CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◉ Threat Intelligence Mar 19, 2026

CISA: Pro-Russia Hacktivists Target US Critical Infrastructure - Dark Reading

Dark Reading Archived Mar 19, 2026 ✓ Full text saved

CISA: Pro-Russia Hacktivists Target US Critical Infrastructure Dark Reading

Full text archived locally
✦ AI Summary · Claude Sonnet


    THREAT INTELLIGENCE CYBERSECURITY OPERATIONS PHYSICAL SECURITY ICS/OT SECURITY NEWS Feds: Pro-Russia Hacktivists Target US Critical Infrastructure So far the attacks, which compromise virtual network computing (VNC) connections in OT systems, have not been particularly destructive, but this could change as they evolve. Elizabeth Montalbano,Contributing Writer December 10, 2025 6 Min Read SOURCE: YRI ARCURS VIA ALAMY STOCK PHOTO The US government is warning that unsophisticated pro-Russia hacktivists are targeting US critical infrastructure to gain access to operational technology (OT) control devices. These so-called "opportunistic" attacks so far have had limited impact, but could pose a more dire threat in the future. In conjunction with the warning, the FBI, the Cybersecurity Infrastructure Agency (CISA), the National Security Agency (NSA), and various international authorities have identified four specific groups — Cyber Army of Russia Reborn (CARR), Z-Pentest, NoName057(16), and Sector16 — as well as their affiliates, which in the past several weeks have attacked minimally secured, Internet-facing virtual network computing (VNC) connections in OT systems, according to an advisory posted Tuesday. The groups are compromising these networks in attacks that primarily target water and wastewater systems, food and agriculture, and energy sectors. Related:DarkSword: iPhone Exploit Kit Serves Spies & Thieves Alike Unlike advanced persistent threats (APTs), these fringe groups, on the surface, appear to lack direct governmental ties, though they share the same support of the Russian agenda and similar targeting of Ukranian and allied infrastructure, according to the advisory. "However, among the increasing number of groups, some appear to have associations with the Russian state through direct or indirect support," according to CISA. CARR previously took credit for disrupting water supplies at US, Polish, and French facilities, which Mandiant revealed in 2024. "[The advisory] confirms our earlier assessment of ties between hacktivist front Cyber Army of Russia Reborn (CARR) and Russia's military intelligence service, the GRU," said John Hultquist, chief analyst at Google Threat Intelligence Group, in a media statement. "CARR carried out cyberattacks on US and European critical infrastructure but hid behind this false persona." He added, "The GRU is increasingly leaning into willing accomplices to hide their own hand in destabilizing physical and cyberattacks in Europe and the US. It’s important that we never take an adversary’s word for it when they tell us who they are. They frequently lie." In conjunction with the advisory, the Department of Justice also announced two indictments in the Central District of California charging Ukrainian national Victoria Eduardovna Dubranova, 33, also known as Vika, Tory, and SovaSonya, for her actions supporting CARR and NoName057(16). Dubranova was extradited to the United States earlier this year.  How the Russian Hacktivist Attacks Work Related:SideWinder Espionage Campaign Expands Across Southeast Asia The attacks tend to all follow the same playbook: first, attackers scan for Internet-facing vulnerable devices with open VNC ports, then they use a temporary virtual private server (VPS) to execute password brute-forcing software.  Attackers then use VNC software to access hosts, confirm connections to the vulnerable device, brute-force the password, if required, and gain access to human-machine interface (HMI) devices, typically ones with default or weak passwords, or no passwords at all. Following this, threat actors log onto the vulnerable device using its IP address, port, and password; use the HMI graphical interface to capture screen recordings or intermittent screenshots; and modify various parameters, including usernames/passwords, device names, and instrument settings. They also disable alarms and create loss of view, which mandates local, hands-on operator intervention; additionally, they can shut down or restart devices. After causing disruption, attackers disconnect from the device, which ends the VNC connection, and proceed to research the target's other networks after the intrusion. So far the attacks have had "varying degrees of impact, including physical damage," according to the advisory. "Attacks have not yet caused injury; however, the attacks against occupied factories and community facilities demonstrate a lack of consideration for human safety," according to CISA. Related:Less Lucrative Ransomware Market Makes Attackers Alter Methods The incidents also can result in labor costs incurred from the need to hire an expert and/or technology to help restore operations, as well as costs associated with operational downtime or network remediation. Who Are the Critical Infrastructure Attackers? Though the groups are separate entities, they work together to reach a wider audience with online public support and by sharing tactics, techniques, and procedures (TTPs). "It is likely that these and similar groups will continue to iterate and share these methods to disrupt critical infrastructure organizations," according to CISA. Individually, however, the groups maintain distinct identities. CARR owes its creation to the Russian General Staff Main Intelligence Directorate (GRU) Main Center for Special Technologies (GTsST) military unit 74455, and also is known as "The People’s Cyber Army of Russia." It's been active since at least late February or early March of 2022, formed around the same time that Russia invaded Ukraine.  