By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure
Computing

Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure

News Room
Last updated: 2025/12/16 at 8:09 AM
News Room Published 16 December 2025
Share
Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure
SHARE

Dec 16, 2025Ravie LakshmananCloud Security / Vulnerability

Amazon’s threat intelligence team has disclosed details of a “years-long” Russian state-sponsored campaign that targeted Western critical infrastructure between 2021 and 2025.

Targets of the campaign included energy sector organizations across Western nations, critical infrastructure providers in North America and Europe, and entities with cloud-hosted network infrastructure. The activity has been attributed with high confidence to the GRU-affiliated APT44, which is also known as FROZENBARENTS, Sandworm, Seashell Blizzard, and Voodoo Bear.

The activity is notable for using as initial access vectors misconfigured customer network edge devices with exposed management interfaces, as N-day and zero-day vulnerability exploitation activity declined over the time period – indicative of a shift in attacks aimed at critical infrastructure, the tech giant said.

“This tactical adaptation enables the same operational outcomes, credential harvesting, and lateral movement into victim organizations’ online services and infrastructure, while reducing the actor’s exposure and resource expenditure,” CJ Moses, Chief Information Security Officer (CISO) of Amazon Integrated Security, said.

Cybersecurity

The attacks have been found to leverage the following vulnerabilities and tactics over the course of five years –

  • 2021-2022 – Exploitation of WatchGuard Firebox and XTM flaw (CVE-2022-26318) and targeting of misconfigured edge network devices
  • 2022-2023 – Exploitation of Atlassian Confluence flaws (CVE-2021-26084 and CVE-2023-22518) and continued targeting of misconfigured edge network devices
  • 2024 – Exploitation of Veeam flaw (CVE-2023-27532) and continued targeting of misconfigured edge network devices
  • 2025 – Sustained targeting of misconfigured edge network devices

The intrusion activity, per Amazon, singled out enterprise routers and routing infrastructure, VPN concentrators and remote access gateways, network management appliances, collaboration and wiki platforms, and cloud-based project management systems.

These efforts are likely designed to facilitate credential harvesting at scale, given the threat actor’s ability to position themselves strategically on the network edge to intercept sensitive information in transit. Telemetry data has also uncovered what has been described as coordinated attempts aimed at misconfigured customer network edge devices hosted on Amazon Web Services (AWS) infrastructure.

“Network connection analysis shows actor-controlled IP addresses establishing persistent connections to compromised EC2 instances operating customers’ network appliance software,” Moses said. “Analysis revealed persistent connections consistent with interactive access and data retrieval across multiple affected instances.”

In addition, Amazon said it observed credential replay attacks against victim organizations’ online services as part of attempts to obtain a deeper foothold into targeted networks. Although these attempts are assessed to be unsuccessful, they lend weight to the aforementioned hypothesis that the adversary is grabbing credentials from compromised customer network infrastructure for follow-on attacks.

The entire attack plays out as follows –

  • Compromise the customer network edge device hosted on AWS
  • Leverage native packet capture capability
  • Gather credentials from intercepted traffic
  • Replay credentials against the victim organizations’ online services and infrastructure
  • Establish persistent access for lateral movement
Cybersecurity

The credential replay operations have targeted energy, technology/cloud services, and telecom service providers across North America, Western and Eastern Europe, and the Middle East.

“The targeting demonstrates sustained focus on the energy sector supply chain, including both direct operators and third-party service providers with access to critical infrastructure networks,” Moses noted.

Interestingly, the intrusion set also shares infrastructure overlaps with another cluster tracked by Bitdefender under the name Curly COMrades, which is believed to be operating with interests that are aligned with Russia since late 2023. This has raised the possibility that the two clusters may represent complementary operations within a broader campaign undertaken by GRU.

“This potential operational division, where one cluster focuses on network access and initial compromise while another handles host-based persistence and evasion, aligns with GRU operational patterns of specialized subclusters supporting broader campaign objectives,” Moses said.

Amazon said it identified and notified affected customers, as well as disrupted active threat actor operations targeting its cloud services. Organizations are recommended to audit all network edge devices for unexpected packet capture utilities, implement strong authentication, monitor for authentication attempts from unexpected geographic locations, and keep tabs on credential replay attacks.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Fallout: what is Vault-Tec? Fallout: what is Vault-Tec?
Next Article Water levels across the Great Lakes are falling – just as US data centers move in Water levels across the Great Lakes are falling – just as US data centers move in
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Musk says SAVE Act requiring ID to vote 'must be done or democracy is dead'
Musk says SAVE Act requiring ID to vote 'must be done or democracy is dead'
News
The HackerNoon Newsletter: Why the Most Productive Dev Setup Can Be the Most Fragile (2/5/2026) | HackerNoon
The HackerNoon Newsletter: Why the Most Productive Dev Setup Can Be the Most Fragile (2/5/2026) | HackerNoon
Computing
Google hints that AirDrop-style sharing is finally coming to more Android phones
Google hints that AirDrop-style sharing is finally coming to more Android phones
News
Trump fuels EU push to cut cord with US tech
News

You Might also Like

The HackerNoon Newsletter: Why the Most Productive Dev Setup Can Be the Most Fragile (2/5/2026) | HackerNoon
Computing

The HackerNoon Newsletter: Why the Most Productive Dev Setup Can Be the Most Fragile (2/5/2026) | HackerNoon

3 Min Read
Ardour 9.0 Audio Workstation Released With Multi-Touch GUI, Many New Features
Computing

Ardour 9.0 Audio Workstation Released With Multi-Touch GUI, Many New Features

1 Min Read

Why Trust Will Be the Defining Metric of 2026 |

4 Min Read
How to Master Concurrency: Best Practices for Symfony 7.4’s Lock Component  | HackerNoon
Computing

How to Master Concurrency: Best Practices for Symfony 7.4’s Lock Component | HackerNoon

11 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?