Sunday, April 13, 2025
Homecyber securityRussian Military Hackers Attacking US and Global Critical Infrastructure

Russian Military Hackers Attacking US and Global Critical Infrastructure

Published on

SIEM as a Service

Follow Us on Google News

Russian military hackers, identified as Unit 29155, have been actively targeting critical infrastructure in the United States and globally.

This unit, known for its sophisticated cyber operations, has been linked to attacks aimed at disrupting and compromising vital sectors.

The implications of these cyber intrusions are vast, affecting government services, financial institutions, transportation systems, energy grids, and healthcare facilities.

- Advertisement - Google News

The Threat of Unit 29155

Unit 29155, a covert group within Russia’s military intelligence agency (GRU), has been under scrutiny for its aggressive cyber activities.

According to the FBI, NSA, and CISA, this unit has expanded its operations beyond traditional espionage to include offensive cyber tactics since at least 2020.

Their objectives range from information theft for espionage to causing reputational harm and systematic sabotage through data destruction.

Unit 29155 has been involved in various cyber campaigns, including website defacements, infrastructure scanning, data exfiltration, and data leak operations.

These actions have targeted numerous NATO members and countries across Europe, Latin America, and Central Asia.

The group focuses on disrupting efforts to aid Ukraine, with over 14,000 instances of domain scanning observed across at least 26 NATO members.

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14 day free trial

Unit 29155 employs a range of publicly available tools for reconnaissance and exploitation. These include Acunetix, Nmap, Amass, and Shodan, among others.

These tools are used to identify vulnerabilities and gather information on target networks. The group also uses VPNs to anonymize their activities and relies on non-GRU actors, including cybercriminals, to conduct their operations.

Exploited Vulnerabilities

The hackers have been observed exploiting several Common Vulnerabilities and Exposures (CVEs) for initial access.

Notable CVEs include:

These vulnerabilities have been exploited to gain unauthorized access and move laterally within victim networks.

In one documented instance, Unit 29155 exploited vulnerabilities CVE-2021-33044 and CVE-2021-33045 in Dahua IP cameras.

The hackers bypassed identity authentication, allowing them to exfiltrate images and dump configuration settings and credentials in plaintext.

This highlights the group’s ability to target Internet of Things (IoT) devices and exploit them for further network infiltration.

Code Example: Exploiting CVE-2021-33044

# Exploit script for CVE-2021-33044
echo "Exploiting Dahua IP Camera vulnerability..."
curl -X POST "http://<target-ip>/cgi-bin/configManager.cgi?action=getConfig&name=Network" \
     --data "user=admin&password=admin"

This script demonstrates a basic exploitation attempt using a POST request to extract network configurations from a vulnerable Dahua IP camera.

Mitigation and Response

To mitigate these threats, organizations are advised to implement robust cybersecurity measures.

This includes regularly patching software vulnerabilities, employing intrusion detection systems, and conducting thorough security audits.

Multi-factor authentication and network segmentation can also help reduce the risk of unauthorized access.

The cybersecurity industry plays a crucial role in tracking and mitigating these threats. Companies like Microsoft and CrowdStrike have been instrumental in identifying and attributing Unit 29155’s activities.

Their collaboration with government agencies helps develop effective countermeasures and share threat intelligence.

Russian military hackers’ activities pose a significant threat to global security. As Unit 29155 continues to evolve its tactics, nations, and organizations must remain vigilant and proactive in their cybersecurity efforts.

The ongoing collaboration between government agencies and the cybersecurity industry is vital in combating these sophisticated cyber threats and protecting critical infrastructure worldwide.

What Does MITRE ATT&CK Expose About Your Enterprise Security? - Watch Free Webinar!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...