Pune Media

FBI Warns of Russian Cyberattacks Exploiting Cisco Vulnerabilities on US Infrastructure | Ukraine news

FBI warns of widespread cyberattacks by Russian hackers against critical U.S. infrastructure, exploiting a vulnerability in outdated Cisco software. The information is confirmed by official statements from the FBI and Cisco, citing Cisco Talos research.

Malicious actors collected configuration files and established a long-term presence in networks to subsequently leverage access in line with Russia’s strategic interests. The attacks affected facilities in the United States and spanned the telecommunications, education, and manufacturing sectors in North America, as well as Europe, Asia, and Africa.

In some cases, the attackers modified device configurations to remain inside the network and conduct reconnaissance of industrial control systems. According to investigators, the operations are led by a unit of the FSB, whose activity has continued for at least ten years. In 2022, the U.S. Department of Justice charged four members of this unit for attempts to breach energy companies worldwide from 2012 to 2018.

Moscow officially denies any cyber-espionage actions, and the Russian embassy in Washington declined to comment. Government and intelligence assessments emphasize the need to strengthen cybersecurity of critical infrastructure and promptly patch vulnerabilities in legacy software to reduce the risks of future attacks.

Risks to different sectors and recommendations for strengthening protection

Experts warn of increasing risks to the telecommunications, education, and manufacturing sectors both in the United States and internationally. Given the nature of the threats, updating systems, patching known vulnerabilities, and implementing stricter access controls are key.

Among practical steps, professionals advise immediately updating software, implementing network segmentation, maintaining continuous monitoring of configuration changes, and implementing multi-factor authentication. Regular audits of device configurations and creating backups of critical data for quick recovery after incidents are also important.

All stakeholders should establish information sharing about new vulnerabilities and promote cooperation between government and private sectors for faster detection and neutralization of threats to minimize the impact of future breaches on the economy and national security.



Images are for reference only.Images and contents gathered automatic from google or 3rd party sources.All rights on the images and contents are with their legal original owners.

Aggregated From –

Comments are closed.

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More