Saturday, June 14, 2025
Advertisements

CISA Warns of Russian Cyberattacks Targeting Logistics and Tech Firms

by Charline

The U.S. Cybersecurity and Infrastructure Security Agency (CISA), in partnership with the NSA, FBI, and international cybersecurity bodies, has issued a joint advisory warning that Russian military hackers are actively targeting logistics and technology companies in the West.

The cyber campaign mainly focuses on organizations involved in transporting and delivering aid to Ukraine. The advisory, released on May 21, 2025, names the threat actor as the Russian GRU’s 85th Main Special Service Center—also known as APT28, Fancy Bear, or Forest Blizzard.

Advertisements

Ongoing Espionage Since 2022

According to the advisory, the cyber espionage campaign has been active since 2022 and uses known methods to gain access and gather intelligence.

Advertisements

“This cyber espionage-oriented campaign targeting technology companies and logistics entities uses a mix of previously disclosed tactics, techniques, and procedures,” the advisory states. “The authoring agencies expect similar targeting and TTP use to continue.”

Hackers have breached dozens of organizations across 13 countries, including the U.S., Ukraine, and several European nations. Key sectors affected include defense, maritime operations, air traffic management, IT services, and transportation facilities such as ports and airports.

Advertisements

Targeting Critical Infrastructure and Surveillance Devices

In a more alarming move, the attackers have accessed IP cameras at sensitive sites, such as border crossings and military areas, to track aid movements into Ukraine. More than 80% of these cameras were located in Ukraine, while others were in neighboring countries like Poland, Hungary, Romania, and Slovakia.

Advertisements

After breaching these networks, the attackers searched for data related to aid logistics—such as sender and recipient information, transport IDs, travel routes, container numbers, and cargo descriptions.

Use of Common Windows Tools for Malicious Purposes

The GRU group has used built-in Windows utilities to perform unauthorized activities and avoid detection. Below is a summary of how these tools were misused:

Utility Description of Malicious Use
ntdsutil Extracted Active Directory databases for credential harvesting.
wevtutil Cleared Windows event logs to erase evidence of attacks.
vssadmin Created shadow copies to access locked files during data theft.
schtasks Set up malicious scheduled tasks to maintain access.
wmic Collected system data and ran remote commands for lateral movement.
certutil Decoded malicious files and validated forged certificates.
net Listed network shares and user accounts for reconnaissance.
reg Changed registry settings to disable defenses and keep persistence.
powershell Ran encoded scripts to steal credentials and install malware.
bitsadmin Downloaded additional malware while avoiding detection.
icacls Changed file permissions to access sensitive documents.

The advisory warns that these activities show how the hackers can repurpose everyday system tools to conduct surveillance and data theft without relying on external malware.

International Response and Recommendations

The alert is backed by cybersecurity authorities from the U.S., U.K., Germany, Poland, the Czech Republic, Australia, Canada, France, Denmark, Estonia, and the Netherlands. This wide support reflects international concern about the GRU’s continued operations.

CISA urges companies in logistics and tech sectors to take immediate action. Recommended steps include:

  • Enable network segmentation to limit lateral movement.
  • Use multi-factor authentication with strong methods.
  • Apply security patches and software updates regularly.
  • Monitor system and access logs for unusual activity.

This alert follows a similar warning earlier this month, in which Russian hackers were linked to attacks on water system infrastructure. These ongoing threats show the growing danger of state-sponsored cyber operations targeting critical industries worldwide.

Advertisements

You may also like

blank

At ProxyServerPro, we are dedicated to providing cutting-edge proxy solutions tailored to meet the diverse needs of businesses and individuals. Our platform offers a comprehensive range of high-performance proxies, including residential, datacenter, and mobile options, ensuring seamless browsing, data scraping, and online anonymity. With a focus on reliability, speed, and security, we empower users to navigate the digital landscape with confidence. Whether you’re managing ad verification, market research, or web automation, ProxyServerPro is your trusted partner for scalable, efficient, and secure proxy services. Explore our portal to discover how we can elevate your online experience.

© 2024 Copyright  proxyserverpro.com