Russia's Sandworm Pivots: Why Misconfigured Edge Devices Are Now the Primary Target for Critical Infrastructure Attacks

Russia's Sandworm Pivots: Why Misconfigured Edge Devices Are Now the Primary Target for Critical Infrastructure Attacks
Photo by American Public Power Association / Unsplash

Bottom Line Up Front: Amazon's threat intelligence team has exposed a critical evolution in Russian state-sponsored cyber operations: APT44 (Sandworm) has shifted from expensive zero-day exploitation to targeting misconfigured network edge devices as their primary attack vector against Western energy and critical infrastructure. This tactical pivot—tracked across a four-year campaign from 2021 to 2025—represents not a failure of vulnerability management but rather proof that traditional security defenses are working. The troubling reality: configuration security has been treated as "operational housekeeping" when it should be a critical security control equivalent to patch management.

Fortinet Under Fire: How Firewall Vulnerabilities Are Devastating Healthcare and Critical Infrastructure
A comprehensive analysis of Fortinet’s exploitation crisis and why hospitals keep getting hit Executive Summary While the cybersecurity world focused on SonicWall’s troubles, Fortinet products have quietly become one of the most frequently exploited attack vectors in modern ransomware campaigns—with healthcare bearing the brunt of the damage. With 20

The Four-Year Evolution: From Zero-Days to Zero-Config

Amazon's MadPot honeypot network detected a systematic evolution in Sandworm's tactics that reveals strategic thinking worthy of military intelligence operations. The timeline tells a story of adaptation under pressure:

2021-2022: Exploitation of CVE-2022-26318 affecting WatchGuard firewalls, combined with early reconnaissance of misconfigured devices

2022-2023: Expanded to Confluence vulnerabilities (CVE-2021-26084, CVE-2023-22518) while maintaining focus on configuration weaknesses

2024: Shifted to Veeam vulnerabilities (CVE-2023-27532) while increasing investment in misconfiguration targeting

2025: Sustained focus on misconfigured customer network edge devices with notable decline in N-day and zero-day exploitation

This isn't random opportunism—it's calculated resource optimization by sophisticated adversaries who recognized that defense organizations are getting better at vulnerability management.

Cisco Under Siege: How Akira Ransomware and Nation-State Actors Are Exploiting America’s Most Critical Network Infrastructure
$244 Million in Ransoms, Chinese APT Groups, and Why Federal Agencies Can’t Keep Cisco Firewalls Patched Executive Summary While Fortinet and SonicWall have garnered attention for their exploitation crises, Cisco networking equipment—deployed in virtually every major enterprise, government agency, and critical infrastructure organization—has become ground zero for both

Why Configuration Beats Exploitation: The Economics of State-Sponsored Hacking

Aaron Beardslee from Securonix crystallized the strategic logic: "Security teams have gotten dramatically better at vulnerability management, patch cycles have compressed from months to weeks, cyber protection platforms now catch exploitation artifacts reliably."

The result? Traditional exploitation now requires:

  • More resources: Finding and weaponizing zero-days costs millions
  • Higher detection risk: Exploitation artifacts trigger modern EDR/XDR platforms
  • Diminishing returns: Threat intelligence sharing means exploits have shorter useful lifespans

Meanwhile, misconfigured edge devices offer:

  • Persistent access: Devices often remain unchanged for months or years
  • Lower detection rates: Configuration errors don't trigger signature-based detection
  • Reduced operational expenditure: No need to purchase exploits or develop custom tooling
  • Strategic positioning: Network edge placement enables passive credential harvesting

CJ Moses, Amazon's CISO, confirmed that the compromise pattern wasn't due to AWS weaknesses but "customer misconfigured devices" hosted on the platform—a critical distinction that shifts responsibility squarely to organizational security practices.

The Attack Pattern: Passive Collection at Scale

Amazon's telemetry revealed a sophisticated three-phase operation:

Phase 1: Initial Compromise

GRU operators targeted customer network edge devices hosted on AWS infrastructure, including:

  • Enterprise routers and routing infrastructure
  • VPN concentrators and remote access gateways
  • Network management appliances
  • Collaboration and wiki platforms (likely referring to earlier Confluence exploitation)
  • Cloud-based project management systems

Phase 2: Credential Harvesting

Unlike active credential theft, the time gap between device compromise and authentication attempts suggests passive information collection through packet capture and traffic analysis. The threat actors positioned themselves strategically on the network edge to intercept:

  • User authentication traffic in transit
  • Domain credentials (not device credentials)
  • Sensitive information flowing through compromised infrastructure

Phase 3: Lateral Movement

Harvested credentials were systematically replayed against victim organizations' online services. While Amazon noted that observed replay attempts were unsuccessful, the pattern demonstrates clear intent: compromise edge infrastructure, extract valid credentials, gain persistent access to target networks.

