← Back to Archive

Russian GRU Shifts to Edge Device Exploits as FortiGate Attacks Escalate; Venezuelan Oil Giant PDVSA Hit by Cyberattack

Critical Infrastructure Intelligence Briefing

Date: Wednesday, December 17, 2025

Reporting Period: December 10-17, 2025


1. Executive Summary

Major Developments

  • Russian GRU Campaign Exposed: Amazon's threat intelligence team has disclosed a multi-year Russian state-sponsored campaign (2021-2025) targeting Western critical infrastructure, with a notable tactical shift from zero-day exploitation to targeting misconfigured network edge devices. This represents a significant evolution in nation-state threat actor TTPs.
  • Active Exploitation of Fortinet Devices: Threat actors are actively exploiting recently disclosed authentication bypass vulnerabilities in Fortinet FortiGate devices, with credential theft and configuration file exfiltration observed less than one week after public disclosure.
  • Energy Sector Attack: Venezuela's state-owned oil company PDVSA suffered a cyberattack over the weekend that disrupted export operations, demonstrating continued targeting of energy sector critical infrastructure.
  • Supply Chain Security Concerns: Multiple incidents highlight growing third-party risks, including the LKQ auto parts Oracle EBS breach affecting thousands of individuals and malicious packages discovered in software repositories.
  • Policy Developments: NIST released draft guidelines for incorporating AI into operations while mitigating cybersecurity risks, and the outgoing GAO chief warned against reducing CISA's capabilities amid ongoing threats.

Immediate Action Items

  • Audit and patch all Fortinet FortiGate devices immediately
  • Review network edge device configurations for misconfigurations
  • Assess third-party software dependencies and supply chain security
  • Verify JumpCloud Remote Assist installations are updated

2. Threat Landscape

Nation-State Threat Actor Activities

Russian GRU Operations (APT28/Sandworm)

Amazon's threat intelligence team has revealed details of a "years-long" Russian state-sponsored campaign targeting Western critical infrastructure between 2021 and 2025. Key findings include:

  • Tactical Evolution: Russian state-sponsored actors have shifted from exploiting zero-day and n-day vulnerabilities to focusing on misconfigured network edge devices
  • Target Profile: Energy infrastructure and cloud services are primary targets
  • Attribution: Activity linked to Russia's military intelligence agency (GRU)
  • Current Status: Amazon has disrupted active operations targeting customers' cloud infrastructure

Source: SecurityWeek, The Hacker News, CyberScoop

Chinese APT Activity

China's "Ink Dragon" threat group has been identified hiding within European government networks to conduct espionage operations. This activity demonstrates continued nation-state interest in leveraging trusted infrastructure for persistent access.

Source: Infosecurity Magazine

Ransomware and Cybercriminal Developments

RansomHouse Operations

  • Askul Corporation: Japanese e-commerce giant confirmed theft of approximately 740,000 customer records in an October ransomware attack attributed to RansomHouse
  • Impact: Logistics and supply chain operations affected

Source: SecurityWeek, Bleeping Computer

Cryptocurrency-Focused Campaigns

  • AWS Crypto Mining: Ongoing campaign using compromised IAM credentials to enable cryptocurrency mining on AWS infrastructure
  • Malicious NuGet Package: Typosquatting attack impersonating Tracer.Fody library to steal cryptocurrency wallet data

Emerging Attack Vectors

Malicious Browser Extensions

The "GhostPoster" campaign has compromised 17 Firefox add-ons with over 50,000 downloads, embedding malicious JavaScript in logo files to:

  • Hijack affiliate links
  • Inject tracking code
  • Monitor browser activity
  • Plant backdoors

Source: The Hacker News, Bleeping Computer

Android Malware-as-a-Service

New "Cellik" Android MaaS offering robust capabilities including the ability to embed malicious code in legitimate Google Play applications.

Source: Bleeping Computer

Parked Domain Exploitation

Research indicates the vast majority of parked domains (expired or unused) are now serving malicious content, increasing risks associated with direct navigation and typosquatting.

Source: KrebsOnSecurity

Pro-Russia Hacktivist Threats

A joint advisory has flagged ongoing pro-Russia hacktivist threats to critical infrastructure, highlighting the convergence of ideologically motivated actors with state interests.

