{"id":1918,"date":"2025-02-13T12:26:41","date_gmt":"2025-02-13T12:26:41","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=1918"},"modified":"2025-02-13T12:26:41","modified_gmt":"2025-02-13T12:26:41","slug":"russian-hacking-group-targets-critical-infrastructure-in-the-us-the-uk-and-canada","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=1918","title":{"rendered":"Russian hacking group targets critical infrastructure in the US, the UK, and Canada"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>A Russian state-backed hacking group is executing one of the most far-reaching cyber espionage campaigns ever seen, infiltrating critical infrastructure across multiple continents by exploiting vulnerabilities in IT management software.<\/p>\n<p>The operation, attributed to the notorious Russian threat actor Seashell Blizzard, has compromised high-profile targets in energy, telecommunications, defense, and government sectors, including in the US, Canada, Australia, and the UK, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/02\/12\/the-badpilot-campaign-seashell-blizzard-subgroup-conducts-multiyear-global-access-operation\/\">Microsoft said in a report<\/a>.<\/p>\n<p>The software major has warned that the scale and persistence of these attacks pose an immediate and severe risk to global cybersecurity.<\/p>\n<p>\u201cActive since at least 2021, this subgroup within Seashell Blizzard has leveraged opportunistic access techniques and stealthy forms of persistence to collect credentials, achieve command execution, and support lateral movement that has at times led to substantial regional network compromises,\u201d Microsoft said in the report.<\/p>\n<p>Seashell Blizzard\u2019s activities align with those tracked by other security vendors under various names, including BE2, UAC-0133, Blue Echidna, <a href=\"https:\/\/www.csoonline.com\/article\/568103\/russias-sandworm-hacking-group-heralds-new-era-of-cyber-warfare.html\">Sandworm<\/a>, PHANTOM, BlackEnergy Lite, and APT44.<\/p>\n<h2 class=\"wp-block-heading\">Russian cyber warfare expands beyond Ukraine<\/h2>\n<p>The hacking subgroup tracked as the \u201cBadPilot campaign,\u201d has been active since at least 2021, originally focusing on Ukraine and Europe. Microsoft reports that the operation has now extended its reach into North America, Central Asia, and the Middle East.<\/p>\n<p>\u201cThe geographical targeting to a near-global scale expands Seashell Blizzard\u2019s operations beyond Eastern Europe,\u201d said the report.<\/p>\n<p>Seashell Blizzard, linked to Russia\u2019s Military Intelligence Unit 74455 (GRU), has a long history of cyberespionage and destructive cyberattacks aligned with Kremlin interests.<\/p>\n<p>This latest campaign demonstrates the group\u2019s growing sophistication in leveraging stealth tactics and opportunistic access methods to gain control of high-value networks.<\/p>\n<h2 class=\"wp-block-heading\">Weaponizing IT software against global enterprises<\/h2>\n<p>Since early 2024, the hackers have exploited vulnerabilities in widely used IT management tools, including ConnectWise ScreenConnect (CVE-2024-1709) and Fortinet FortiClient EMS (CVE-2023-48788). By compromising these critical enterprise systems, the group has gained undetected access to networks, Microsoft warned.<\/p>\n<p>\u201cSeashell Blizzard\u2019s specialized operations have ranged from espionage to information operations and cyber-enabled disruptions, usually in the form of destructive attacks and manipulation of industrial control systems (ICS),\u201d the report said. \u201cThe opportunistic access methods outlined in this campaign will continue to offer Russia opportunities for niche operations and activities.\u201d<\/p>\n<p>The group\u2019s evolving tradecraft has made its attacks increasingly difficult to detect, allowing it to establish persistent footholds in high-profile targets worldwide.<\/p>\n<p>Some of the notorious attacks of the subgroup include destructive attacks such as <a href=\"https:\/\/www.csoonline.com\/article\/559515\/killdisk-cyber-sabotage-tool-evolves-into-ransomware.html\">KillDisk<\/a> and FoxBlade, supply-chain attacks such as <a href=\"https:\/\/www.csoonline.com\/article\/563073\/software-supply-chain-puts-businesses-at-risk.html\">MeDoc<\/a>, and pseudo-ransomware attacks such as <a href=\"https:\/\/www.csoonline.com\/article\/562149\/notpetya-and-shadow-brokers-july-vip-service-mystery-gift-dump-of-the-month-club.html\">NotPetya<\/a> and Prestige, Microsoft noted in the report.<\/p>\n<h2 class=\"wp-block-heading\">Mounting cyberattacks signal a growing threat to enterprises<\/h2>\n<p>Microsoft has linked the subgroup to at least three destructive cyberattacks in Ukraine since 2023, underscoring the severity of its operations. The report highlights that while some attacks appear indiscriminate, the overall strategy provides Russia with valuable cyber access for future military and intelligence operations.<\/p>\n<p>\u201cSince April 2022, Russia-aligned threat actors have increasingly targeted international organizations that are either geopolitically significant or provide military and\/or political support to Ukraine,\u201d Microsoft noted.<\/p>\n<p>The targeted industries include arms manufacturing, shipping, and energy\u2014sectors critical to national security and geopolitical stability. The campaign\u2019s expanding reach signals an urgent need for stronger cybersecurity measures among enterprises and governments.<\/p>\n<p>\u201cDue to their specialization in computer network exploitation (CNE) and expertise targeting critical infrastructure such as ICS and supervisory control and data acquisition systems (SCADA), Seashell Blizzard\u2019s operations have frequently been leveraged during military conflicts and as an adaptable element during contentious geopolitical events,\u201d the report added.<\/p>\n<p>The report said that Microsoft is actively tracking Seashell Blizzard\u2019s operations and notifying affected organizations. It also urged enterprises to take immediate action by patching known vulnerabilities, enforcing network segmentation, and adopting a zero-trust security framework. \u201cSecurity teams should monitor for suspicious activity and review logs for indicators of compromise linked to Seashell Blizzard\u2019s evolving attack methods,\u201d Microsoft suggested in the report.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>A Russian state-backed hacking group is executing one of the most far-reaching cyber espionage campaigns ever seen, infiltrating critical infrastructure across multiple continents by exploiting vulnerabilities in IT management software. The operation, attributed to the notorious Russian threat actor Seashell Blizzard, has compromised high-profile targets in energy, telecommunications, defense, and government sectors, including in the [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":1919,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1918","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/1918"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1918"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/1918\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/1919"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1918"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1918"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1918"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}