Amazon confirms prolonged Russian cyber campaign against AWS users | Find a Way

Amazon confirms prolonged Russian cyber campaign against AWS users

The attack has been ongoing for half a decade.
By  on 
Amazon Web Services has been under attack for half a decade by Russian state actors. Credit: Ismail Kaplan/Anadolu via Getty Images

Amazon Web Services (AWS), Amazon's cloud web hosting platform which provides online services to millions of customers, has confirmed that Russian state actors have been attacking misconfigured customer edge devices for the past five years, according to a new update from the company.

Earlier this week, Amazon Threat Intelligence shared an update on the AWS website that detailed the years-long attack by a Russian cyber threat group. Amazon's team dissected the attack and discovered a link to a threat actor known as Sandworm, which is associated with Russia’s GRU military intelligence agency.

Amazon’s telemetry reveals coordinated operations against customer network edge devices hosted on AWS. This was not due to a weakness in AWS, according to Amazon, but appear to be customer misconfigured devices. 

"The campaign demonstrates sustained focus on Western critical infrastructure, particularly the energy sector, with operations spanning 2021 through the present day," CJ Moses of Amazon Threat Intelligence said in the post.

Mashable Light Speed
Want more out-of-this world tech, space and science stories?
Sign up for Mashable's weekly Light Speed newsletter.
By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy.

SEE ALSO:Amazon is throwing one more sale to close out the year — save during the Super Saturday sale

According to Amazon, the attack focused on "energy sector organizations across Western nations, critical infrastructure providers in North America and Europe, and organizations with cloud-hosted network infrastructure." Amazon says the campaign targeted "'low-hanging fruit' of likely misconfigured customer devices," which likely enabled the attacks to continue on for so long.

Moses says that this attack "represents a significant evolution in critical infrastructure targeting" and calls it a "tactical pivot where what appear to be misconfigured customer network edge devices became the primary initial access vector, while vulnerability exploitation activity declined."

Moses says that this attack "represents a significant evolution in critical infrastructure targeting" and calls it a "tactical pivot where what appear to be misconfigured customer network edge devices became the primary initial access vector, while vulnerability exploitation activity declined."

Basically, according to Amazon, there isn't any AWS exploit to patch as bad actors are weaponizing misconfigured devices on the end of AWS' customers. Amazon says it has notified affected customers. Going into the new year, Amazon is urging its customers to monitor and audit network devices and remain vigilant as attacks are ongoing.

UPDATE: Dec. 19, 2025, 5:54 p.m. EST This post has been updated throughout to make it clear that AWS was not a victim in this attack and the coordinated operation did not occur due to a weakness in AWS. It appears to be customer misconfigured devices.

Topics Amazon Cybersecurity





Matthews Martins

Perhaps facing reality head on is the most honest way to try to escape it.

61 Comments

Stay informed!

  1. Amazon? These the same guys that accidentally hired a North Korean programmer into their remote IT team?

    ReplyDelete
  2. That's ok, they are president Trump's friends !!

    ReplyDelete
  3. In any sane society the number of cyber attacks from Russian sources would be considered acts of war. How is this any different from hiring privateers to seize merchant ships?

    ReplyDelete
  4. They must’ve not respected Russia

    ReplyDelete

  5. Without wanting to Dox myself, I've been in positions in several large organisations where I get visibility of regular cyber security reporting.

    Every company. EVERY company I've had this visibility of has weekly attacks from "state actors", which is code for Chinese, Russian, often Iranian, and less frequently North Korean, hackers.

    It's an enormous industry in those countries. Make no mistake, they are probing and prodding the infrastructure, financial, defence, emergency, and energy networks of Western countries pretty much full-time.

    It's staggering when I realised the scale and effort they were putting into it.

    ReplyDelete
  6. What the presidents buddy, say it ain’t soooo!

    ReplyDelete
  7. for some reason it's always some country that the government would like to destroy.

    ReplyDelete
  8. Honestly, if they had a bunch of bots just spamming ai infrastructure, wouldn’t that be an incredible energy problem in the US?

    ReplyDelete
  9. They did launch a 6 Tbps DDOS with Lambda in us-west-1 during the 2018 Super Bowl.

    ReplyDelete
    Replies
    1. And who had the multiple cel phone chaos banks all over New York a few months back?

