UAC-0212 Hackers Unleash Devastating Cyber Assault on Critical Infrastructure - #Sandworm
Russian state-sponsored hacking group Seashell Blizzard (APT44/Sandworm) has been conducting a global cyber espionage campaign called 'BadPilot' since 2021, targeting critical infrastructure and governments worldwide. The group exploits vulnerabilities in popular software, uses sophisticated persistence techniques, and has expanded its focus from Ukraine to include the US, UK, Canada, and Australia. Their tactics involve deploying remote management tools, web shells, and custom utilities for covert access and credential theft. Concurrently, other Russian-linked groups have been targeting Signal Messenger users and Ukraine's critical infrastructure, particularly in automation and process control sectors. These escalating cyber threats underscore the growing risk to encrypted communications and essential services, prompting organizations to strengthen their cybersecurity measures and implement comprehensive monitoring strategies.
Menu