Critical Alert: Cybercriminals Actively Exploiting Vulnerabilities in Fortinet, Cisco, VMware, and WatchGuard Systems
Executive Summary Organizations worldwide face an unprecedented wave of actively exploited vulnerabilities affecting critical network infrastructure from major cybersecurity vendors. As of November 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added multiple high-severity vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, with threat actors demonstrating sophisticated

Sectors Under Siege: The Energy-Focused Campaign

Amazon researchers documented actor infrastructure accessing authentication endpoints for multiple critical sectors throughout 2025:

Primary Targets:

  • Electric utility organizations
  • Energy providers
  • Managed security service providers specializing in energy sector clients

Secondary Targets:

  • Technology and cloud services (collaboration platforms, source code repositories)
  • Telecommunications providers across multiple regions

The sustained focus on energy sector supply chains—including both direct operators and third-party service providers—mirrors Sandworm's historical pattern of targeting critical infrastructure, particularly in Ukraine where the group caused the first-ever confirmed cyber-induced power outages in 2015-2016.

The Curly COMrades Connection: Operational Compartmentalization

Amazon identified infrastructure overlap with operations Bitdefender tracks as "Curly COMrades," suggesting potential operational division within the broader GRU campaign:

Curly COMrades Focus: Post-compromise tradecraft including:

  • Hyper-V abuse for EDR evasion
  • Custom implants (CurlyShell and CurlCat)
  • Host-based persistence mechanisms

Sandworm/APT44 Focus:

  • Initial access vectors
  • Cloud pivot methodology
  • Network edge exploitation

This compartmentalization aligns with GRU operational patterns where specialized subclusters support broader campaign objectives—a structure that provides operational security while enabling coordinated multi-phase operations.

Sandworm's Legacy: From NotPetya to Network Misconfigurations

To understand the significance of this tactical evolution, consider Sandworm's track record as arguably the most destructive state-backed APT in history:

  • 2015-2016: BlackEnergy malware attacks caused power outages affecting hundreds of thousands in Ukraine—the first confirmed blackouts from cyber attack
  • 2017: NotPetya ransomware caused $10+ billion in global damages, making it the most expensive cyber attack to date
  • 2018: Olympic Destroyer targeted the Winter Olympics with sophisticated wiper malware
  • 2022-Present: Continued operations against Ukrainian critical infrastructure including deployment of AcidPour and other wiper families

The group's willingness to cause widespread collateral damage—NotPetya affected global shipping (Maersk: $200-300M), pharmaceuticals (Merck: $310M), and consumer goods (Mondelez: $150M)—demonstrates that economic disruption serves Russian strategic interests even beyond primary targets.

Check Point’s Zero-Day Paradox: The Security Company That Couldn’t Secure Itself
How the firm documenting 2025’s 47% attack surge became a victim of its own research—and why CVE-2024-24919 reveals systemic firewall vendor failures Executive Summary In a stunning display of irony, Check Point Software—the cybersecurity vendor that publishes the industry’s most comprehensive threat intelligence reports—suffered a critical zero-day

The Critical Vulnerability: Configuration as Code

The core issue isn't technological—it's organizational. Configuration management has been relegated to operational maintenance when it should be elevated to the same priority as patch management and vulnerability remediation.

Common Misconfigurations Exploited:

  • Exposed management interfaces accessible from the internet
  • Default credentials and passwords unchanged from factory settings
  • Unnecessary services, protocols, and ports left enabled
  • Lack of phishing-resistant multi-factor authentication on edge devices
  • Insufficient network segmentation isolating edge devices from internal assets
  • Missing or inadequate logging and monitoring configurations
  • Delayed or absent firmware updates

As CISA's recent guidance emphasizes, organizations must:

  1. Create baseline configuration documents for all edge device deployments
  2. Disable unneeded services, protocols, and ports by default
  3. Change default usernames and passwords before deployment
  4. Implement out-of-band management networks for administrative access
  5. Enforce phishing-resistant MFA where edge devices have internet-exposed interfaces
  6. Maintain centralized logging with TLS 1.2+ encryption and mutual certificate authentication
  7. Conduct configuration audits quarterly at minimum

Defender's Playbook: Treating Configuration as Security

The shift to misconfiguration exploitation isn't evidence of security program failure—paradoxically, it's proof that vulnerability management programs are working. Defenders have made traditional exploitation expensive and risky enough that sophisticated adversaries adapted.