      Delete
  10. Hegseth said they stopped attacking us tho?!

    ReplyDelete
    Replies
    1. "Hegseth said..." LOL. Anything he says....not worth spit.

      Delete
  11. The world has basically become a shitty bond movie at this point. We know who all the villains are too, we just don’t care. I know people are concerned about nuclear war etc.. but mark my words, if we ever go to war with Russia or China, the power will be out within 45 minutes and it’ll just be some dude waiting to hit enter on their keyboard.

    This has become especially apparent because everyone including governments seems to think it’s a great idea that they all use the exact same services (Cloudflare etc) that all depend on the exact same infrastructure (Amazon, Microsoft, Oracle etc).

    We are so dumb at this point that we are replacing farmland with ai data centers. I can’t eat your stupid fucking pseudoscience paper AI bros..

    We’re heading towards Interstellar (and not the fun parts).. the line I think about often in particular is, “We didn’t run out of flat screen TVs we ran out of food”. I remember being a kid and having a big screen TV was absolutely insane to have due to price, and moving them also required Brian Shaw to come to your house and help. Now you can get a 65 inch TV or a weeks worth of food (for now) lol

    That’s so fucking crazy to me when I really stop and think about where we are today. I’m 37… and the world has changed so much already in my lifetime.

    ReplyDelete
  12. Did the Russians originally claim they’d take Amazon down in 3 days?

    ReplyDelete
  13. Guess they can blame their crappy service on this.

    ReplyDelete
  14. Did it improve their service?

    ReplyDelete
  15. Russia is at war with the West. It's time we realize this.

    ReplyDelete
    Replies
    1. It's because Putin has no dick. The man is totally smooth down there and it has driven him insane.

      Delete
    2. Epstein’s was “like a mutant lemon”

      Delete
  16. Russia has been at war with the United States for a while now. Putting Trump in office was part of their warfare to destroy America from within

    ReplyDelete
    Replies
    1. Yeah, ever since 2014 when the US first got those crippling sanctions put on Russia because Russia invaded and annexed the Crimean Peninsula.

      Delete
    2. I was going to say, 5? Pretty sure Trump announced candidacy in 2015.

      Delete

  17. Interesting test... put something like a Raspberry Pi's ssh port on the internet and monitor the logs. around 50% to 75% of the IPs trying to connect to it will be Russian. The other major portion will be Chinese IPs.

    BTW: This is why you should never expose an SSH port to the internet with password auth enabled. For safety it should always be only key authentication allowed. Even better yet, set up a VPN on a non-standard port and connect to your network via a cert based VPN before you SSH into anything.

    Note: this is in response to the idea that Russia is trying to attack western infrastructure, but it's not just infrastructure, it's anything they can get their hands on. Bot nets are everywhere.

    ReplyDelete
    Replies
    1. Yeah but IP source doesn’t mean anything.

      It could also mean that a lot of insecure devices are present in Russia and China and are used as bot net for whatever scope. The article says they seem to have identified a control group like sandworm, which is a different thing.

      Delete
    2. This kind of stuff is over my head a bit. I did recently try setting up Adguard on my NAS to setup DNS but then I found out about Quad9 and decided it would be easier to just set DNS to that instead. I also recently took advice from a YouTube video and setup different VLANs for different devices and made a trusted, IoT, and Guest network to further protect our network.

      Delete
    3. This stuff is way over my head. Is there a step by step guide on how to do this?

      Delete
    4. You'd have to take it piece by piece and Google it. There isn't anything that covers all of what I just provided, sorry. Start with SSH key based authentication and disabling password based authentication. There are tons of YouTube videos on that subject alone. Then you could research setting up a Wireguard or OpenVPN vpn.

      Delete
    5. No worries, thanks for this I appreciate the guidance.

      Delete
    6. Im in the same boat. I know i need to start somewhere, but...haha...its a whole entire subject category.

      Delete
    7. Legit “the struggle is real”.

      Delete
    8. Hmm yes I understand everything I just read. SSH ports and stuff yes…

      Delete
    9. I was working in a print shop overseeing a huge production run at 3am back in like 2015 - and all of a sudden there was an EXPLOSION of notifications on the main printer's display, each claiming a failed login attempt

      It listed the IP address that was trying to make that attempt - and I looked it up & found they were based out of China

      Wasn't sure what to do so I just unplugged the network cable for the night. lol Within a few months after bringing this to the attention of the team - we'd moved to a non-public facing network infrastructure.

