Skip Navigation

Russian Government Cyber Actors Targeting Networking Devices, Critical Infrastructure

www.ic3.gov

Internet Crime Complaint Center (IC3) | Russian Government Cyber Actors Targeting Networking Devices, Critical Infrastructure

cross-posted from: https://programming.dev/post/36017215

Research with details.

  • Static Tundra is a Russian state-sponsored cyber espionage group linked to the FSB's Center 16 unit that has been operating for over a decade, specializing in compromising network devices for long-term intelligence gathering operations.
  • The group actively exploits a seven-year-old vulnerability (CVE-2018-0171), which was patched at the time of the vulnerability publications, in Cisco IOS software's Smart Install feature, targeting unpatched and end-of-life network devices to steal configuration data and establish persistent access.
  • Primary targets include organizations in telecommunications, higher education and manufacturing sectors across North America, Asia, Africa and Europe, with victims selected based on their strategic interest to the Russian government.
  • Static Tundra employs sophisticated persistence techniques including the historic SYNful Knock firmware implant (first reported in 2015) and bespoke SNMP tooling to maintain undetected access for multiple years.
  • The threat extends beyond Russia's operations — other state-sponsored actors are likely conducting similar network device compromise campaigns, making comprehensive patching and security hardening critical for all organizations.
  • Threat actors will continue to abuse devices which remain unpatched and have Smart Install enabled.
0 评论

暂无评论