Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Advanced PFAS treatment technology: innovation and development

Upside Robotics reduces fertilizer use and waste in corn crops

Former Founders Fund VC Sam Blond launches AI sales startup that will transform Salesforce

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » FBI warns FSB-linked hackers exploiting Patchededed Cisco devices for Cyber Spionage
Identity

FBI warns FSB-linked hackers exploiting Patchededed Cisco devices for Cyber Spionage

userBy userAugust 20, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 20, 2025Ravi LakshmananCyberspy/Vulnerability

It has been observed that the Russian state-sponsored cyberspy group, known as the Static Tundra, is actively exploiting the seven-year-old security flaws of Cisco iOS and Cisco iOS XE software as a means of establishing permanent access to target networks.

Cisco Talos, who revealed details of the activity, said the attack put organizations in telecommunications, higher education and manufacturing sectors in North America, Asia, Africa and Europe into a single organisation. Future victims were chosen based on their “strategic interest” in Russia, adding that recent efforts have been directed against Ukraine and its allies following the launch of the Russo-Ukrainian War in 2022.

The vulnerability in question is CVE-2018-0171 (CVSS score: 9.8). This is a critical flaw in the smart installation functionality of CISCO IOS software and Cisco iOS XE software, allowing uncertified remote attackers to trigger school denied attendance (DOS) conditions.

Cybersecurity

It is worth noting that security flaws are likely weaponized by the salt typhoon (aka operator panda) actors lined up in China in late 2024.

The static tundra per taro is linked to 16 Federal Security Services (FSB) Centre units and is rated for operation for over a decade, with a focus on long-term intelligence collection operations. It is thought to be a subcluster of another group that is tracked as a Barserk bear, a squatting yetiti, a dragonfly, an energetic bear, and hasex.

The US Federal Bureau of Investigation (FBI) said it was observing that it was running a simple Network Management Protocol (SNMP) running a Cisco Smart Installation (SMI) unearned vulnerability (CVE-2018-0171) and an FSB Cyber Actor (SMI) that leverages termination networking devices.

These attacks found that threat actors were collecting configuration files for thousands of networking devices related to US entities in critical infrastructure sectors. This activity is also characterized by attackers modifying configuration files on sensitive devices to facilitate unauthorized access.

The scaffolding is then abused, conducting reconnaissance within the victim network, while simultaneously deploying custom tools such as Synful Knock, the router implant that Mandiant first reported in September 2015.

“Synful Knock is a stealthy change in router firmware images that can be used to maintain sustainability within the victim’s network,” the threat intelligence company said at the time. “It’s inherently customizable and modular, so you can update it once it’s embedded.”

Another notable aspect of the attack is about using SNMP to send steps to download text files from remote servers and add them to the current running configuration to allow additional means of access to network devices. Defense evasion is achieved by modifying the TACACS+ configuration of the infected appliance to interfere with the remote logging function.

Identity Security Risk Assessment

“Static Tundra is likely to use publicly available scan data from services such as Shodan and Censys to identify systems of interest,” said Talos researchers Sara McBroom and Brandon White. “One of the main actions of the static tundra regarding purpose is to capture network traffic that is valuable from an intellectual standpoint.”

This is achieved by configuring a common Routing Encapsulation (GRE) tunnel that redirects traffic of interest to an attacker-controlled infrastructure. The enemy was also found collecting and removing Netflow data about the compromised system. Harvested data is expanded via outbound TFTP or FTP connections.

Static Tundra activities primarily focus on informal and often terminated network devices that aim to establish access to key targets and promote secondary operations against targets of interest. Once you get your first access, threat access digs deep holes in your environment and hacks into additional network devices for long-term access and information gathering.

To mitigate the risk poses by threats, Cisco advises customers to patch CVE-2018-0171 or disable smart installation if the patch is not an option.

“The purpose of this campaign is to compromise and extract configuration information for devices, which can be used later, based on the strategic goals of the time and the interests of the Russian government,” Talos said. “This is demonstrated by the static tundra adaptation and change in operational focus as Russia’s priorities have changed over time.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMeta adds 100mW of solar power from US gear
Next Article Listen and record all conversations “Always On” Harvard Dropout launches AI smart glasses
user
  • Website

Related Posts

APT36 and SideCopy launch cross-platform RAT campaign against Indian companies

February 11, 2026

Public training opens the door to crypto mining in Fortune 500 cloud environments

February 11, 2026

Microsoft patches 59 vulnerabilities, including 6 actively exploited zero-days

February 11, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Advanced PFAS treatment technology: innovation and development

Upside Robotics reduces fertilizer use and waste in corn crops

Former Founders Fund VC Sam Blond launches AI sales startup that will transform Salesforce

APT36 and SideCopy launch cross-platform RAT campaign against Indian companies

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.