Close Menu
National Security News
  • Ukraine War
  • Russia
  • Terrorism
  • China
  • Iran
  • Africa
  • Tech
    • Space
    • Nuclear
    • Cyber
  • Investigations

Trending

The targeting chain: how the IRGC exploits MTN-Irancell’s Gulf telecom connections to guide its missiles

March 5, 2026

US Navy to escort oil tankers through the Gulf to prevent attack from Iran

March 4, 2026

President Trump will not rule out sending troops into Iran

March 3, 2026

Israel’s new laser defence system intercepts rockets as regional tech race intensifies

March 3, 2026
Facebook X (Twitter) Instagram
National Security News
Subscribe
X (Twitter)
Login
IPSO Trusted Journalism in National Security
  • Ukraine War
  • Russia
  • Terrorism
  • China
  • Iran
  • Africa
  • Tech
    • Space
    • Nuclear
    • Cyber
  • Investigations
National Security News
  • Ukraine War
  • Russia
  • Terrorism
  • China
  • Iran
  • Africa
  • Tech
Home»Cyber
Cyber

Unveiling the threat of APT44: Russia’s Sandworm group strikes again 

Staff WriterBy Staff WriterApril 19, 20244 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email

Listen to the article

0:00
0:00

Key Takeaways

🌐 Translate Article

Translating...

📖 Read Along

💬 AI Assistant

🤖
Hi! I'm here to help you understand this article. Ask me anything about the content!

In the realm of cybersecurity, few threats loom as large as the notorious Sandworm group, now tracked by Google Cloud’s Mandiant as APT44. With its origins rooted in Russia, this malevolent entity has gained infamy for its involvement in a spectrum of operations, from espionage to disruption and disinformation campaigns.

Sandworm’s arsenal is formidable, characterised by the deployment of highly disruptive malware such as BlackEnergy and Industroyer. Since Russia’s war against Ukraine, the group has intensified its efforts to destabilise the region, employing tactics ranging from wipers to cyber operations intricately timed with conventional military activities.

However, recently, the group’s actions have expanded beyond this scope. On the 17 and 18 January 2024, CyberArmyofRussia_Reborn’s Telegram channel posted videos boasting about their successful manipulation of human-machine interfaces (HMIs) at water utilities in both Poland and the United States. These videos depicted actors interacting haphazardly with the control interfaces of the respective facilities. 

While previously linked to APT28, more commonly known as Fancy Bear, Mandiant’s latest report sets Sandworm apart as a distinct entity, APT44. This reclassification points to the group’s evolving tactics and increasing sophistication in executing cyber-attacks. One of the most alarming facets of APT44’s activities is its utilisation of hacktivist personas, including the Cyber Army of Russia Reborn (CARR), XAKNET, and Solntsepek. These personas serve as fronts for the group’s cyber campaigns and have been implicated in various disruptive incidents targeting critical infrastructure worldwide.

Of particular concern are recent claims made by CARR regarding its ability to manipulate operational technology (OT) assets in the United States and the European Union. In January, videos surfaced purportedly showing the group manipulating HMIs at water utilities in multiple Texan towns and a Polish village’s wastewater utility. One such attack caused a water tower overflow in Muleshoe, Texas, flooding streets with tens of thousands of gallons of water. 

Similarly, in March, a video alleged that the group had infiltrated a hydroelectric power station in France and could manipulate water levels. 

While the veracity of these claims remain unconfirmed, Mandiant’s report suggests that APT44 may have indeed caused disruption to critical infrastructure networks. 

Incidents such as a tank overflowing at a US water facility, reportedly linked to cyber incidents impacting multiple local infrastructure systems, underscore the potential consequences of such attacks on public safety and security. According to Ukrainian reporting, water infrastructure is the fourth most targeted sector that is attacked by Russian cyber hackers, surpassing attacks on Ukrainian state security and border services sectors. 

Meanwhile, the water sector remains the least mature among US critical infrastructure sectors, lacking clear measures and adequate funding for defence. 

Attack scenarios could involve targeting dams or disrupting pumps, which control water movement and disinfection processes. Concerns include the manipulation of pumps to either increase water flow or deploy more chemicals than should be deployed. Sabotage of engineering workstations or human-machine interfaces could result in a loss of control over critical systems.

APT44’s activities extend beyond traditional cyber operations, with the group implicated in supply chain attacks and targeting investigative journalism groups like Bellingcat. 

The emergence of APT44 as a formidable adversary underscores the urgent need for enhanced cybersecurity measures and international collaboration to mitigate the risk posed by such entities. As nations grapple with the implications of cyberattacks on critical infrastructure and national security, proactive measures must be taken to defend against evolving threats in the digital realm.

The increasing vulnerability of US water systems is evident, with Iranian-linked operators breaching six American utilities last year and the North Texas Municipal Water District falling victim to a cyberattack in November.

The question of whether cyber-attacks on vital infrastructure constitutes an attack on a NATO country, triggering Article 5 obligations of collective defence, looms large. As policymakers and security experts grapple with this question, the imperative to fortify cyber defences and deter malicious actors like APT44 grows increasingly urgent. Failure to address these threats comprehensively could have far-reaching implications for global security and stability.

Staff Writer

Keep Reading

Who will be the next Iranian Supreme leader?

Royal Navy submarine HMS Anson arrives in Western Australia for maintenance with AUKUS partners

Russian losses in Ukraine are now higher than the numbers of troops being recruited

Russian soldiers use invisibility cloaks to avoid drone detection

UK Carrier Strike Group to deploy to North Atlantic to keep UK safe

ITC Secure and IronNet unite to form Collective Defence

Editor's Picks

US Navy to escort oil tankers through the Gulf to prevent attack from Iran

March 4, 2026

President Trump will not rule out sending troops into Iran

March 3, 2026

Israel’s new laser defence system intercepts rockets as regional tech race intensifies

March 3, 2026

Who will be the next Iranian Supreme leader?

March 2, 2026

Trending

Israel’s new laser defence system intercepts rockets as regional tech race intensifies

Iran March 3, 2026

Who will be the next Iranian Supreme leader?

Iran March 2, 2026

Both ultimate shareholders of MTN-Irancell killed in US-Israeli strikes: what it means for South Africa’s most toxic asset

Iran March 1, 2026
Facebook X (Twitter) TikTok Instagram LinkedIn
© 2026 National Security News. All Rights Reserved.
  • About us
  • Privacy Policy
  • Terms
  • Contact
Home Topics Podcast NSN Lists

Type above and press Enter to search. Press Esc to cancel.

Sign In or Register

Welcome Back!

Login to your account below.

Lost password?