Source: Homeland Security Today


3. Sector-Specific Analysis

Energy Sector

PDVSA Cyberattack (Venezuela)

Incident: Petróleos de Venezuela (PDVSA), Venezuela's state-owned oil company, suffered a cyberattack over the weekend of December 14-15, 2025.

  • Impact: Export operations disrupted
  • Attribution: Not yet determined
  • Significance: Demonstrates continued targeting of oil and gas infrastructure

Source: Bleeping Computer

Russian Targeting of Energy Infrastructure

Amazon's disclosure confirms energy sector was a primary target of the multi-year GRU campaign. Organizations should:

  • Review edge device configurations
  • Audit cloud infrastructure access controls
  • Implement enhanced monitoring for lateral movement

Communications & Information Technology

SoundCloud Security Breach

Audio streaming platform SoundCloud confirmed a security breach affecting approximately 20% of users:

  • Impact: User database stolen, VPN access disrupted
  • Data Exposed: Personal information of affected users
  • Status: Investigation ongoing

Source: SecurityWeek, Bleeping Computer

Urban VPN Privacy Concerns

The Urban VPN Proxy browser extension has been caught harvesting users' AI chat conversations, raising significant privacy and security concerns for organizations using AI tools.

Source: Infosecurity Magazine, CSO Online

Transportation Systems

Auto Parts Supply Chain Breach

LKQ Corporation, a major auto parts distributor, confirmed an Oracle EBS breach:

  • Impact: Personal information of thousands of individuals compromised
  • Significance: Supply chain implications for automotive sector

Source: SecurityWeek

Software Failure Analysis

CSO Online published analysis of a software failure that grounded 6,000 jets, providing lessons learned for transportation sector resilience planning.

Source: CSO Online

Financial Services

Credit700 Data Breach

US financial services firm Credit700 disclosed a major data breach:

  • Records Affected: 5.8 million individuals
  • Data Type: Financial and personal information related to car ownership
  • Sector Impact: Auto financing and credit services

Source: Infosecurity Magazine

FTC Cryptocurrency Enforcement

Illusory Systems settled with the FTC over a 2022 cryptocurrency hack, charged with materially misrepresenting cybersecurity of its Token Bridge software.

Source: CyberScoop

Healthcare & Public Health

No major sector-specific incidents reported this period. However, organizations should remain vigilant given:

  • Holiday season historically sees increased ransomware activity
  • Third-party software risks affecting all sectors
  • Phishing campaigns exploiting holiday themes

Government Facilities

European Government Network Compromise

Chinese Ink Dragon APT group identified operating within European government networks, using trusted infrastructure to mask espionage activities.

German Bundestag Internet Outage

Internet outage at the German Bundestag was determined to likely not be a cyberattack, though investigation continues.

Source: CSO Online


4. Vulnerability & Mitigation Updates

Critical Vulnerabilities Requiring Immediate Attention

Fortinet FortiGate Authentication Bypass (CRITICAL)

Status: ACTIVELY EXPLOITED

  • Vulnerability: SAML SSO authentication bypass affecting multiple Fortinet products
  • Exploitation Timeline: Less than one week after public disclosure
  • Observed Activity: Credential theft, system configuration file exfiltration
  • Affected Products: FortiGate firewalls and related Fortinet products

Recommended Actions:

  1. Apply available patches immediately
  2. Review authentication logs for suspicious activity
  3. Rotate administrative credentials
  4. Verify configuration integrity
  5. Implement network segmentation to limit lateral movement

Source: The Hacker News, Bleeping Computer, CSO Online

JumpCloud Remote Assist Privilege Escalation

Severity: HIGH

  • Impact: Allows attackers to write arbitrary data to any file or delete arbitrary files to obtain System privileges
  • Affected Component: JumpCloud Windows Agent
  • Attack Vector: Local privilege escalation and denial-of-service

Recommended Actions:

  1. Update JumpCloud Remote Assist to latest version
  2. Audit managed endpoints for signs of exploitation
  3. Review local user privileges

Source: SecurityWeek, Infosecurity Magazine

React2Shell Vulnerability

Status: ACTIVELY EXPLOITED

  • Exploitation: Being used to deploy Linux backdoors including KSwapDoor and ZnDoor
  • Research: Documented by Palo Alto Networks Unit 42 and NTT