      Delete
    10. I also always just straight up block all IP addresses from China and Russia on every server I set up

      Delete
    11. How you do that?

      Delete
    12. Honestly that should be the default position outside of those countries.

      Delete
    13. How could you do that actually?

      Delete
    14. I run my servers on AWS and just use the built in region blocking features of CloudFront and ALB

      Delete
    15. As someone ignorant of security and practices outside of using MFA, what can you recommend to enable me to do the same? I don't have a server but I'm interested in hardening my wifi and modem at home and protecting our pcs to the extent possible.

      Delete
    16. Most consumer devices have a firewall that is going to block all inbound connection attempts to the devices on your local network. There isn’t a lot of risk for these types of attacks on your personal network. Phishing or other malware attacks are what consumers should be most worried about.

      Delete
    17. I agree with you. Personal networks have little to offer but personal identifying information does.

      Delete
    18. Sorry I don't know about modems, it would probably depend on the manufacturer.

      All of the servers I run are on AWS, and I just use the built-in features of CloudFront and ALB to block traffic from countries like Russia.

      It's not perfect obviously, they can easily get around it with a VPN, but it cuts out a LOT of the low effort attempts

      Delete
    19. Gotcha. Thanks anyway.

      Delete
    20. The amount of traffic I got from other IPs too though, Ukraine, Hong Kong, Netherlands…I ended up blocking all visits from the worst offenders and doing managed challenges from Cloudflare for the rest outside of the US. But a lot of requests from those IPs seemed to bypass Cloudflare entirely anyway. I can’t understand why these cybercriminals are allowed to continue and why Apache or cPanel don’t have stronger host-level methods to block what is obviously malicious snooping and scraping.

      Delete
    21. Can confirm. I performed a similar activity using RDP (3389 open) following YT tutorials from MyDFIR and Josh Madakor. Ukraine and Poland IPs lit up within an hour as confirmed by Wazuh, Sentinel and a geo location map tool. Then Singapore chimed in and said hold my b33r. In three hours splunk counted 8000 failed access attempts. I finally deleted both instances (AWS, Azure) after running over night and nearly a quarter million attempts.

      Delete
    22. Or they can just use a US VPN..

      Delete
    23. That won't isolate the traffic to just their own network, which would be the point in this case. That kind of VPN is great if you want to prevent your ISP or public WiFi provider from seeing your traffic. It's also good if you want to mask where you're coming from when accessing public services. It's not so good to secure your own personal network from attacks.

      Delete
    24. Yep, or open port 80 and just watch. The amount probing for HTTP vulns in routers, etc is insanity. But it’s important to note that a majority of the time those mass scans are from infected devices meaning the actual attacker may not be from where the IP is.

      It can be a bit misleading which is why it always requires further research.

      Delete
    25. You forget the step where you replace all the standard response codes with those from say....Windows 2003 IIS ;>

      Delete
    26. Yup, infected devices that are already part of a botnet. I have over 100 attempted connections from those regions in the last 8 hours, and that's down from what it has been in the past. It's not just SSH either, but anything they think they can take advantage of, like port 80 as you mentioned. I've gotten to the point that besides the method I listed, I also block regions.

      Delete
    27. Watch over 23, 80, 8080, 8081, 37777, 53413 UDP, those are common just off the top of my head. I do malware research so I have a hobby of setting up honeypots lol

      Delete
    28. If you haven't already, I suggest investing in a Unifi Cloud Gateway. They have a crazy amount of capabilities for someone that does what you do. Network monitoring and intrusion detections being the first two features off the top of my head that would be the most helpful.

      Delete
    29. No need. I’ve been working on my own tools to meet niche requirements. I’m not looking for IDS tools as much because I know what specific IoCs I’m looking for and what I’m wanting to ignore.

      I.e I could care less about those 1000 SSH attempts but I’m more curious on what they do with a false banner and false username and password combo. What shells are they looking for? What protections do they have? IDS won’t help me emulate what the malware is looking for and wanting as much as it will let me know it’s there.

      I do appreciate the recommendation though. I would however one day like to play with a Firewalla router

      Delete
    30. I just got a UCG Fiber a couple of months ago and the amount of attempts it's logged from just geoblocking a few countries is crazy.