Marquis Ransomware Breach: When Third-Party Vendors Become the Weakest Link in Financial Services
A comprehensive analysis of the August 2025 attack that exposed nearly 800,000 bank and credit union customers Executive Summary In August 2025, Marquis Software Solutions, a Texas-based financial technology vendor serving over 700 banks and credit unions, fell victim to a sophisticated ransomware attack that compromised the personal and

Immediate Actions:

  1. Inventory and Assess:
    • Catalog all network edge devices (firewalls, VPN concentrators, routers, network management appliances)
    • Document current configurations and identify deviations from secure baselines
    • Identify devices with internet-exposed management interfaces
  2. Harden Configurations:
    • Implement CISA/NSA edge device security guidance
    • Deploy phishing-resistant MFA for all remote access
    • Enforce least-privilege access policies
    • Disable unused features and close unnecessary ports
  3. Enhance Visibility:
    • Deploy centralized logging for edge devices using encrypted channels
    • Monitor for authentication anomalies and credential replay attempts
    • Implement network traffic analysis to detect passive collection activities
    • Establish baselines for normal edge device behavior
  4. Continuous Validation:
    • Schedule quarterly configuration audits against security baselines
    • Automate configuration compliance checking where possible
    • Include edge device compromise scenarios in incident response exercises
    • Test restoration procedures from known-good configurations

Strategic Considerations:

  • Defense in Depth: Assume edge device compromise and architect networks accordingly
  • Vendor Diversification: Consider different vendors for edge device functions to reduce supply chain risks
  • Supply Chain Security: Evaluate third-party service providers' edge device security practices
  • Threat Intelligence Integration: Monitor for indicators of Sandworm/APT44 infrastructure and TTPs

The Geopolitical Context: Energy Security as National Security

The sustained targeting of Western energy infrastructure occurs against a backdrop of escalating cyber operations between Russia and Western nations. The energy sector focus isn't coincidental—it reflects strategic interest in capabilities that could:

  • Disrupt energy production and distribution during geopolitical crises
  • Conduct reconnaissance for future operations
  • Establish persistent access for contingency operations
  • Demonstrate cyber capabilities as deterrent messaging

For energy sector organizations and their service providers, this means elevating cybersecurity from compliance requirement to operational imperative. The threat isn't theoretical—it's actively targeting your infrastructure right now.

The Firewall Crisis: A CISO’s Guide to Understanding Why America’s Network Perimeter Is Collapsing
Executive Summary The network perimeter is dead—and firewall vendors killed it. Between 2021 and 2025, the four dominant enterprise firewall vendors—SonicWall, Fortinet, Cisco, and Check Point—have collectively contributed 50+ vulnerabilities to CISA’s Known Exploited Vulnerabilities (KEV) catalog. These aren’t theoretical risks. They’re actively exploited attack vectors that

Conclusion: Configuration Security Is Critical Security

Amazon's disclosure represents a watershed moment in our understanding of advanced persistent threat evolution. The lesson isn't that zero-day exploitation has disappeared—it's that defenders have made it expensive enough that even well-resourced nation-state actors are pivoting to easier targets.

The troubling reality is that many organizations have invested heavily in vulnerability management, threat intelligence platforms, and advanced detection systems while treating configuration security as an afterthought. Default passwords, exposed management interfaces, and lack of proper segmentation remain endemic across enterprise networks.

As CJ Moses emphasized in Amazon's guidance: "Going into 2026, organizations must prioritize securing their network edge devices and monitoring for credential replay attacks to defend against this persistent threat."

The Sandworm campaign proves that configuration security can no longer be treated as operational housekeeping. It must be elevated to a critical security control with the same rigor, resources, and executive attention as vulnerability management.

Because while defenders celebrated their success in making exploitation harder, adversaries simply found the unlocked door.


Indicators of Compromise and Defensive Resources:

Organizations should review Amazon's full technical report for specific indicators of compromise and implement the multi-national edge device security guidance released by CISA and international cybersecurity authorities.

This analysis builds on our previous coverage of nation-state cyber operations targeting critical infrastructure and major cyberattacks affecting global organizations.

Read more