Source: The Hacker News

Configuration-Based Vulnerabilities

Network Edge Device Misconfigurations

Amazon's research highlights that Russian APT groups are now prioritizing misconfigured network edge devices over traditional vulnerability exploitation:

  • Target Devices: Routers, firewalls, VPN concentrators, load balancers
  • Common Issues: Default credentials, exposed management interfaces, improper access controls

Recommended Actions:

  1. Conduct comprehensive audit of all edge device configurations
  2. Disable unnecessary services and protocols
  3. Implement strong authentication for management access
  4. Ensure management interfaces are not internet-accessible
  5. Enable logging and forward to SIEM

Platform Security Updates

Microsoft Exchange Online

Microsoft announced it will soon block mobile devices running outdated email software from accessing Exchange Online services. Organizations should:

  • Inventory mobile devices accessing Exchange Online
  • Ensure all devices meet minimum software requirements
  • Communicate update requirements to users

Source: Bleeping Computer


5. Resilience & Continuity Planning

Lessons Learned

Hypervisor Security

Huntress has published analysis on why hypervisors are becoming primary ransomware targets:

  • Risk: Single breach can encrypt dozens of virtual machines simultaneously
  • Impact: Maximizes attacker leverage and disruption

Recommendations:

  1. Implement dedicated security controls for hypervisor infrastructure
  2. Segment hypervisor management networks
  3. Maintain offline backups of VM configurations
  4. Develop specific incident response procedures for hypervisor compromise

Source: Bleeping Computer

Ransomware Playbook Development

CSO Online published guidance on creating effective ransomware playbooks, emphasizing:

  • Pre-incident preparation and tabletop exercises
  • Clear decision trees for response actions
  • Communication protocols for stakeholders
  • Recovery prioritization frameworks

Source: CSO Online

Supply Chain Security

Third-Party Risk Evolution

SecurityWeek analysis highlights growing third-party risks from:

  • Open source library dependencies
  • AI-powered coding assistants introducing vulnerabilities
  • Speed-driven development practices

Recommendations:

  1. Implement software composition analysis (SCA) tools
  2. Establish AI code review processes
  3. Maintain software bill of materials (SBOM)
  4. Conduct regular third-party security assessments

Source: SecurityWeek

Cross-Sector Dependencies

Global Critical Infrastructure Risk Analysis

New analysis from Homeland Security Today highlights growing risks to globally critical infrastructure, emphasizing:

  • Interconnected nature of modern infrastructure
  • Cascading failure potential
  • Need for cross-sector coordination

Source: Homeland Security Today

Real-Time Crime Center Model

Security Magazine profiled New Orleans' Real Time Crime Center, offering insights for critical infrastructure operators on:

  • 24/7 monitoring operations
  • Data fusion from multiple sources (video, CAD, LPR)
  • Governance frameworks for surveillance technologies

Source: Security Magazine


6. Regulatory & Policy Developments

Federal Guidelines

NIST AI Cybersecurity Guidelines

NIST has released draft guidelines to help organizations incorporate AI into operations while mitigating cybersecurity risks. Key elements include:

  • Risk assessment frameworks for AI integration
  • Security controls for AI systems
  • Guidance on AI-specific threat vectors

Action: Organizations should review draft guidelines and submit comments during the public comment period.

Source: NIST

SEC AI Disclosure Rule

CSO Online analysis examines the proposed SEC AI disclosure rule, noting that implementation details will significantly impact compliance requirements for publicly traded companies.

Source: CSO Online

Legislative Developments

Cyber Information Sharing Law

House Homeland Security Chairman Andrew Garbarino (R-N.Y.) indicated Congress will likely extend rather than comprehensively update the cyber information sharing law. Key discussion points included:

  • Salt Typhoon threat response
  • Regulatory approaches to cybersecurity
  • Cyber workforce development

Source: CyberScoop

CISA Workforce Concerns

Outgoing GAO Chief Gene Dodaro warned against "taking our foot off the gas" at CISA, emphasizing the importance of maintaining cybersecurity capabilities amid ongoing threats.

Source: CyberScoop

Federal Technology Initiatives

Tech Force Establishment

The federal government has established a "Tech Force" to support AI and technology modernization efforts across agencies.

