Consider this for a moment: what happens when your entire network is compromised by someone who had gained unauthorized access? This is part of the goal of Russian military hackers known as GRU to hack this type of device. Amazon intervened to prevent these attacks, and they were able to do so very successfully.
This is the reason why so many attackers target edge devices.
The group's objectives were:
This response to cybercrime appeared to me to be proactive. Rather than waiting to receive damage reports, Amazon took measures early on in the introduction of these cybercriminals to eliminate or reduce the impact on many businesses.
Identify the Target
The edge network devices is the area where hackers target their attacks. Edge network devices such as routers, VPN gateways, and firewalls are typical targets of attackers. These devices reside between an organisation's internal/private networks and the Internet, providing an entry point to the private network for any attacker controlling the edge devices.This is the reason why so many attackers target edge devices.
What Methods Were Used to Compromise Devices?
The Russian military hackers associated with the GRU were looking for those devices that had not been actively maintained by the company. After identifying a device that had not had recent security updates, they were able to execute their attack in a very stealthy manner.The group's objectives were:
- To penetrate routers & firewalls
- To monitor data movement within networks
- To exploit the access for intelligence gathering or future attacks
- To maintain a low profile for extended periods
How Amazon Fought Back
In answer to this malicious activity, Amazon's security teams monitored hackers' online infrastructure. They blocked their malicious servers, disabled command and control systems, and prevented these hackers from maintaining control over compromised devices.This response to cybercrime appeared to me to be proactive. Rather than waiting to receive damage reports, Amazon took measures early on in the introduction of these cybercriminals to eliminate or reduce the impact on many businesses.