• Hello and welcome! Register to enjoy full access and benefits:

    • Advertise in the Marketplace section for free.
    • Get more visibility with a signature link.
    • Company/website listings.
    • Ask & answer queries.
    • Much more...

    Register here or log in if you're already a member.

  • 🎉 WHV has crossed 72000 (72k) monthly views (unique) and 272000 clicks per month, as per Google Analytics! Thank you for your support! 🎉

Amazon Blocks Russian GRU Hackers From Attacking Edge Network Devices

johny899

Member
Content Writer
Messages
1,064
Reaction score
3
Points
43
Balance
$115.7USD
Consider this for a moment: what happens when your entire network is compromised by someone who had gained unauthorized access? This is part of the goal of Russian military hackers known as GRU to hack this type of device. Amazon intervened to prevent these attacks, and they were able to do so very successfully.

Identify the Target​

The edge network devices is the area where hackers target their attacks. Edge network devices such as routers, VPN gateways, and firewalls are typical targets of attackers. These devices reside between an organisation's internal/private networks and the Internet, providing an entry point to the private network for any attacker controlling the edge devices.

This is the reason why so many attackers target edge devices.

What Methods Were Used to Compromise Devices?​

The Russian military hackers associated with the GRU were looking for those devices that had not been actively maintained by the company. After identifying a device that had not had recent security updates, they were able to execute their attack in a very stealthy manner.

The group's objectives were:
  • To penetrate routers & firewalls
  • To monitor data movement within networks
  • To exploit the access for intelligence gathering or future attacks
  • To maintain a low profile for extended periods
This approach creates challenges in detecting cyber criminals due to its mitigated pace and clandestine nature of operations.

How Amazon Fought Back​

In answer to this malicious activity, Amazon's security teams monitored hackers' online infrastructure. They blocked their malicious servers, disabled command and control systems, and prevented these hackers from maintaining control over compromised devices.

This response to cybercrime appeared to me to be proactive. Rather than waiting to receive damage reports, Amazon took measures early on in the introduction of these cybercriminals to eliminate or reduce the impact on many businesses.

Why This Matters Right Now​

It is important to take this into consideration at this point, as too many individuals still only view laptops and servers. They forget that cybercriminals never lose sight of the vulnerability of an entire network, including routers. Why do you think we continue to see hacking of edge devices? Because many of these devices continue to go without being patched.

Final Thoughts​

Overall, this event provides a very strong indications regarding the importance of an edge security model. It is essential to keep your devices up to date, change your default passwords, and regularly monitor for unusual activity. While Amazon's handling of this situation was indicative of an effective response. The security of our networks will only be successful if all of us continue to take the appropriate steps to enhance its safety and security.