Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      A Week In The Life Of An AI-Augmented Designer

      August 22, 2025

      This week in AI updates: Gemini Code Assist Agent Mode, GitHub’s Agents panel, and more (August 22, 2025)

      August 22, 2025

      Microsoft adds Copilot-powered debugging features for .NET in Visual Studio

      August 21, 2025

      Blackstone portfolio company R Systems Acquires Novigo Solutions, Strengthening its Product Engineering and Full-Stack Agentic-AI Capabilities

      August 21, 2025

      The best AirTag alternative for Samsung users is currently 30% off

      August 24, 2025

      One of the biggest new features on the Google Pixel 10 is also one of the most overlooked

      August 24, 2025

      I tested these viral ‘crush-proof’ Bluetooth speakers, and they’re not your average portables

      August 24, 2025

      I compared the best smartwatches from Google and Apple – and there’s a clear winner

      August 24, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      MongoDB Data Types

      August 23, 2025
      Recent

      MongoDB Data Types

      August 23, 2025

      Building Cross-Platform Alerts with Laravel’s Notification Framework

      August 23, 2025

      Add Notes Functionality to Eloquent Models With the Notable Package

      August 23, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft Teams updated with a feature you probably thought already existed — “Can you hear me?” is now a thing of the past

      August 24, 2025
      Recent

      Microsoft Teams updated with a feature you probably thought already existed — “Can you hear me?” is now a thing of the past

      August 24, 2025

      Xbox Game Pass gets Gears of War: Reloaded, Dragon Age: The Veilguard, and more — here’s what is coming through the rest of August

      August 24, 2025

      Resident Evil ‘9’ Requiem has some of the most incredible lighting I’ve seen in a game — and Capcom uses it as a weapon

      August 24, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Russia’s FSB-Linked Hackers Targeting Cisco Network Gear Used in Critical Infrastructure

    Russia’s FSB-Linked Hackers Targeting Cisco Network Gear Used in Critical Infrastructure

    August 21, 2025

    Static Tundra, Energetic Bear, Cisco, Critical Infrastructure

    How often do you hear people talking about issues of legacy systems—especially in critical infrastructure environments? Here’s another example of how deeply rooted this issue is—legacy Cisco router infrastructure remains a Russian intelligence vault.

    A new alert from the FBI and a detailed analysis from Cisco Talos reveal how a decade-old vulnerability, tracked as CVE-2018-0171, in Cisco’s Smart Install feature continues to fuel state-level espionage campaigns against critical infrastructure.

    A Legacy Weakness with Persistent Danger

    CISA flagged this vulnerability back in 2018, warning that Russian state-sponsored actors had exploited Cisco’s Smart Install and unencrypted management protocols like SNMP and Telnet to harvest network configurations, inject firmware, and control routers for intelligence collection and lateral exploitation.

    That advisory revealed how unsecured GRE tunnels, SNMP, and TFTP were easy pathways for attackers to extract configuration files and password hashes from enterprise and SOHO devices. This compromised network infrastructure could be weaponized for traffic interception or even destructive operations, CISA had warned, at the time.

    Fast forward to the latest advisory and these are no longer just theoretical risks. The tools and techniques of SNMP abuse, misconfigured routers, use of TFTP over UDP, still enable attackers to extract device configurations, carve network maps and enact persistent access with minimal visibility.

    Also read: Urgent: CISA Flags Cisco Device Risks, Weak Passwords a Major Threat

    Static Tundra’s Stealthy Campaign, Decade in the Making

    Cisco Talos has now dubbed the threat actor exploiting this weakness as Static Tundra, a Russian-linked espionage group likely tied to FSB’s Center 16, also known as Energetic Bear. Talos assesses with high confidence that Static Tundra has spent years infiltrating unpatched or end-of-life Cisco network devices, particularly those with Smart Install enabled, and has done so across telecoms, higher education institutes and manufacturing in multiple continents.

    Their techniques include:

    • Exploiting CVE-2018-0171 to inject a TFTP-based fallback, retrieving startup configurations.

    • Abusing SNMP, occasionally via spoofed source addresses, to retrieve credentials and enable remote access.

    • Deploying the notorious SYNful Knock firmware implant to maintain stealth and resilience through reboots.

    • Leveraging GRE tunnels and NetFlow collection to quietly exfiltrate traffic and intelligible metadata.

    Talos notes the group operates with precision, picking targets aligned with shifting geopolitical priorities—particularly during the Ukraine conflict escalation. What’s more worrying is that the researchers observed many compromised devices remain infected as organizations still fail to patch or disable Smart Install feature, despite patches being available since 2018.

    Real-World Risk Across Sectors and Borders

    The combined findings show that the threat persists because of structural neglect. Unpatched firmware, enabled legacy features, and unmanaged network gear are the primary reasons. While CISA’s 2018 warning outlined the risk, Talos confirms that attackers continue to harvest sensitive configuration data, creating long-term espionage footholds.

    Sophisticated threat actors controlling key network infrastructure can manipulate traffic flows, enable command-and-control for hidden implants, and pivot laterally—transforming compromised routers into control hubs for broader attacks, cyber experts warned.

    A Non-Negotiable Security Imperative

    The risk as we said earlier isn’t hypothetical anymore. It’s ongoing and systemic. Here are some foundational steps every enterprise and critical infrastructure network must take, as per Talos researchers:

    • Patch or disable Smart Install immediately—CVE-2018-0171 remains widely exploitable.

    • Encrypt management channels, disable legacy protocols, harden SNMP and AAA policies.

    • Profile router behavior via NetFlow, log monitoring, and IDS signature deployment.

    • Maintain accurate device inventories and restrict remote access to critical appliances.

    Static Tundra’s campaigns make clear that network devices are not passive infrastructure. They are prime asymmetric targets. The vulnerability in Smart Install isn’t new, but the threat remains potent. Critical infrastructure operators need to harden network gear, build detection-first strategies, and elevate device security to boardroom-level concern.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleDOM-Based Extension Clickjacking Exposes Millions of Password Manager Users to Credential Theft
    Next Article Scattered Spider Hacker Gets 10 Years, $13M Restitution for SIM Swapping Crypto Theft

    Related Posts

    Artificial Intelligence

    Scaling Up Reinforcement Learning for Traffic Smoothing: A 100-AV Highway Deployment

    August 24, 2025
    Repurposing Protein Folding Models for Generation with Latent Diffusion
    Artificial Intelligence

    Repurposing Protein Folding Models for Generation with Latent Diffusion

    August 24, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    New Xbox games launching this week, from August 4 through August 10 — Mafia: The Old Country launches at $50

    News & Updates

    CVE-2025-48742 – SIGB PMB Remote Code Execution Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    How Neurodiversity Shines at MongoDB

    Databases

    Chrome to add Built-in Vertical Tabs, Catching Up with Edge and Firefox

    Operating Systems

    Highlights

    CVE-2025-7148 – CodeAstro Simple Hospital Management System Cross-Site Scripting Vulnerability

    July 7, 2025

    CVE ID : CVE-2025-7148

    Published : July 7, 2025, 10:15 p.m. | 29 minutes ago

    Description : A vulnerability was found in CodeAstro Simple Hospital Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /patient.html of the component POST Parameter Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Multiple parameters might be affected.

    Severity: 3.5 | LOW

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    GPUHammer: New RowHammer Attack Variant Degrades AI Models on NVIDIA GPUs

    July 12, 2025

    After Android, Microsoft Edge for iOS gets a native extensions feature

    July 4, 2025

    CVE-2025-53096 – Moonlight Sunshine Clickjacking Vulnerability

    July 1, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.