How Is GRU Targeting Energy and Cloud Infrastructure?

Article Highlights
Off On

A recently disclosed intelligence report has pulled back the curtain on a persistent and sophisticated cyber campaign orchestrated by Russia’s Main Intelligence Directorate (GRU), revealing a multi-year effort to infiltrate the digital backbones of Western nations. Operating from 2021 through 2025, this campaign methodically targeted critical energy sector organizations, major infrastructure providers across North America and Europe, and various entities relying on cloud-hosted networks. The activity, attributed with high confidence to the group also known as APT44 or Sandworm, signifies a strategic pivot in state-sponsored attacks. Instead of relying solely on high-cost, high-risk zero-day exploits, these threat actors increasingly focused on a more subtle and sustainable vector: misconfigured network edge devices. This tactical adaptation has allowed the adversary to achieve its objectives of credential harvesting and lateral movement while minimizing resource expenditure and reducing the risk of exposure, posing a formidable challenge to defenders of critical national infrastructure.

1. A Tactical Evolution in Espionage

The operational playbook of this GRU-linked threat actor has demonstrated a clear and concerning evolution over the past five years, shifting from a dependency on vulnerability exploitation to a more opportunistic approach. While the campaign did leverage N-day and zero-day vulnerabilities, analysis shows a declining trend in this activity over the observed period. In its place, the adversary has intensified its focus on a far more common and often overlooked security gap: customer network edge devices with exposed management interfaces. This strategic shift is significant because it allows the threat actors to achieve the same operational outcomes—gaining an initial foothold, harvesting credentials, and moving deeper into target networks—without the need to develop or acquire expensive and perishable exploit code. By targeting common misconfigurations in enterprise routers, VPN concentrators, and network management appliances, the group has created a scalable and efficient method for initial access that is harder to trace back to a specific vulnerability, thereby extending the longevity and stealth of its operations. This approach highlights a calculated move toward lower-cost, higher-yield intrusions that prey on basic security hygiene failures rather than complex software flaws.

This adaptive strategy is clearly illustrated by the specific tactics employed year over year throughout the campaign. In 2021 and 2022, the group was observed exploiting a known flaw in WatchGuard Firebox and XTM appliances (CVE-2022-26318), but this was consistently paired with the broader targeting of misconfigured edge devices. This pattern continued into 2022 and 2023, where exploits for Atlassian Confluence vulnerabilities (CVE-2021-26084 and CVE-2023-22518) were used in conjunction with the same edge device targeting. By 2024, a Veeam flaw (CVE-2023-27532) became part of their arsenal, yet the primary focus on misconfigured infrastructure remained the constant through-line of the campaign. This sustained effort, culminating in 2025 with an almost exclusive focus on these configuration weaknesses, underscores the adversary’s confidence in this tactic. The targets within this strategy included not just routers and remote access gateways but also collaboration platforms and cloud-based project management systems, demonstrating a comprehensive effort to compromise any entry point that could facilitate large-scale credential harvesting.

2. The Anatomy of a Compromise

Once an initial foothold was established, the threat actor followed a meticulous, multi-stage process designed for deep network infiltration and data exfiltration. The attack sequence typically began with the compromise of a customer-owned network edge device hosted on cloud infrastructure, such as an Amazon EC2 instance running network appliance software. After gaining control, the attackers leveraged the device’s native packet capture capabilities—a legitimate function repurposed for malicious ends—to intercept network traffic. This vantage point on the network edge is strategically valuable, as it allowed the actor to monitor and gather sensitive information, most notably user credentials, as they transited the network. With a trove of harvested credentials, the adversary then initiated the next phase of the attack: replaying these credentials against the victim organization’s other online services and internal infrastructure. The ultimate objective was not a one-time data grab but the establishment of persistent access, which would enable deeper lateral movement throughout the victim’s digital environment and long-term intelligence gathering.

The credential replay operations were not random; they were highly targeted, reflecting the GRU’s strategic interests. The campaign primarily focused on the energy sector supply chain, hitting both direct operators of critical infrastructure and their third-party service providers. This demonstrates a sophisticated understanding of modern interconnected ecosystems, where compromising a smaller service provider can grant access to a much larger and more critical target. The geographic scope of these attacks was broad, spanning North America, Western and Eastern Europe, and the Middle East, affecting a wide array of energy, technology, and telecommunications companies. While many of these credential replay attempts were reportedly unsuccessful, they provided invaluable insight into the adversary’s ultimate goals. The attempts confirmed the hypothesis that the initial edge device compromises were a means to an end—a preparatory step to fuel subsequent, more intrusive attacks aimed at gaining a profound and lasting foothold within networks of high strategic importance.

3. Uncovering Operational Overlaps and Defenses

Further analysis of the campaign’s infrastructure revealed intriguing connections to other known threat clusters, suggesting a complex and possibly collaborative operational structure. A key piece of evidence was the overlap of a specific IP address (91.99.25[.]54) with a separate intrusion set tracked as Curly COMrades, which is also believed to operate with interests aligned with Russia. This shared infrastructure has led to the hypothesis that these two clusters may represent complementary components of a single, broader GRU campaign. This model suggests a potential division of labor, a tactic commonly observed in sophisticated state-sponsored operations. Under this structure, one subcluster, like the one focused on edge devices, could be responsible for gaining initial network access and executing the initial compromise. Simultaneously, another subcluster, such as Curly COMrades, could be tasked with the subsequent phases of the attack, including establishing host-based persistence, evading detection, and carrying out the ultimate mission objectives. This specialization allows for greater efficiency, security, and expertise within the overall operation, aligning perfectly with established patterns of GRU cyber activity.

In response to this sustained threat, Amazon identified and notified affected customers whose cloud infrastructure was being leveraged and took direct action to disrupt the threat actor’s active operations. However, the nature of this campaign underscores that cloud provider actions alone are insufficient; customer vigilance is paramount. Organizations were strongly advised to conduct thorough audits of all network edge devices, specifically searching for any unexpected or unauthorized packet capture utilities that could indicate a compromise. Implementing strong authentication measures, such as multi-factor authentication, across all services was highlighted as a critical defense to thwart credential replay attacks. Furthermore, security teams were urged to actively monitor for authentication attempts originating from unexpected geographic locations and to maintain heightened awareness for the distinct patterns of credential replay attacks against their online services. These defensive measures, focused on securing the network perimeter and validating user identity, represented the most effective strategies to counter this adaptive and persistent adversary.

Explore more

AI Agents Are Shifting Developers From Code to Impact

Dominic Jainy is an IT professional whose extensive expertise in artificial intelligence and machine learning offers a unique window into the future of technology. Today, we’re exploring one of the most dynamic shifts in the tech world: how AI is fundamentally reshaping the software development landscape. We’ll delve into how AI agents are transforming the daily lives of developers, the

Email, Education, and Authenticity Define 2026 Marketing

In a world of rising customer acquisition costs and crowded digital channels, the playbook for direct-to-consumer success is being rewritten. We sat down with Aisha Amaira, a MarTech expert whose work at the intersection of CRM technology and customer data platforms gives her a unique vantage point on this evolution. Drawing from insights across dozens of brands, she unpacks the

Payment Orchestration Platforms – Review

The explosion of digital payment options across the globe has created a complex web of integrations for businesses, turning a world of opportunity into a significant operational challenge. Payment orchestration represents a significant advancement in the financial technology sector, designed to untangle this complexity. This review will explore the evolution of the technology, its key features, performance metrics, and the

How Much Faster Is AMD’s New Ryzen AI Chip?

We’re joined today by Dominic Jainy, an IT professional whose work at the intersection of AI and hardware gives him a unique lens on the latest processor technology. With the first benchmarks for AMD’s Ryzen AI 5 430 ‘Gorgon Point’ chip emerging, we’re diving into what these numbers really mean. The discussion will explore the nuances of its modest CPU

AI-Powered Trading Tools – Review

The unrelenting deluge of real-time financial data has fundamentally transformed the landscape of trading, rendering purely manual analysis a relic of a bygone era for those seeking a competitive edge. AI-Powered Trading Tools represent the next significant advancement in financial technology, leveraging machine learning and advanced algorithms to sift through market complexity. This review explores the evolution of this technology,