Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure
Amazon's threat intelligence team has disclosed details of a "years-long" Russian state-sponsored campaign that targeted Western critical infrastructure between 2021 and 2025. Targets of the campaign included energy sector organizations across Western nations, critical infrastructure providers in North America and Europe, and entities with cloud-hosted network infrastructure. The activity has
AI Analysis
Technical Summary
Amazon's threat intelligence team disclosed a prolonged cyber espionage campaign attributed with high confidence to Russia's GRU (APT44/FROZENBARENTS/Sandworm) targeting critical infrastructure from 2021 through 2025. The campaign primarily targeted energy sector organizations, cloud infrastructure providers, and telecom operators across Western nations, North America, Europe, and the Middle East. Initial access was gained predominantly through exploitation of misconfigured customer network edge devices hosted on AWS, including routers, VPN concentrators, and network management appliances. Early phases (2021-2022) involved exploiting known vulnerabilities such as CVE-2022-26318 in WatchGuard Firebox devices, followed by Atlassian Confluence flaws (CVE-2021-26084, CVE-2023-22518) in 2022-2023, and a Veeam vulnerability (CVE-2023-27532) in 2024. Over time, the adversary shifted focus from zero-day exploits to leveraging misconfigurations, enabling stealthier, resource-efficient operations. The attackers used native packet capture capabilities on compromised devices to intercept network traffic and harvest credentials at scale. These credentials were then replayed against victim organizations’ online services to establish persistent access and enable lateral movement. Telemetry indicated persistent connections from actor-controlled IPs to compromised EC2 instances running customer network appliance software, consistent with interactive access and data exfiltration. The campaign also showed infrastructure overlaps with another Russian-aligned cluster, suggesting coordinated subgroups specializing in initial compromise and persistence. Amazon has taken steps to disrupt ongoing operations and notified impacted customers. The campaign underscores the threat posed by supply chain and cloud-hosted network infrastructure compromises in critical sectors.
Potential Impact
European organizations, particularly in the energy, telecom, and cloud service sectors, face significant risks from this campaign. Compromise of network edge devices can lead to large-scale credential theft, enabling attackers to infiltrate sensitive systems, disrupt operations, and potentially manipulate critical infrastructure. The targeting of supply chain providers amplifies the risk, as attackers can pivot to multiple downstream victims. Persistent access and lateral movement capabilities increase the likelihood of prolonged espionage or sabotage. The use of cloud-hosted infrastructure (AWS) for initial compromise complicates detection and response, as it blends with legitimate cloud operations. This threat could undermine energy grid stability, telecom network integrity, and cloud service availability, with cascading effects on national security and economic stability in Europe. The campaign’s stealth and multi-year duration highlight the challenge of detecting and mitigating such advanced persistent threats.
Mitigation Recommendations
European organizations should conduct comprehensive audits of all network edge devices, especially those hosted in cloud environments like AWS, to identify and remediate misconfigurations and unauthorized packet capture utilities. Implement strong multi-factor authentication (MFA) on all management interfaces and online services to reduce credential replay risks. Employ network segmentation to limit lateral movement from compromised edge devices. Continuously monitor authentication logs for anomalies such as logins from unexpected geographic locations or unusual times. Deploy advanced threat detection tools capable of identifying persistent connections from suspicious IP addresses to cloud-hosted network appliances. Regularly patch known vulnerabilities in network devices and collaboration platforms, prioritizing those exploited in this campaign (WatchGuard Firebox, Atlassian Confluence, Veeam). Establish incident response plans tailored to cloud-hosted infrastructure compromises, including rapid isolation of affected instances. Collaborate with cloud service providers to gain visibility into network appliance usage and suspicious activity. Finally, enhance supply chain security by vetting third-party providers with access to critical infrastructure networks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Poland, Spain, Belgium, Sweden, Norway
Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure
Description
Amazon's threat intelligence team has disclosed details of a "years-long" Russian state-sponsored campaign that targeted Western critical infrastructure between 2021 and 2025. Targets of the campaign included energy sector organizations across Western nations, critical infrastructure providers in North America and Europe, and entities with cloud-hosted network infrastructure. The activity has
