Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Cybersecurity Snapshot: Industrial Systems in Crosshairs of Russian Hackers, FBI Warns, as MITRE Updates List of Top Hardware Weaknesses



Cybersecurity Snapshot: Industrial Systems in Crosshairs of Russian Hackers, FBI Warns, as MITRE Updates List of Top Hardware Weaknesses

Check out the FBI’s alert on Russia-backed hackers infiltrating critical infrastructure networks via an old Cisco bug. Plus, MITRE dropped a revamped list of the most important critical security flaws. Meanwhile, NIST rolled out a battle plan against face-morphing deepfakes. And get the latest on the CIS Benchmarks and on vulnerability prioritization strategies!

Here are five things you need to know for the week ending August 22.

1 - FBI: Russian hackers targeting industrial systems

Heads up, critical infrastructure orgs: Russia-backed hackers are gunning for industrial control systems (ICS) by breaching networks via a years-old Cisco bug.

For the past year, a Russian Federal Security Service unit has been hijacking network devices to surveil industrial networks. Its goal? To find a foothold in the operational technology (OT) that runs everything from power grids to manufacturing plants.

This intel comes from the Federal Bureau of Investigation (FBI), which this week said that the group, also known as Berserk Bear, Dragonfly and Static Tundra, is exploiting critical vulnerability CVE-2018-0171 in the Cisco Smart Install (SMI) software.

So far, the group has collected thousands of configuration files from hacked networking devices, while scanning critical infrastructure networks in search of ICS protocols and applications.
 

Image showing a 3D model of a power plant's systems getting hacked

(Image created by Tenable using Google Gemini)

The group has been hacking networking devices for a decade. It targets devices that rely on older, unencrypted protocols.

For a deep dive into this threat, check out the blog “Russian state-sponsored espionage group Static Tundra compromises unpatched end-of-life network devices” from Cisco Talos, Cisco’s threat intelligence team. 

It offers a detailed analysis of the threat, along with mitigation recommendations, including, of course, applying the patch for CVE-2018-0171 or disabling Smart Install.

In related news, Norway’s government officially blamed Russian hackers for the April hack of a dam’s water flow system and spilling about two million gallons of water into a river. Norwegian Police Security Chief Beate Gangås made the allegation during Norway’s annual national forum Arendalsuka. Russia has denied the charge.

For more information about securing OT systems in critical infrastructure environments, check out these Tenable resources:

2 - MITRE updates list of top hardware security blunders

For the first time in almost five years, MITRE has revised its list of the main security weaknesses impacting hardware devices, giving security pros a refreshed roadmap to tackle today’s biggest hardware risks.

The "2025 CWE Most Important Hardware Weaknesses" (MIHW) list is the first to mesh comprehensive weakness data from the CVE program, security advisories, conferences and research papers with opinions from hardware security experts. 

With the new list, MITRE aims to help organizations prevent hardware security issues through enhanced mitigation prioritization, design practices and decision-making throughout the hardware lifecycle.

“The 2025 CWE MIHW represents a refreshed and enhanced effort to identify and educate the cybersecurity community about critical hardware weaknesses,” reads a MITRE paper.

These are MITRE’s top hardware security weaknesses, with new ones in bold:

  • CWE-226: Sensitive Information in Resource Not Removed Before Reuse
  • CWE-1189: Improper Isolation of Shared Resources on System-on-a-Chip (SoC)
  • CWE-1191: On-Chip Debug and Test Interface With Improper Access Control
  • CWE-1234: Hardware Internal or Debug Modes Allow Override of Locks
  • CWE-1247: Improper Protection Against Voltage and Clock Glitches
  • CWE-1256: Improper Restriction of Software Interfaces to Hardware Features
  • CWE-1260: Improper Handling of Overlap Between Protected Memory Ranges
  • CWE-1262: Improper Access Control for Register Interface
  • CWE-1300: Improper Protection of Physical Side Channels
  • CWE-1421: Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution
  • CWE-1423: Exposure of Sensitive Information caused by Shared Microarchitectural Predictor State that Influences Transient Execution

