Categories: Cyber Security News

Russian Hackers Exploiting 7-Year-Old Cisco Vulnerability to Collect Configs from Industrial Systems

A Russian state-sponsored cyber espionage group designated as Static Tundra has been actively exploiting a seven-year-old vulnerability in Cisco networking devices to steal configuration data and establish persistent access across critical infrastructure networks.

The sophisticated threat actor, linked to Russia’s Federal Security Service (FSB) Center 16 unit, has been targeting unpatched and end-of-life network devices since 2015, with operations significantly escalating following the Russia-Ukraine conflict.

Sponsored

The campaign centers around CVE-2018-0171, a previously disclosed vulnerability in Cisco IOS software’s Smart Install feature that allows unauthenticated remote attackers to execute arbitrary code or trigger denial-of-service conditions.

Despite Cisco issuing patches in 2018, Static Tundra continues to find success exploiting organizations that have failed to apply security updates or are running legacy devices beyond their support lifecycle.

Static Tundra’s victims span telecommunications, higher education, and manufacturing sectors across North America, Asia, Africa, and Europe.

The group demonstrates remarkable persistence, maintaining access to compromised environments for multiple years without detection.

Cisco Talos analysts identified the threat cluster through ongoing analysis of sophisticated network device compromises, noting the group’s advanced knowledge of network infrastructure and deployment of bespoke exploitation tools.

Attack Methodology and Configuration Exfiltration

Static Tundra employs a methodical approach to configuration theft, beginning with automated exploitation of the Smart Install vulnerability against predetermined target lists likely gathered from public scanning services like Shodan or Censys.

Upon successful exploitation, the attackers immediately modify the running configuration to enable local Trivial File Transfer Protocol (TFTP) services using the command:-

Sponsored
tftp-server nvram:startup-config

This command creates a temporary TFTP server that allows Static Tundra to establish a secondary connection and retrieve the device’s startup configuration file.

The extracted configurations often contain sensitive credentials and Simple Network Management Protocol (SNMP) community strings that facilitate deeper network penetration.

The threat actors leverage these compromised credentials to pivot laterally through network environments, using SNMP protocols with spoofed source addresses to bypass access control lists.

Static Tundra has been observed creating privileged local user accounts and establishing Generic Routing Encapsulation tunnels to redirect and capture network traffic of intelligence value, demonstrating their focus on long-term espionage rather than immediate financial gain.

Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.

The post Russian Hackers Exploiting 7-Year-Old Cisco Vulnerability to Collect Configs from Industrial Systems appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

GOP bill would require Tennessee public schools to check student immigration status

A crowd of protesters boos House Majority Leader William Lamberth during a Wednesday committee meeting…

3 minutes ago

US Senate rejects limits on Trump war powers, as Hegseth vows ‘death and destruction’ for Iran

Senate Minority Leader Chuck Schumer, D-N.Y., speaks with reporters during a press conference in the…

4 minutes ago

Ahead of race for Senate Speaker, three Republicans hold almost $1 million each in campaign cash

Sen. Bo Watson, in bow tie, is expected to be a leading contender to succeed…

4 minutes ago

Taxpayer dollars flood pregnancy centers. Oversight hasn’t followed.

Crisis pregnancy centers have been the beneficiary of at least a half-billion dollars since the…

4 minutes ago

Nothing’s Headphone A are something worth considering

The Headphone A keep the shape and style of Nothing’s over-ear design, but with an…

34 minutes ago

Nothing is finally covering up with the metal Phone 4A Pro

Today Nothing has revealed the 4A and 4A Pro, its latest midrange phones. The two…

34 minutes ago

This website uses cookies.