Categories: Cyber Security News

Hackers Hijacking VNC Connections to Gain Access to OT Control Devices in Critical Infrastructure

A coalition of U.S. and international cybersecurity agencies issued a stark warning this week about pro-Russia hacktivists exploiting exposed Virtual Network Computing (VNC) connections to infiltrate operational technology (OT) systems in critical infrastructure.

The joint advisory, released December 9, 2025, highlights groups like Cyber Army of Russia Reborn (CARR), Z-Pentest, NoName057(16), and Sector16 targeting water, food, and agriculture, and energy sectors through rudimentary but effective tactics.

Sponsored

These groups have evolved amid geopolitical tensions since Russia’s 2022 invasion of Ukraine. CARR, initially backed by Russia’s GRU military unit 74455, shifted to OT attacks by late 2023, claiming hits on European wastewater plants and U.S. dairy farms.

NoName057(16), tied to a Kremlin-linked youth monitoring center, specializes in DDoS but collaborates on intrusions. Newer outfits like Z-Pentest, formed in September 2024 from CARR and NoName057(16) defectors and Sector16, launched in January 2025, prioritize “hack and leak” operations for publicity, often exaggerating impacts via Telegram videos.

VNC Connections Exploited

Unlike sophisticated APTs, these actors lack deep expertise, opting for opportunistic strikes on internet-facing human-machine interfaces (HMIs) with weak VNC protections.

They scan ports like 5900 using Nmap or OpenVAS, deploy VPS-hosted brute-force tools against default or simple passwords, then manipulate GUIs to alter parameters, disable alarms, or rename devices, causing “loss of view” that forces manual overrides.

The advisory details MITRE ATT&CK techniques, from reconnaissance (T1595.002) to impact (T0829: Loss of View). Attackers log credentials, screenshot changes, and post proofs online, aiming for media buzz rather than espionage.

Victims face downtime, remediation costs, and rare physical damage, such as disrupted factory processes. One April 2025 case saw simultaneous DDoS aiding SCADA access, underscoring propagation via shared TTPs among allies.

Sponsored

Agencies note no injuries yet, but warn of escalating risks to occupied sites. Impacts include reprogramming fees and operational halts, amplified by actors’ disregard for safety.

Critical infrastructure owners must act swiftly. Top priorities: eliminate internet-exposed OT, segment IT/OT networks, enforce multifactor authentication (MFA), and ban defaults.

Use attack surface tools to hunt VNC exposures, audit firewalls for egress, and enable view-only modes. Manufacturers should ship “secure by design” devices with no defaults, SBOMs, and free logging.

Backup HMIs, test manual failsafes, and monitor anomalies like odd logins. Incident response: isolate, hunt, reimage, reprovision credentials, report to CISA/FBI.

This advisory builds on prior alerts, like CISA’s May 2025 OT mitigations, urging global vigilance. As hacktivists iterate, forging alliances and amplifying claims, defenders can’t afford complacency. Proactive hardening thwarts these low-barrier threats before they evolve.

The post Hackers Hijacking VNC Connections to Gain Access to OT Control Devices in Critical Infrastructure appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

A last act of care for the Earth: State’s first natural burial ground opens in White Mountains

A gentle brook meanders through 28.9-acres of protected lands in the White Mountains, a picturesque…

27 minutes ago

Free Staters convene at Liberty Forum in Concord

A crowd of libertarians is convening in Concord this weekend at a conference organized by…

27 minutes ago

Merwyn Bagan, Concord neurosurgeon and community volunteer, dies at 90

Merwyn Bagan could sum up his life’s work with a single bible verse: “Of them…

27 minutes ago

Time’s running out to get a free gift card when you preorder a new MacBook

This has been a week to remember here at The Verge. MWC 2026 in Barcelona…

48 minutes ago

Vizio accounts are becoming Walmart accounts

Walmart bought Vizio in 2024, and now it's taking the next steps to formally fold…

3 hours ago

Cognizant TriZetto Data Breach Exposes Health Information of 3.4 Million Patients

TriZetto Provider Solutions, a healthcare technology subsidiary of the IT services giant Cognizant, has officially…

3 hours ago

This website uses cookies.