• Send Us A Tip
  • Calling all Tech Writers
  • Advertise
Saturday, June 21, 2025
  • Login
  • Register
TechStory
  • News
  • Crypto
  • Gadgets
  • Memes
  • Gaming
  • Cars
  • AI
  • Startups
  • Markets
  • How to
No Result
View All Result
  • News
  • Crypto
  • Gadgets
  • Memes
  • Gaming
  • Cars
  • AI
  • Startups
  • Markets
  • How to
No Result
View All Result
TechStory
No Result
View All Result
Home News

Five Eyes Intelligence Alliance Sounds Alarm on Russian Hackers’ Shift to Cloud Services

by Harikrishnan A
February 28, 2024
in News, Tech, Trending, World
Reading Time: 2 mins read
0
Advancements in AI Spark Corporate Enthusiasm
TwitterWhatsappLinkedin

In a joint advisory released today, members of the Five Eyes intelligence alliance have issued a stark warning to organizations worldwide, shedding light on the escalating threat posed by Russian cyber espionage targeting cloud-based infrastructure.

You might also like

Jaguar Land Rover Faces $2.1 Billion Tariff Hit Under New US Trade Rules, Says Tata Chairman N Chandrasekaran

Maserati’s Future in Limbo as Stellantis Prepares for New CEO, Possible Brand Divestment on the Table

Innov8 Raises Fresh Funds at ₹1,000 Cr Valuation; Plans to Double Footprint

Adapting Tactics: APT29’s Move to the Cloud

The advisory highlights the concerning evolution of tactics by APT29, also known as Cozy Bear or Midnight Blizzard, affiliated with Russia’s SVR intelligence service. Once infamous for breaching U.S. federal agencies via the SolarWinds supply-chain attack and infiltrating Microsoft 365 accounts within NATO nations, APT29 has now pivoted its focus towards cloud services, posing a new set of challenges for cybersecurity professionals.

With organizations increasingly transitioning to cloud-based systems, traditional methods of cyber intrusion, such as exploiting software vulnerabilities, are losing efficacy. APT29 has been observed employing diverse strategies, including brute-force attacks, password spraying, and targeting dormant accounts of former employees, to infiltrate cloud environments.

Deploying Advanced Techniques Post-Access

Upon gaining initial access, APT29 deploys sophisticated tools like the MagicWeb malware to maneuver within compromised networks discreetly. This poses a significant threat to government and critical organizations across Europe, the United States, and Asia, as the attackers aim to conceal their presence and exfiltrate sensitive information.

Urgent Call for Mitigation Strategies

Recognizing the gravity of the situation, the advisory emphasizes the imperative of implementing multi-factor authentication (MFA), stringent password policies, and adhering to the principle of least privilege. Close monitoring for indicators of compromise is also stressed as essential in thwarting APT29’s initial access vectors and bolstering overall defense against such cyber threats.

Heightened Security Measures for Water Utilities

In response to escalating cyber threats, cybersecurity agencies in the United States have intensified efforts to safeguard critical infrastructure, particularly water utilities, against potential attacks.

Recent ransomware assaults on water treatment companies, including Veolia North America and Southern Water in the UK, have underscored the urgency for enhanced cybersecurity measures. These incidents have prompted collaborative efforts among cybersecurity agencies and utility providers to fortify defenses and mitigate risks.

Issuance of Incident Response Guide

CISA, the FBI, and the EPA have collaborated to release an incident response guide tailored to assist water utilities in fortifying their cybersecurity posture. This initiative aims to enhance the resilience of critical infrastructure and enable swift and effective responses to cyber incidents.

In a proactive stance against cyber threats, the U.S. cybersecurity agency has introduced a complimentary security scan program specifically designed for critical infrastructure facilities like water utilities. These measures seek to preemptively identify and address security vulnerabilities before they can be exploited by malicious actors.

Learning from Historical Incidents

Past cyber incidents, such as the infiltration of a Pennsylvania water facility through vulnerable programmable logic controllers (PLCs), serve as sobering reminders of the susceptibility of water and wastewater systems to cyberattacks. While these breaches did not compromise potable water safety, they underscore the critical importance of robust cybersecurity measures in safeguarding vital infrastructure.

Collaborative Action for Enhanced Cyber Defense

As cyber threats continue to evolve and pose significant risks to critical infrastructure, collaboration among international security agencies and proactive measures by providers are imperative. Only through concerted efforts can organizations effectively mitigate risks and protect essential systems and services from malicious actors, ensuring the security and resilience of global infrastructure networks.

Tags: #APT29AmericacisaEPAFBIMagicWebUKUSA
Tweet55SendShare15
Previous Post

Elon Musk’s Tunnel Vision: A Tale of Challenges and Concerns

Next Post

Workplace Safety Topics

Harikrishnan A

Aspiring writer. Enjoys gaming, fried chicken and iced tea, preferably all together.

Recommended For You

Jaguar Land Rover Faces $2.1 Billion Tariff Hit Under New US Trade Rules, Says Tata Chairman N Chandrasekaran

by Rounak Majumdar
June 21, 2025
0
Jaguar Land Rover Faces $2.1 Billion Tariff Hit Under New US Trade Rules, Says Tata Chairman N Chandrasekaran

As new US trade measures threaten to impose $2.1 billion in tariffs, Jaguar Land Rover (JLR), the luxury car division of Tata Motors, is preparing for a major...

Read more

Maserati’s Future in Limbo as Stellantis Prepares for New CEO, Possible Brand Divestment on the Table

by Samir Gautam
June 21, 2025
0
Maserati’s Future in Limbo as Stellantis Prepares for New CEO, Possible Brand Divestment on the Table

As Antonio Filosa prepares to take the helm as the new CEO of Stellantis this Monday, the automotive world is watching closely, especially with growing speculation that Maserati,...

Read more

Innov8 Raises Fresh Funds at ₹1,000 Cr Valuation; Plans to Double Footprint

by Ishaan Negi
June 21, 2025
0
Innov8 Raises Fresh Funds at ₹1,000 Cr Valuation; Plans to Double Footprint

In a notable move in India’s flexible workspace sector, Oyo-owned Innov8 has raised fresh capital at a valuation of ₹1,000 crore, selling 3% stake in the company. The...

Read more
Next Post
Photo by Arlington Research on Unsplash

Workplace Safety Topics

Please login to join discussion

Techstory

Tech and Business News from around the world. Follow along for latest in the world of Tech, AI, Crypto, EVs, Business Personalities and more.
reach us at [email protected]

Advertise With Us

Reach out at - [email protected]

BROWSE BY TAG

#Crypto #howto 2024 acquisition AI amazon Apple bitcoin Business China cryptocurrency e-commerce electric vehicles Elon Musk Ethereum facebook flipkart funding Gaming Google India Instagram Investment ios iPhone IPO Market Markets Meta Microsoft News NFT samsung Social Media SpaceX startup startups tech technology Tesla TikTok trend trending twitter US

© 2024 Techstory.in

No Result
View All Result
  • News
  • Crypto
  • Gadgets
  • Memes
  • Gaming
  • Cars
  • AI
  • Startups
  • Markets
  • How to

© 2024 Techstory.in

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?