Russian cyber spies targeted entities in Europe, US and Ukraine via flaws in Cisco routers

Russian cyber spies targeted entities in Europe, US and Ukraine via flaws in Cisco routers

The UK National Cyber Security Centre (NCSC), the US National Security Agency (NSA), US Cybersecurity and Infrastructure Security Agency (CISA) and US Federal Bureau of Investigation (FBI) have released a joint security advisory highlighting attacks on Cisco routers orchestrated by Russian military hackers.

Tracked as APT28, Fancy Bear, and Strontium, the group has been linked by cybersecurity authorities to the Russian General Staff Main Intelligence Directorate’s (GRU) 85th special Service Centre (GTsSS) Military Intelligence Unit 26165.

According to the advisory, the threat actor exploited Cisco router vulnerabilities throughout 2021, targeting “a small number based in Europe, US government institutions and approximately 250 Ukrainian victims.”

“In 2021, APT28 used infrastructure to masquerade Simple Network Management protocol (SNMP) access into Cisco routers worldwide,” the agencies say.

The group has used two attack methods to access routers, one of which involved the use of default and weak SNMP community strings, and the other exploited the CVE-2017-6742 remote code execution vulnerability in Cisco IOS patched by the vendor in 2017.

Cisco's advisory at the time provided workarounds such as limiting access to SNMP from trusted hosts only, or by disabling a number of SNMP Management Information bases (MIBs).

In some cases APT28 used an SNMP exploit to deploy the Jaguar Tooth malware that collected device information and provided unauthenticated access via a backdoor.

In a blog post published this week Matt Olney, director of Threat Intelligence and Interdiction at Cisco, said that the Jaguar Tooth campaign is “an example of a much broader trend of sophisticated adversaries targeting networking infrastructure to advance espionage objectives or pre-position for future destructive activity.”

He further added that China has also been observed attacking network equipment from a broad set of manufacturers in several cyber-espionage operations.

“These are certainly not the only campaigns targeting network equipment, nor the only actors. It is reasonable to conclude that any sufficiently capable national intelligence operation would develop and use the capability to compromise the communications infrastructure of their preferred targets,” Olney said.


Back to the list

Latest Posts

Kosovo man extradited to US for running BlackDB.cc criminal marketplace

Kosovo man extradited to US for running BlackDB.cc criminal marketplace

If convicted on all counts, Masurica faces up to 55 years in federal prison.
14 May 2025
Multiple actively exploited zero-days patched in Microsoft, Ivanti, and Fortinet products

Multiple actively exploited zero-days patched in Microsoft, Ivanti, and Fortinet products

Microsoft shipped patches for over 70 flaws, five of which have been flagged as actively exploited zero-day bugs.
14 May 2025
Chinese hackers exploit SAP NetWeaver in cyber campaigns targeting critical infrastructure

Chinese hackers exploit SAP NetWeaver in cyber campaigns targeting critical infrastructure

The flaw was exploited to gain access to enterprise systems globally.
14 May 2025