Ukraine warns Russian hackers are revisiting past breaches to prepare new attacks
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,抓住主要信息。文章主要讲的是乌克兰的CERT-UA报告,俄罗斯黑客正在试图重新进入他们之前入侵的计算机系统。这可能意味着他们之前的入侵行为现在被用作后续攻击的跳板。 接下来,文章提到黑客会检查是否有访问权限、漏洞是否修补以及之前获取的凭证是否有效。这说明他们有长期打算,不仅仅是一次性的攻击。此外,攻击策略在2025年发生了变化,从快速收集数据后离开转向维持长期访问,以进行间谍活动或其他操作。 然后,文章讨论了攻击方式的变化。传统的钓鱼邮件和恶意附件效果减弱,所以黑客开始使用更复杂的社交工程策略,比如用乌克兰手机号码和合法账户联系目标,建立信任后再发送恶意文件。这种方法提高了攻击成功的概率。 最后,尽管战术在变化,但2025年下半年网络事件的数量有所下降,可能是因为乌克兰组织提升了防御能力。安全和国防部门仍然是主要目标。 总结时要简明扼要,涵盖关键点:俄罗斯黑客试图重新进入系统、利用之前的入侵作为跳板、攻击策略变化、社交工程方法以及事件数量下降的原因。 </think> 俄罗斯黑客正试图重新进入之前入侵的乌克兰计算机系统,并利用早期漏洞作为后续攻击的跳板。他们通过检查访问权限、漏洞修复情况和凭证有效性来维持长期访问。攻击者还采用复杂社交工程手段与目标建立信任后发送恶意文件。尽管战术升级,2025年下半年网络事件数量有所下降,显示乌克兰防御能力提升。 2026-4-3 13:30:48 Author: therecord.media(查看原文) 阅读量:10 收藏

Russian hackers are increasingly attempting to regain access to computer systems they previously compromised, Ukraine’s cyber incident response team (CERT-UA) said, warning that earlier breaches are often being used as footholds for follow-up operations.

In a new report, CERT-UA said attackers are revisiting previously breached infrastructure to check whether access is still available, whether exploited vulnerabilities have been patched and whether previously obtained credentials remain valid.

“Unfortunately, these attempts sometimes succeed if the root cause of the initial incident has not been completely eliminated,” the researchers said.

The trend reflects a broader shift in attackers’ tactics during 2025. In the first half of the year, many cyber incidents relied on a “steal-and-go” approach, in which attackers deployed malware designed to quickly collect credentials or other sensitive data before leaving the system to avoid detection.

But in the second half of the year, researchers observed a growing focus on maintaining long-term access to compromised networks.

CERT-UA said the strategy allows threat actors to maximize the value of successful breaches by returning later to expand access, conduct espionage or support other phases of cyber operations.

Researchers also observed changes in how attackers initially gain access to Ukrainian networks. Traditional phishing emails and malicious attachments are becoming less effective as organizations become more aware of common cyber threats, CERT-UA said.

Instead, attackers are increasingly relying on sophisticated social engineering tactics designed to build trust with victims. In many cases, hackers contact targets directly by phone using Ukrainian mobile numbers and legitimate messaging accounts, speaking fluent Ukrainian and demonstrating detailed knowledge about the individuals or organizations they are targeting.

Only after establishing trust through phone calls or video chats do attackers send malicious files through messaging apps, significantly increasing the chances that victims will open them.

According to CERT-UA, Russia-linked hacking groups including APT28, also known as Fancy Bear, and the threat actor tracked as Void Blizzard have used this technique in attacks against members of Ukraine’s armed forces and government institutions.

Despite the evolution in tactics, the report noted that the overall number of cyber incidents declined in the second half of 2025 compared with the first — the first such drop since Russia’s full-scale invasion began.

Researchers said the decrease may indicate that Ukrainian organizations are gradually adapting to the threat environment and improving their defenses.

The security and defense sector remains the primary target, CERT-UA said, because disrupting or infiltrating those networks could directly influence the course of the war.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.


文章来源: https://therecord.media/ukraine-warns-russian-hackers-revisiting-old-attacks
如有侵权请联系:admin#unsafe.sh