US Critical Infrastructure Hit by Pro-Russia Cyberattacks

▼ Summary
– Pro-Russia hacktivist groups are breaching operational technology systems by exploiting exposed virtual network computing connections across sectors like water, food, and energy.
– These groups use simple tools for reconnaissance and password-guessing to access internet-facing human-machine interfaces, leading to some physical impacts like loss of system view.
– The activity, while less advanced than state-sponsored attacks, is disruptive and often seeks online visibility, with groups sometimes overstating their incidents.
– Recommended defenses include reducing public internet access to OT assets, implementing strong authentication and network segmentation, and having contingency plans for manual operation.
– Organizations with exposed systems and weak credentials should assume compromise and respond immediately, as continued attacks could lead to more severe consequences.
A concerning wave of cyber intrusions targeting essential services in the United States has been linked to pro-Russia hacktivist collectives. These groups are exploiting poorly secured internet connections to breach operational technology systems, leading to tangible disruptions in sectors like water treatment, energy, and food production. A recent joint advisory from the Cybersecurity and Infrastructure Security Agency (CISA), the FBI, and the NSA details this surge in activity, noting that while the techniques are often basic, the consequences are real.
Organizations identified in the report, including Cyber Army of Russia Reborn (CARR), Z-Pentest, NoName057(16), and Sector16, are using simple tools to scan for exposed systems and guess common passwords. Their primary targets are internet-facing human-machine interfaces, which are gateways to industrial control systems. The advisory suggests these loosely organized groups have grown since 2022, with some receiving varying levels of support from Russian state-linked entities. Their collaboration is evident; CARR and NoName057(16) worked together before forming Z-Pentest in 2024, while Sector16 emerged through similar alliances in early 2025.
The motivation for these attacks often centers on gaining visibility and causing disruption rather than achieving a long-term strategic advantage. Groups frequently exaggerate their successes online. However, the physical impacts are not merely theoretical. In several incidents, operators experienced a temporary loss of visibility into their systems and faced costly manual recovery efforts after attackers altered operational parameters, disabled critical alarms, or forced device restarts.
To counter this threat, the advisory provides clear guidance for industrial operators. The foundational step is reducing public internet access to operational technology assets wherever possible. Strengthening authentication practices is equally critical; this includes implementing multi-factor authentication (MFA) and eliminating default or weak passwords. Other vital recommendations involve robust asset management to understand data flows, maintaining strict network segmentation and firewall policies, keeping software updated, and having contingency plans that allow for manual operation if digital systems are compromised.
The agencies stress that any organization discovering an exposed system with weak credentials should immediately assume a compromise has occurred and initiate their incident response procedures. While the current attacks are considered low-sophistication, the persistent nature of the activity raises the risk of more severe outcomes. A CISA executive emphasized the groups’ demonstrated intent to cause harm, stating, “In addition to implementing the recommended mitigations and rigorously validating their security controls, we are calling upon all OT device manufacturers to prioritize secure-by-design principles – because building in security from the start is essential to reducing risk and safeguarding the nation’s most vital systems.”
(Source: InfoSecurity Magazine)





