Image Credits:Cameron Davidson

DHS and FBI detail how Russia is hacking into U.S. nuclear facilities and other critical infrastructure

With a joint alert from the FBI and DHS, the Trump administration has formally accused the Russian government of a “multi-stage intrusion campaign” targeting the U.S. energy grid for the first time. The alert provides some specifics about an emerging threat that could translate a cyberattack into practical chaos for a country in the crosshairs of such an attack.

The alert elaborates on “Russian government actions targeting U.S. Government entities as well as organizations in the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors” — a goal consistent with suspected Russian cyberattacks like last year’s NotPetya malware which focused on industrial targets and past hacks of energy systems in Ukraine. The joint report by FBI and DHS links to Symantec research from October 2017 that detailed efforts by a “sophisticated attack group” then only known as Dragonfly which “[appeared] to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves.”

It’s clear from the alert that Russian reconnaissance efforts to probe critical infrastructure systems were also paired with an effort to override control for those systems:

“DHS and FBI characterize this activity as a multi-stage intrusion campaign by Russian government cyber actors who targeted small commercial facilities’ networks where they staged malware, conducted spear phishing, and gained remote access into energy sector networks. After obtaining access, the Russian government cyber actors conducted network reconnaissance, moved laterally, and collected information pertaining to Industrial Control Systems (ICS).”

To carry out their aims, the attackers employed a blend of technical attacks, social engineering and basic online sleuthing. In one instance, the report describes how the hackers downloaded a small image displayed on a target’s public human resources page. By blowing up the photo, the attackers revealed a “high-resolution photo that displayed control systems equipment models and status information in the background” — a considerable oversight and evidence of just how unevenly implemented basic operational security precautions can be in the energy sector.

During the early stage of compromising a system, the alert states that the threat actors used spear-phishing attacks originating from an already hacked legitimate account and watering hole domains, among other methods. After infiltrating a system, the attackers made organized efforts to cover their tracks, deleting logs and removing installed applications, including the VPN software FortiClient.

More technical detail is available in the document itself on the US-CERT website.

Techcrunch event

Disrupt 2026: The tech ecosystem, all in one room

Your next round. Your next hire. Your next breakout opportunity. Find it at TechCrunch Disrupt 2026, where 10,000+ founders, investors, and tech leaders gather for three days of 250+ tactical sessions, powerful introductions, and market-defining innovation. Register now to save up to $400.

Save up to $300 or 30% to TechCrunch Founder Summit

1,000+ founders and investors come together at TechCrunch Founder Summit 2026 for a full day focused on growth, execution, and real-world scaling. Learn from founders and investors who have shaped the industry. Connect with peers navigating similar growth stages. Walk away with tactics you can apply immediately

Offer ends March 13.

San Francisco, CA | October 13-15, 2026

Topics

, , , , ,
Loading the next article
Error loading the next article