Russian Cyberattacks Target AWS Customers Through Misconfigured Devices

13

Amazon Web Services (AWS) has confirmed a sustained, five-year cyberattack campaign by a Russian state-sponsored group targeting customer devices. The attacks, conducted by the Sandworm threat actor linked to Russia’s GRU military intelligence, exploited vulnerabilities in customer-managed network edge devices hosted on AWS, not AWS infrastructure itself.

The Attack: Targeting Critical Infrastructure

The campaign, active since 2021, has primarily focused on organizations in the energy sector across Western nations, including North America and Europe. Rather than exploiting weaknesses in AWS, the attackers targeted poorly configured customer devices, making them easy entry points for persistent access.

According to CJ Moses of Amazon Threat Intelligence, the attackers’ approach represents a “tactical pivot” away from traditional vulnerability exploitation toward leveraging misconfigured systems. This method allowed them to maintain access for years without detection by AWS itself.

Why This Matters: A Shift in Cyber Warfare Tactics

This attack highlights a growing trend in cyber warfare: state-sponsored actors increasingly exploit human error and poor security practices rather than relying solely on zero-day exploits. The “low-hanging fruit” of misconfigured devices provides an easier, more reliable path to infiltration.

This is concerning because it shifts the responsibility for defense onto end-users, who may lack the expertise or resources to adequately secure their systems. It also means that even robust cloud platforms like AWS are not immune if customers fail to follow basic security protocols.

What AWS Is Doing and What Customers Should Do

Amazon Threat Intelligence has notified affected customers and is urging increased monitoring and auditing of network devices. The company emphasizes that there is no AWS-specific exploit to patch; the problem lies in customer misconfigurations.

Going forward, AWS customers must prioritize secure device setup, regular security audits, and proactive threat detection. This includes enforcing strong access controls, patching systems promptly, and implementing multi-factor authentication wherever possible.

The success of this campaign underscores the critical need for vigilance and robust security practices at all levels of the cloud ecosystem.

The attacks are ongoing, and customers must remain vigilant to protect their critical infrastructure from persistent cyber threats.