AI-Powered Analysis
Technical Analysis
Amazon's threat intelligence team disclosed a prolonged cyber espionage campaign attributed with high confidence to Russia's GRU (APT44/FROZENBARENTS/Sandworm) targeting critical infrastructure from 2021 through 2025. The campaign primarily targeted energy sector organizations, cloud infrastructure providers, and telecom operators across Western nations, North America, Europe, and the Middle East. Initial access was gained predominantly through exploitation of misconfigured customer network edge devices hosted on AWS, including routers, VPN concentrators, and network management appliances. Early phases (2021-2022) involved exploiting known vulnerabilities such as CVE-2022-26318 in WatchGuard Firebox devices, followed by Atlassian Confluence flaws (CVE-2021-26084, CVE-2023-22518) in 2022-2023, and a Veeam vulnerability (CVE-2023-27532) in 2024. Over time, the adversary shifted focus from zero-day exploits to leveraging misconfigurations, enabling stealthier, resource-efficient operations. The attackers used native packet capture capabilities on compromised devices to intercept network traffic and harvest credentials at scale. These credentials were then replayed against victim organizations’ online services to establish persistent access and enable lateral movement. Telemetry indicated persistent connections from actor-controlled IPs to compromised EC2 instances running customer network appliance software, consistent with interactive access and data exfiltration. The campaign also showed infrastructure overlaps with another Russian-aligned cluster, suggesting coordinated subgroups specializing in initial compromise and persistence. Amazon has taken steps to disrupt ongoing operations and notified impacted customers. The campaign underscores the threat posed by supply chain and cloud-hosted network infrastructure compromises in critical sectors.
Potential Impact
European organizations, particularly in the energy, telecom, and cloud service sectors, face significant risks from this campaign. Compromise of network edge devices can lead to large-scale credential theft, enabling attackers to infiltrate sensitive systems, disrupt operations, and potentially manipulate critical infrastructure. The targeting of supply chain providers amplifies the risk, as attackers can pivot to multiple downstream victims. Persistent access and lateral movement capabilities increase the likelihood of prolonged espionage or sabotage. The use of cloud-hosted infrastructure (AWS) for initial compromise complicates detection and response, as it blends with legitimate cloud operations. This threat could undermine energy grid stability, telecom network integrity, and cloud service availability, with cascading effects on national security and economic stability in Europe. The campaign’s stealth and multi-year duration highlight the challenge of detecting and mitigating such advanced persistent threats.
Mitigation Recommendations
European organizations should conduct comprehensive audits of all network edge devices, especially those hosted in cloud environments like AWS, to identify and remediate misconfigurations and unauthorized packet capture utilities. Implement strong multi-factor authentication (MFA) on all management interfaces and online services to reduce credential replay risks. Employ network segmentation to limit lateral movement from compromised edge devices. Continuously monitor authentication logs for anomalies such as logins from unexpected geographic locations or unusual times. Deploy advanced threat detection tools capable of identifying persistent connections from suspicious IP addresses to cloud-hosted network appliances. Regularly patch known vulnerabilities in network devices and collaboration platforms, prioritizing those exploited in this campaign (WatchGuard Firebox, Atlassian Confluence, Veeam). Establish incident response plans tailored to cloud-hosted infrastructure compromises, including rapid isolation of affected instances. Collaborate with cloud service providers to gain visibility into network appliance usage and suspicious activity. Finally, enhance supply chain security by vetting third-party providers with access to critical infrastructure networks.
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2025/12/amazon-exposes-years-long-gru-cyber.html","fetched":true,"fetchedAt":"2025-12-17T01:38:52.283Z","wordCount":1264}
Threat ID: 694209ae473cb759e1e4680c
Added to database: 12/17/2025, 1:38:54 AM
Last enriched: 12/17/2025, 1:39:47 AM
Last updated: 2/5/2026, 5:55:25 AM
Views: 662
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62616: CWE-918: Server-Side Request Forgery (SSRF) in Significant-Gravitas AutoGPT
CriticalCVE-2025-62615: CWE-918: Server-Side Request Forgery (SSRF) in Significant-Gravitas AutoGPT
CriticalCVE-2026-25547: CWE-1333: Inefficient Regular Expression Complexity in isaacs brace-expansion
CriticalCVE-2026-25539: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in siyuan-note siyuan
CriticalCVE-2026-25526: CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine in HubSpot jinjava
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.