Indeed, this group supports Russia’s stance on the Ukrainian conflict and has claimed responsibility for distributed denial of service (DDoS) attacks against the US and Europe for supporting Ukraine. In late 2023, the group expanded operations to target industrial control systems (ICS), claiming attacks against a European wastewater treatment facility in October 2023 and intrusions at two US dairy farms the following month. Administrators from CARR and an administrator from NoName057 (16), unhappy with the level of support and funding from the GRU, in late September spun off from the original group to form the Z-Pentest group, which uses the same TTPs as CARR but without involvement from the GRU. This group "specializes in OT intrusion operations targeting globally dispersed critical infrastructure entities," according to CISA. Z-Pentest diverges from other pro-Russia hactivist groups by avoiding DDoS activities, and instead employs hack-and-leak operations and defacement attacks to gain further attention for their pro-Russia messaging, according to the advisory. NoName057 (16), active since March 2022, is a covert operation for the Center for the Study and Network Monitoring of the Youth Environment (CISM), which itself was established on behalf of the Kremlin. The group uses a proprietary DDoS tool, "DDoSia," that was paid for by senior executives and employees within CISM. These exectvies also funded the group’s network infrastructure, served as administrators on NoName057(16) Telegram channels, and selected DDoS targets. The newest of the group is Sector16, which formed in January 2025 in collaboration with Z-Pentest. The group, which may have received indirect support from the Russian government for conducting strategic cyber operations, maintains a public Telegram channel where they share videos, statements, and claims of compromising US energy infrastructure. These communications are in line with pro-Russia narratives, according to CISA.  Mitigation of Hacktivist Attacks on OT In recent years there have been numerous attacks on US critical infrastructure, and it's clear that US political adversaries are constantly looking for ways to disrupt various critical sectors through cyberattacks. These incidents not only can have significant business impact but also potentially devastating physical consequences on people's lives. In the meantime, this sector faces significant security challenges that warrant immediate attention to keep systems safe from intrusion. The CISA advisory includes various mitigations for OT asset owners and operators to help them avoid potentially disruptive or even destructive attacks. They include reducing the exposure of OT assets to the public-facing Internet; adopting mature asset-management processes; and ensuring OT assets use robust authentication procedures. Critical infrastructure providers also should enable control system security features that can separate and audit view and control functions to remove the potential for impact from an attack, as well as have comprehensive business-recovery and disaster-recovery plans in place should an attack occur, according to CISA. About the Author Elizabeth Montalbano Contributing Writer Elizabeth Montalbano is a freelance writer, journalist, and therapeutic writing mentor with more than 25 years of professional experience. Her areas of expertise include technology, business, and culture. Elizabeth previously lived and worked as a full-time journalist in Phoenix, San Francisco, and New York City; she currently resides in a village on the southwest coast of Portugal. In her free time, she enjoys surfing, hiking with her dogs, traveling, playing music, yoga, and cooking. More Insights Industry Reports Frost Radar™: Non-human Identity Solutions 2026 CISO AI Risk Report Cybersecurity Forecast 2026 The ROI of AI in Security ThreatLabz 2025 Ransomware Report Access More Research Webinars Building a Robust SOC in a Post-AI World Retail Security: Protecting Customer Data and Payment Systems Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need Securing Remote and Hybrid Work Forecast: Beyond the VPN AI-Powered Threat Detection: Beyond Traditional Security Models More Webinars Editor's Choice CYBERSECURITY OPERATIONS Why Stryker's Outage Is a Disaster Recovery Wake-Up Call byJai Vijayan MAR 12, 2026 5 MIN READ CYBER RISK What Orgs Can Learn From Olympics, World Cup IR Plans byTara Seals MAR 12, 2026 THREAT INTELLIGENCE Commercial Spyware Opponents Fear US Policy Shifting byRob Wright MAR 12, 2026 9 MIN READ Want more Dark Reading stories in your Google search results? 2026 Security Trends & Outlooks THREAT INTELLIGENCE Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats JAN 2, 2026 CYBER RISK Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult JAN 12, 2026 ENDPOINT SECURITY CISOs Face a Tighter Insurance Market in 2026 JAN 5, 2026 THREAT INTELLIGENCE 2026: The Year Agentic AI Becomes the Attack-Surface Poster Child JAN 30, 2026 Download the Collection Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. SUBSCRIBE Webinars Building a Robust SOC in a Post-AI World THURS, MARCH 19, 2026 AT 1PM EST Retail Security: Protecting Customer Data and Payment Systems THURS, APRIL 2, 2026 AT 1PM EST Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need WED, APRIL 1, 2026 AT 1PM EST Securing Remote and Hybrid Work Forecast: Beyond the VPN TUES, MARCH 10, 2026 AT 1PM EST AI-Powered Threat Detection: Beyond Traditional Security Models WED, MARCH 25, 2026 AT 1PM EST More Webinars White Papers Autonomous Pentesting at Machine Speed, Without False Positives Fixing Organizations' Identity Security Posture Best practices for incident response planning Industry Report: AI, SOC, and Modernizing Cybersecurity The Threat Prevention Buyer's Guide: Find the best AI-driven threat protection solution to stop file-based attacks. Explore More White Papers GISEC GLOBAL 2026 GISEC GLOBAL is the most influential and the largest cybersecurity gathering in the Middle East & Africa, uniting global CISOs, government leaders, technology buyers, and ethical hackers for three power-packed days of innovation, strategy, and live cyber drills. 📌 BOOK YOUR SPACE
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◉ Threat Intelligence
    Published
    Mar 19, 2026
    Archived
    Mar 19, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