Sumtrix
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
No Result
View All Result
Home Cyber

Uncovering GRU Tactics: Hacking IP Cameras and Targeting Logistics in Ukraine Aid

by Jane Doe
May 23, 2025
in Cyber
A A
0
Share on FacebookShare on Twitter

The Russian General Staff Main Intelligence Directorate (GRU)-leveraged Unit 26165 of the 85th Main Special Service Center (GTsSS), military unit 26165, and APT28 is behind a massive, ongoing hacking campaign, according to a new joint cyber security advisory from several European allies together with the United States and United Kingdom.

At least since 2022, the campaign targeted Western logistics and technology firms providing transportation and delivery of aid to Ukraine.

The GRU hackers uses a variety of methods to crack their way into the targeted organization including spearphishing campaigns, credential guessing attacks, exploitation of software vulns in products like Microsoft Outlook and WinRAR, and the tricking of staff into installing custom malware.

Critically, the advisory makes note of the group’s attempts to infiltrate live feeds from internet-connected cameras—both personal devices and public traffic monitoring cameras, in close proximity to key transportation locations like Ukrainian border crossings, military sites and rail stations. More than 10,000 cameras, mainly in Ukraine but also in neighbouring Poland and Romania, are believed to have been affected.

Read Also

Global Connected Car Regulations Analysis Report 2025: Focus on Cybersecurity and Data Privacy

Black Hat SEO Poisoning Search Engine Results For AI

By hacking these IP cameras, the GRU sought to monitor and track the transportation of aid shipments that entered Ukraine, collecting intelligence on the type, volume, and timing of aid deliveries. This intelligence information might be used to enhance battle strategies, coordinate physical attacks on supply lines, or further cyber actions aimed at the delivery network.

“It’s the same shit,” as Robert Lee put it to me, and “same shit” is rarely an uninteresting thing to disseminate, because it tends to get effective results. The report also serves as a reminder of the ongoing nature of this threat and appears aimed at encouraging organizations working on the ground to invest in their own cybersecurity defenses.

Best practices to mitigate this threat are becoming even more important and include the following: deploy zero-trust architectures, keep all systems and software up-to-date and patched, disable all remote access that is not necessary, secure all IP cameras with strong credentials, firewall devices and remain monitoring for anomalous network-based reconnaissance.

This revelation brings out the multiphased character of Russia’s aggression against Ukraine-from a physical battlefield to a cyber domain. The focusing on logistical supply lines emphasizes the importance of Western aid to Ukraine’s defense and Russia’s steadfastness in interfering with that support.

Cybersecurity specialists caution that such espionage efforts will persist, and further vigilance and preventative measures will be needed by all those involved.

Jane Doe

You May Also Likes!

Iranian-backed hackers go to work after U.S. strikes
Cyber

Cyber is now the third-largest economy in the world – June 2025 Report

by Jane Doe
June 25, 2025
Iranian-backed hackers go to work after U.S. strikes
Cyber

DHS warns of heightened cyber threat as US enters Iran conflict

by Jane Doe
June 25, 2025
Iranian-backed hackers go to work after U.S. strikes
Cyber

Leak of data belonging to 7.4 million Paraguayans traced back to infostealers

by Jane Doe
June 25, 2025
Iranian-backed hackers go to work after U.S. strikes
Cyber

Billions of login credentials have been leaked online, Cybernews researchers say

by Jane Doe
June 25, 2025
Iranian-backed hackers go to work after U.S. strikes
Cyber

Global cyber alert: Iranian hackers strike U.S. banks, defence and oil firms

by Jane Doe
June 25, 2025
Load More

Recommended

Enhance Your Cybersecurity on World Environment Day with KnowBe4’s Expert Guide

Enhance Your Cybersecurity on World Environment Day with KnowBe4’s Expert Guide

June 5, 2025
AI Security Risks Are Not Theoretical: They’re Happening Now

AI Security Risks Are Not Theoretical: They’re Happening Now

May 27, 2025
New Windows RAT Exploits Corrupted Headers for Stealthy Evasion

New Windows RAT Exploits Corrupted Headers for Stealthy Evasion

May 31, 2025
Hacking AI the Right Way: A Guide to AI Red Teaming

Hacking AI the Right Way: A Guide to AI Red Teaming

May 27, 2025
Iranian-backed hackers go to work after U.S. strikes

Global Connected Car Regulations Analysis Report 2025: Focus on Cybersecurity and Data Privacy

June 25, 2025
Iranian-backed hackers go to work after U.S. strikes

Black Hat SEO Poisoning Search Engine Results For AI

June 25, 2025
Iranian-backed hackers go to work after U.S. strikes

Cyber is now the third-largest economy in the world – June 2025 Report

June 25, 2025
Iranian-backed hackers go to work after U.S. strikes

DHS warns of heightened cyber threat as US enters Iran conflict

June 25, 2025
Sumtrix.com

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Navigate Site

  • About
  • Contact
  • Privacy Policy
  • Advertise

Follow Us

No Result
View All Result
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Our website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.