising cloud-hosted network edge devices, capturing network traffic, collecting credentials, replaying them to online services, and establishing persistent access for lateral network movement.

The campaign’s targeting highlights a focus on energy supply chains, including both direct operators and third-party service providers with network access to critical infrastructure. Additionally, infrastructure overlaps were noted with a related cluster known as Curly COMrades, suggesting coordinated subgroups within the broader GRU operation.

Amazon has notified affected users and disrupted ongoing threat activities impacting its cloud services. Organizations are advised to audit network edge devices for unauthorized packet capture tools, enforce strong authentication, monitor login attempts from unusual locations, and watch for credential replay incidents.

More on the WatchGuard Firebox vulnerability can be found here, and additional information on the campaign is detailed here.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Tesla shares slip as Q4 deliveries deemed largely neutral US

Tesla delivered 418,227 vehicles in Q4, slightly below the 422,850 company-polled consensus and last...

Institutions Pour In: 2026 Poised to Ignite ETH Value Rise!!

Ethereum insiders say 2026 could trigger significant ETH value growth as institutions increase on-chain...

EU Debates Digital Euro Privacy, Holding Limits: Compromises

The EU Council has endorsed the European Central Bank design for a digital euro...

Iran Military Export Center Accepts Crypto Payments for Arms

Mindex is accepting cryptocurrency for sales of advanced weapons systems.Buyers can pay with crypto,...

BRICS Accelerates De-Dollarization: Unit, CBDCs, Payments…

India assumed the BRICS presidency and is steering a 2026 push to reduce reliance...
- Advertisement -

Must Read

Top 10 Best Blockchain Games

If you want to know about the best blockchain games then read this article carefully. We listed the best games you can play and...
Bitcoin (BTC) $ 90,474.00 2.54%
Ethereum (ETH) $ 3,125.56 4.58%
XRP (XRP) $ 1.99 6.30%
Bittensor (TAO) $ 243.96 7.84%
Polkadot (DOT) $ 2.05 5.93%
Cardano (ADA) $ 0.388063 10.24%
Chainlink (LINK) $ 13.25 6.68%
Hyperliquid (HYPE) $ 24.50 0.19%
Monero (XMR) $ 422.34 0.40%
Hedera (HBAR) $ 0.11991 7.68%
Toncoin (TON) $ 1.90 12.82%