25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

U.S. Critical Infrastructure Entities Targeted by Pro-Russia Hacktivists

The Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), Department of Defense Cyber Crime Center (DC3), Canadian Centre for Cyber Security, Europol, and cybersecurity agencies throughout Europe have issued a joint cybersecurity advisory warning of cyberattacks on critical infrastructure by pro-Russian hacktivists.

In contrast to attacks by many financially motivated threat actors and advanced persistent threat groups, the attacks are relatively unsophisticated, and aside from attacking critical infrastructure entities in perceived adversaries of Russia, the attacks are opportunistic rather than targeted. According to the authoring agencies, the attacks are opportunity-driven by ease of access, targeting known unpatched vulnerabilities in Internet-facing systems, especially minimally secured virtual network computing (VNC) connections and Internet-facing desktop-sharing systems. The hacktivist groups typically use easily repeatable and unsophisticated methods for initial access.

While the attacks are lower impact than those conducted by APT actors, the aim is disruption to operations at critical infrastructure entities, potentially also resulting in physical damage. Attacks may be accompanied by DDoS attacks, and the threat actors aggressively pursue visibility, amplifying their activities and even fabricating claims of malicious attacks. While claims of attacks may be entirely fabricated, any such claim should be fully investigated. While sectors such as water and wastewater systems, food and agriculture, and energy face the highest risk of attack, the broad, indiscriminate approach has allowed the groups to attack many different critical infrastructure sectors. All critical infrastructure entities face an increased risk of attack, including the healthcare and public health sector.

“The pro-Russia hacktivist groups highlighted in this advisory have demonstrated intent and capability to inflict tangible harm on vulnerable systems,” said CISA Executive Assistant Director for Cybersecurity Nick Andersen. “In addition to implementing the recommended mitigations and rigorously validating their security controls, we are calling upon all OT device manufacturers to prioritize secure-by-design principles—because building in security from the start is essential to reducing risk and safeguarding the nation’s most vital systems.”

Get The FREE
HIPAA Compliance Checklist

Immediate Delivery of Checklist Link To Your Email Address

Please Enter Correct Email Address

Your Privacy Respected

HIPAA Journal Privacy Policy

“Robust cyber threat information sharing between the private sector and the federal government, implementation of recommended practices, and the commendable and aggressive enforcement operations by the FBI and other agencies will help mitigate the threat,” suggests John Riggi, AHA national advisor for cybersecurity and risk. “Organizations should also update, integrate, and routinely test emergency preparedness, cyber incident response, and clinical continuity plans should there be an extended technology outage affecting hospitals directly or indirectly through a cyberattack against mission-critical third parties.”

Key mitigations recommended by the authoring agencies include reducing the exposure of assets to the public-facing Internet; adopting mature asset management processes, including mapping data flows and access points; implementing network segmentation, especially between IT and OT networks; and ensuring all assets use robust authentication procedures.

The warning comes just a few days after a CISA and NSA alert about the BRISCKSTORM Backdoor, which is being deployed by state-sponsored threat actors from the People’s Republic of China (PRC) in attacks on VMware vSphere and Windows cloud platforms.

Author: Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist