Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»New Russian Threat Group Z-Pentest Targets Energy System Controls

    New Russian Threat Group Z-Pentest Targets Energy System Controls

    December 7, 2024

    Z-Pentest hacks energy system controls

    Cyble dark web researchers have documented a new Russia-linked threat group that has been breaching critical infrastructure environments and tampering with system controls.

    The group, Z-Pentest, has only been around for two months, yet already claims at least 10 operational technology (OT) control panel hacks, including a recent unverified claim that the threat actors had disrupted a U.S. oil well system.

    The Cyble blog post also looked at the activity of an older Russian threat group, the People’s Cyber Army, also known as the Cyber Army of Russia Reborn, which claims at least eight breaches of U.S. water systems this year in addition to its other activities.

    The hacktivist groups often cite support for Ukraine as the reason for their cyberattacks in the U.S. and other countries, which have included Canada, Australia, France, South Korea, Taiwan, Italy, Romania, Germany and Poland.

    The two groups’ exploits also highlight the alarming state of U.S. critical infrastructure, which has also been targeted by China in possible preparation for cyber warfare with the U.S.

    Z-Pentest’s Dramatic Videos

    The two Russian groups have a flair for the dramatic. The Cyber Army of Russia, for example, posted screen recordings of members tampering with operational controls after breaches of water systems in Texas and Delaware in late August and September (screenshot of the Texas video below).

    Stanton Texas water system hack
    Stanton, Texas water system hack

    The People’s Cyber Army generated headlines earlier this year with a January attack that caused water storage tanks to overflow in Abernathy and Muleshoe, Texas. Water and wastewater systems are considered particularly vulnerable even among generally insecure critical infrastructure sectors.

    Z-Pentest may be new on the scene, appearing for the first time in October, but in the two months the Serbian group has been operating, it has claimed at least 10 breaches of process control panels, in each case posting videos of members tampering with system settings.

    Within the last week, Z-Pentest’s claims have escalated to include claims of “disrupting critical systems at an oil well site, including systems responsible for water pumping, petroleum gas flaring, and oil collection,” according to the Cyble report.

    A 6-minute screen recording captured detailed views of the facility’s control systems, showing “tank setpoints, vapor recovery metrics, and operational dashboards, allegedly accessed and changed during the breach.”

    It is not clear where that oil facility is located, but two other U.S. oil facility claims made by the group appear to correspond with known locations and companies.

    How Much Critical Infrastructure Damage Can Hackers Do?

    While the hackers appear to be able to access sensitive environments, Cyble noted that it’s not clear how much damage they could do. Programmable logic controllers (PLCs) “often include safety features that can prevent damaging actions from occurring, but the fact that such environments are accessible to threat actors is nonetheless concerning,” the researchers said.

    Cyble also noted a general increase in threat activity targeting the energy sector in recent months. Dark web claims and ransomware attacks have increased, and network access and zero-day vulnerabilities have been offered for sale on dark web marketplaces. Cyble also noted instances “where credentials for energy network access were offered for sale on the dark web before larger breaches and attacks occurred, suggesting that monitoring for credential leaks may be an important defense for preventing larger breaches later.”

    Cyble said Z-Pentest “should be taken seriously, as the group has demonstrated an apparent ability to penetrate these environments and access – and tinker with – operational control panels.”

    The researchers also offered security recommendations for operational technology and critical infrastructure environments, noting that they often can’t afford downtime and typically have end-of-life devices that can’t be patched.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleRomania Cancels Presidential Election Results After Alleged Russian Meddling on TikTok
    Next Article Blue Yonder Attack Attributed to New ‘Termite’ Ransomware Group

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 17, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2024-47893 – VMware GPU Firmware Memory Disclosure

    May 17, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Role Of Transformers in NLP – How are Large Language Models (LLMs) Trained Using Transformers?

    Development

    Google AI Introduces Parfait: A Privacy-First AI System for Secure Data Aggregation and Analytics

    Machine Learning

    recca0120/laravel-erd

    Development

    Kaspersky released a free Linux virus removal tool – but is it necessary?

    Development

    Highlights

    Development

    ‘Gay Furry Hackers’ Claim Responsibility for Heritage Foundation Data Leak, Then Disband

    July 11, 2024

    SiegedSec, who describe themselves as “gay furry hackers,” claimed responsibility for a cyberattack on The…

    This is the most helpful new Linux tool I’ve tried in years – here’s why and how I use it

    March 26, 2025

    Chrome’s Password Manager on iOS soon lets you delete all saved passwords at once

    December 20, 2024

    VMware Carbon Black vs CrowdStrike Falcon (2024): Which Tool Is Best For Your Business?

    June 13, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.