      Delete
    31. Certainly it's the number one thing that shows up in my blocked list.

      I'm surprised at how well the intrusion detection spots network traffic that's out of sorts. I found that out just connecting to my web server via ssh. The detection was solid, even if it was a bit painful to figure out why.

      Delete
  18. It always looked like we were in a constant state of war with China because of their unique hacks—for example, if they mess things up using some mysterious rules Amazon itself created, money gets deposited into their account.

    ReplyDelete
  19. Did they get free shipping?

    ReplyDelete
  20. Not following the link, can someone copy and paste the text please?

    ReplyDelete
    Replies
    1. A five-year cyberattack campaign targeting users of Amazon Web Services infrastructure in the West has been confirmed by the Amazon threat intelligence team following ongoing analysis of the threat, which is linked to the Sandworm actor and, therefore, to hackers working with Russia’s GRU military intelligence agency.

      ForbesCisco Secure Email Attacks: 0-Day Exploit Confirmed, No Fix Available Prolonged Russian Hack Attacks Target Devices Hosted On Amazon Infrastructure — No Unpatched Vulnerabilities Required

      The Russian state-sponsored cyberattacks represent “a significant evolution in critical infrastructure targeting,” CJ Moses, previously the FBI Cyber Division’s technical lead for computer and network intrusion analysis and now chief information security officer at Amazon Integrated Security, said in a December 15 analysis. How so? Because, as Moses went on to explain, vulnerability exploitation was not an overriding factor, but rather the Russian attacks took “a tactical pivot where what appear to be misconfigured customer network edge devices became the primary initial access vector.”

      Yep, patch all you like, but if you leave devices misconfigured, it’s like putting expensive and secure locks on the front door and leaving an upstairs window open with a ladder on hand for good measure.

      Attackers, especially the most sophisticated ones, and any Russian state-sponsored advanced persistent threat group that falls into this category, will take the low-hanging fruit over vulnerability exploitation to reduce exposure any day. After all, as Moses said, “this tactical adaptation enables the same operational outcomes, credential harvesting, and lateral movement into victim organizations’ online services and infrastructure.”

      According to Moses, the Russian hacking operation has been ongoing since at least 2021, targeting global infrastructure but with a focus on the Western energy sector, especially in North America and Europe.

      ForbesMicrosoft Confirms Windows Security Update Breaks VPN ConnectionsBy Davey Winder

      The attackers have been observed compromising infrastructure hosted on AWS, Moses confirmed, adding that the Amazon telemetry revealed “coordinated operations against customer network edge devices hosted on AWS.” The problem, it turns out, isn’t related to any weakness on the AWS end per se, but rather to customer misconfigured devices.

      “This trend is driven by practicality because misconfigured network edge devices, exposed management interfaces, and overly permissive identities provide low-cost, reliable entry points that can remain undetected for extended periods,” Chrissa Constantine, senior cybersecurity solution architect at Black Duck, warned. The approach is deliberate and certainly does not signal any diminished capability on behalf of the attackers in moving away from zero-days. “Misconfiguration abuse blends seamlessly with legitimate administrative activity,” Constantine concluded, “making detection and attribution significantly more challenging.”

      ForbesCritical Amazon Kindle Hack Confirmed — What You Need To KnowBy Davey Winder Mitigating The Russian Hacker Amazon Attacks

      Moses said that “Amazon remains committed to helping protect customers and the broader internet ecosystem by actively investigating and disrupting sophisticated threat actors,” and recommended organizations apply the following actions in 2026:

      "Network edge device audit
      Credential replay detection
      Access monitoring
      Indicators of Compromsie review"

      When it came to AWS mitigation specifically, Amazon recommended managing access using identity federation with an identity provider, implementing the least permissive rules for your security groups, and using Amazon Inspector to automatically discover and scan Amazon EC2 instances for software vulnerabilities and unintended network exposure. Don’t let 2026 be an open window for attackers; you have been warned.

      Delete
    2. Brilliant, thank you 🙏

      Delete
    3. Why don't you do it for other people?

      Delete
    4. Forbes has too many cookies and sus software for the device I’m using right now. Not a problem for you, you don’t know what you don’t want.

      Delete
Post a Comment
Previous Post Next Post