ThreatCluster
About Blog Help Contact
Login
  • Feed
  • Dashboard
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Article

FBI Warns FSB-Linked Hackers Exploiting Unpatched Cisco Devices for Cyber Espionage

Threat Score:
57
The Hacker News
1 day ago
Part of cluster #2083

Overview

A Russian state- cyber espionage group known asStatic Tundrahas been observed actively exploiting a seven-year-old security flaw in Cisco IOS and Cisco IOS XE software as a means to establish persistent access to target networks. Cisco Talos, whichdiscloseddetails of the activity, said the attacks single out organizations in telecommunications, higher education and manufacturing sectors across North America, Asia, Africa and Europe. Prospective victims are chosen based on their "strategic intere...

Continue Reading on Original Site

Related Articles

5 articles
1

Apple addressed the seventh actively exploited zero-day

Security Affairs • 5 hours ago

Apple addressed a vulnerability impacting iOS, iPadOS, and macOS that it is under active exploitation in the wild. Apple addressed an actively exploited zero-day, tracked as CVE-2025-43300, in iOS, iPadOS, and macOS. The vulnerability is zero-day out-of-bounds write issue that resides in the ImageIO framework, an attacker could exploit it to cause memory corruption when processing […]

Score
83
Read more
2

Hackers Weaponize QR Codes With Malicious Links to Steal Sensitive Data

GB Hackers • 3 hours ago

Hackers Weaponize QR Codes With Malicious Links to Steal Sensitive Data Quishing, a powerful form of phishing that uses malicious hyperlinks contained in QR codes to expose user credentials and sensitive data, has surfaced in the ever-changing field of cybersecurity threats. Unlike traditional phishing, which relies on clickable links or deceptive emails, quishing exploits the inherent opacity of QR codes, which are unreadable to the human eye and thus evade immediate suspicion. Attackers favor

Score
81
Read more
3

Warlock Ransomware Exploits SharePoint Flaws for Initial Access and Credential Theft

GB Hackers • 5 hours ago

Warlock Ransomware Exploits SharePoint Flaws for Initial Access and Credential Theft The Warlock ransomware group has intensified its operations by targeting unpatched on-premises Microsoft SharePoint servers, leveraging critical vulnerabilities to achieve remote code execution and initial network access. This campaign, observed in mid-2025, involves sending crafted HTTP POST requests to upload web shells, facilitating reconnaissance,privilege escalation, and credential theft. Initial Exploitati

Score
80
Read more
4

What MSSPs Can Learn From Healthcare Cybersecurity Risks

MSSP Alert • 6 hours ago

MSPs are well-positioned to empower healthcare organizations to address long-standing cybersecurity challenges.

Score
80
Read more
5

House lawmakers take aim at education requirements for federal cyber jobs

CyberScoop • 2 hours ago

The bipartisan Cybersecurity Hiring Modernization Act would give the edge to skills-based hiring for cyber jobs at federal agencies.

Score
79
Read more

Save to Folder

Choose a folder to save this article:

Article Intelligence

Key entities and indicators for this article

CVES
CVE-2018-0171
INDUSTRIES
Critical Infrastructure
Education
Higher Education
Information Technology
Manufacturing
COUNTRIES
China
Russia
Ukraine
United States
VULNERABILITIES
Configuration Manipulation
Denial of Service
DoS
Remote Code Execution
COMPANIES
Cisco
FBI
AGENCIES
FBI
FSB
Federal Bureau of Investigation
Federal Security Service
SECURITY VENDORS
CISA
Cisco Talos
Mandiant
PLATFORMS
Cisco IOS
Cisco IOS XE
iOS
APT GROUPS
Berserk Bear
Dragonfly
ENERGETIC BEAR
GhostEmperor
Static Tundra
RANSOMWARE
First
One
Zlader
ATTACK TYPES
Configuration File Theft
Cyber Espionage
Data Exfiltration
Network Compromise
Network Device Compromise
MITRE ATT&CK
T1046
T1053.005
T1059
T1059.001
T1070.001
MALWARE
SYNful Knock
ARTICLE INFORMATION
Article #12896
Published 1 day ago
The Hacker News

We use cookies

We use cookies and similar technologies to enhance your experience, analyse site usage, and assist in our marketing efforts.

Cookie Settings

Essential Cookies

Required for the website to function. Cannot be disabled.

  • Session management and authentication
  • Security and fraud prevention
  • Cookie consent preferences

Analytics Cookies

Help us understand how visitors interact with our website.

  • Plausible Analytics - Privacy-focused usage statistics
  • PostHog - Product analytics and feature tracking
  • Page views and user journey analysis

Performance Cookies

Help us monitor and improve website performance.

  • Page load time monitoring
  • Error tracking and debugging
  • Performance optimisation

Marketing Cookies

Used to track visitors across websites for marketing purposes.

  • Conversion tracking
  • Remarketing campaigns
  • Social media integration