FBI Warns of Russian Berserk Bear Hackers Targeting US Infrastructure via Cisco Routers

The FBI has warned U.S. organizations of ongoing cyber threats from Russian FSB-linked hackers, known as Berserk Bear, exploiting vulnerabilities in outdated Cisco routers to infiltrate critical infrastructure like energy and water systems. These intrusions, active for over a decade, aim at espionage and potential sabotage amid geopolitical tensions. Immediate patching and enhanced security measures are urged.
FBI Warns of Russian Berserk Bear Hackers Targeting US Infrastructure via Cisco Routers
Written by Mike Johnson

In a stark advisory issued this week, the Federal Bureau of Investigation has alerted U.S. organizations to a persistent cyber threat from Russian state-sponsored hackers, who have been exploiting vulnerabilities in outdated networking equipment to infiltrate critical infrastructure. The warning, detailed in an Internet Crime Complaint Center alert published on August 19, 2025, highlights how actors linked to Russia’s Federal Security Service (FSB) Center 16—known in cybersecurity circles as “Berserk Bear” or “Dragonfly”—have targeted thousands of devices worldwide, with a focus on U.S. systems managing energy, water, and transportation sectors.

These hackers have leveraged legacy protocols and unpatched flaws, such as a seven-year-old vulnerability in Cisco routers (CVE-2018-0171), to gain unauthorized access. According to the FBI, the intrusions involve extracting configuration data and potentially deploying custom malware like “SYNful Knock,” a tool first identified in 2015 but still in use. This activity, ongoing for over a decade, underscores a methodical approach to establishing footholds that could enable disruptive attacks during geopolitical tensions.

Escalating Risks in an Era of Hybrid Warfare

Industry experts note that the timing of this alert coincides with heightened U.S.-Russia frictions, including sanctions and military aid to Ukraine. A report from Reuters on August 20, 2025, quotes FBI and Cisco officials describing how these FSB-linked groups have scanned and compromised devices running older software, often left exposed due to cost-prohibitive upgrades in critical infrastructure environments. The intrusions aim not just at espionage but at positioning for sabotage, such as disrupting power grids or supply chains.

Cisco, in collaboration with the FBI, has urged immediate patching and migration to encrypted protocols like SNMPv3. Yet, the challenge lies in the sheer volume of legacy systems: estimates suggest millions of such devices remain operational globally, many in sectors where downtime for updates could cause cascading failures. Posts on X (formerly Twitter) from cybersecurity accounts amplify this urgency, with users sharing real-time alerts about similar vulnerabilities being exploited in real-world scenarios, echoing the FBI’s call for vigilance.

Historical Patterns and Evolving Tactics

This isn’t the first rodeo for these Russian actors. A 2018 joint technical alert from the FBI and partners, referenced in the latest advisory, warned of similar network infrastructure targeting. More recently, a BleepingComputer article dated August 21, 2025, details how the hackers have evolved, using compromised routers as proxies to mask further attacks, blending into legitimate traffic to evade detection.

The advisory also ties into broader patterns, including a 2024 Cybersecurity and Infrastructure Security Agency (CISA) alert on Russian military cyber actors, available at CISA’s website. Insiders point out that while no major disruptions have been publicly attributed to these specific campaigns yet, the potential for “devastating blows”—as phrased in related warnings about other nation-state actors—looms large, especially with tools that allow remote control of industrial systems.

Mitigation Strategies for a Vulnerable Ecosystem

To counter this, the FBI recommends multifactor authentication, network segmentation, and regular audits of edge devices. A Slashdot summary from August 24, 2025, aggregates community discussions on these measures, emphasizing open-source tools for vulnerability scanning. For critical infrastructure operators, this means prioritizing risk assessments, as outlined in a May 2025 joint advisory on operational technology threats.

However, challenges persist: budget constraints and skilled labor shortages often delay implementations. Cybersecurity firms like MITRE, in their updated hardware weakness lists reported by Security Boulevard on August 22, 2025, highlight how flaws in legacy hardware exacerbate these risks, urging a shift to zero-trust architectures.

Geopolitical Implications and Future Outlook

The broader implications extend beyond technical fixes. This campaign reflects hybrid warfare tactics, where cyber operations complement physical aggressions, as seen in past incidents like the 2015 Ukraine power grid hack attributed to Russian groups. U.S. officials, including those from the NSA, have echoed these concerns in joint fact sheets, stressing international cooperation.

As tensions simmer, industry leaders must integrate cyber resilience into core operations. With Russian hackers showing no signs of abatement, proactive defense—bolstered by timely intelligence sharing—remains the linchpin against potential widespread disruptions. The FBI’s alert serves as a clarion call, reminding stakeholders that in the digital age, infrastructure security is national security.

Subscribe for Updates

CybersecurityUpdate Newsletter

The CybersecurityUpdate Email Newsletter is your essential source for the latest in cybersecurity news, threat intelligence, and risk management strategies. Perfect for IT security professionals and business leaders focused on protecting their organizations.

By signing up for our newsletter you agree to receive content related to ientry.com / webpronews.com and our affiliate partners. For additional information refer to our terms of service.

Notice an error?

Help us improve our content by reporting any issues you find.

Get the WebProNews newsletter delivered to your inbox

Get the free daily newsletter read by decision makers

Subscribe
Advertise with Us

Ready to get started?

Get our media kit

Advertise with Us