Source: Homeland Security Today

Enforcement Actions

FTC Cryptocurrency Security Enforcement

The FTC settlement with Illusory Systems establishes precedent for enforcement against companies that misrepresent cybersecurity capabilities, particularly in cryptocurrency and blockchain sectors.

Source: CyberScoop

Texas Privacy Enforcement

Texas Attorney General sued five major television manufacturers for allegedly collecting user data through Automated Content Recognition (ACR) technology without proper consent.

Source: Bleeping Computer


7. Training & Resource Spotlight

New Tools and Frameworks

Cloud Access Security Broker (CASB) Guidance

CSO Online published a comprehensive CASB buyer's guide for organizations evaluating cloud security solutions:

  • Key capabilities to evaluate
  • Integration considerations
  • Deployment models

Source: CSO Online

Vulnerability Management Innovation

Startup Dux emerged from stealth with $9 million in funding, offering an agentic approach to preventing vulnerability exploitation by uncovering exposure across assets.

Source: SecurityWeek

Best Practices

CISO Community Engagement

SecurityWeek highlights the value of closed CISO communities as:

  • Information exchange platforms
  • Advice centers for emerging challenges
  • Safe havens from critical oversight
  • Pressure valves for security leadership stress

Source: SecurityWeek

Human Oversight in AI Systems

Security Magazine emphasizes that human oversight remains the critical factor in determining when generative AI becomes enterprise-grade, with implications for:

  • AI governance frameworks
  • Security review processes
  • Risk management approaches

Source: Security Magazine

Data Security in Code

The Hacker News published guidance on why data security and privacy need to start in the code development phase, particularly relevant given AI-assisted coding proliferation.

Source: The Hacker News

Industry Funding and Investment

  • Echo: Raised $35 million in Series A funding (less than six months after seed round)
  • Verisoul: Raised $8.8 million for fraud prevention solutions
  • Dux: Emerged with $9 million for vulnerability management

Service Discontinuations

Google Dark Web Report: Google announced discontinuation of its dark web monitoring tool in February 2026. Organizations relying on this service should identify alternative monitoring solutions.

Source: The Hacker News, Bleeping Computer


8. Looking Ahead: Upcoming Events & Considerations

Heightened Threat Periods

Holiday Season Security Considerations (December 17, 2025 - January 2, 2026)

  • Ransomware Risk: Historically elevated ransomware activity during holiday periods when staffing is reduced
  • Phishing Campaigns: Check Point has detected thousands of phishing emails offering fake promotions and special deals
  • Reduced Response Capacity: Ensure incident response coverage during holiday schedules

Recommendations:

  1. Verify incident response team availability
  2. Pre-position backup and recovery resources
  3. Communicate security awareness to employees
  4. Test backup restoration procedures

Regulatory Milestones

NIST AI Guidelines Comment Period

Organizations should prepare comments on draft NIST AI cybersecurity guidelines during the public comment period.

Microsoft Exchange Online Device Requirements

Prepare for upcoming enforcement of mobile device software requirements for Exchange Online access.

Anticipated Developments

Congressional Action

  • Cyber information sharing law extension expected
  • Continued Salt Typhoon response discussions
  • CISA budget and workforce deliberations

Threat Actor Activity

  • Continued Russian APT targeting of edge devices expected
  • Potential escalation of FortiGate exploitation
  • Holiday-themed social engineering campaigns

Security Awareness Dates

  • February 2026: Google Dark Web Report discontinuation - plan for alternative monitoring

Key Takeaways for Critical Infrastructure Operators

Priority Action Item Sector Impact
CRITICAL Patch Fortinet FortiGate devices immediately All sectors using Fortinet products
CRITICAL Audit network edge device configurations All sectors, especially Energy
HIGH Update JumpCloud Remote Assist Organizations using JumpCloud
HIGH Review third-party software dependencies All sectors
MEDIUM Prepare for holiday threat period All sectors
MEDIUM Review AI integration security controls All sectors adopting AI

This intelligence briefing is derived from open-source reporting and is intended to support critical infrastructure protection efforts. Recipients are encouraged to verify information through official channels and adapt recommendations to their specific operational environments.

Report Prepared: Wednesday, December 17, 2025

Next Scheduled Briefing: Thursday, December 18, 2025

Disclaimer

This briefing is generated using AI analysis of public news sources. Always verify critical information through authoritative sources before taking action.