In a separate list labeled “Expert Insights: Weaknesses Beyond Data Trends,” MITRE highlights five additional weaknesses that experts believe also warrant special attention:

  • CWE-1231: Improper Prevention of Lock Bit Modification
  • CWE-1233: Security-Sensitive Hardware Controls with Missing Lock Bit Protection
  • CWE-1244: Internal Asset Exposed to Unsafe Debug Access Level or State
  • CWE-1272: Sensitive Information Uncleared Before Debug/Power State Transition
  • CWE-1431: Driving Intermediate Cryptographic State/Results to Hardware Module Outputs

Here’s a table correlating the hardware weaknesses with MITRE’s hardware categories.
 

Table from MITRE showing hardware security weaknesses correlated to hardware categories

(Source: MITRE, August 2025)

The list can be useful for a variety of security stakeholders, including:

  • Security architects and designers to prioritize key weaknesses
  • Design teams to build review checklists
  • Test engineers to focus testing efforts
  • Security researchers to direct their investigative and mitigation efforts
  • Electronic design automation tool vendors to enhance tool support for industry-prioritized weaknesses
  • Educators to align course materials with major, real-world hardware vulnerabilities

To get more details, check out the “CWE Most Important Hardware Weaknesses” home page.

For more information about hardware security flaws:

3 - NIST: How to unmask face-morphing identity threats

Is your organization prepared to detect identity scams perpetrated via face morphing — a growing deepfake threat?

It should, according to the National Institute of Standards and Technology (NIST), which this week published guidelines to combat identity fraud that uses this image-manipulation technique.

Face morphing is the combination of two facial photographs — one of the legitimate owner of, say, a passport or an employee ID card, and the other of a fraudster.

Face-morphing software aims to produce a synthesized image that will resemble the fraudster enough to deceive face-recognition systems and humans tasked with verifying the person’s identity. 
 

Illustration showing a digitally generated face flanked on both sides by fragments of the faces of multiple people

(Image created by Tenable using Google Gemini)

That way, the “morphed” image can be used in multiple passports, employee ID cards, drivers’ licenses and more. 

“The main threat associated with morphs is that if the submitted photograph is put on an identity document such as a passport, then both individuals will be able to use that document,” reads NIST’s 26-page document “Face Analysis Technology Evaluation (FATE) MORPH.” 

Sometimes a morphed image is generated from photos of more than two people.

NIST’s publication aims to offer practical guidance for organizations to adopt and use morph-detection methods in scenarios such as passport application reviews and border crossings.

“It’s important to know that morphing attacks are happening, and there are ways to mitigate them,” NIST official Mei Ngan said in a statement.

Modern morph-detection algorithms have improved significantly, according to NIST. The guidelines detail two primary methods of detection: 

  • Single-image morph attack detection (S-MAD), which analyzes a single suspicious photo
  • Differential morph attack detection (D-MAD), which compares the questionable photo with a known genuine image of the individual 

S-MAD can be highly accurate if the software has been trained on the specific morphing tool used to create the image. However, its effectiveness can decrease substantially when encountering images created with unfamiliar software. In contrast, D-MAD provides more consistent accuracy, with success rates ranging from 72% to 90%.

Meanwhile, human examiners that suspect a morph can perform several checks:

  • Visual inspection: Look for inconsistencies or anomalies around the eyes, nose, and mouth, as well as in skin texture and color.
  • Feature comparison: Compare the suspected morph with a trusted photo, looking for the absence or difference of features like scars, moles, or ear structures.
  • Metadata analysis: Inspect the image file's metadata for clues, such as the software used to create or modify the image.

The NIST publication also recommends ways to configure detection software for different situations and offer procedures for investigating flagged photos. The ideal approach involves a combination of automated tools and human review. 

A key preventative measure is to stop morphed photos from entering systems. “The most effective way is to not allow users the opportunity to submit a manipulated photo for an ID credential in the first place,” Ngan said.

For more information about detecting deepfakes:

4 - Tenable webinar polls: How your peers prioritize vulnerabilities

During our recent webinar “Tenable Announces AI-Powered Breakthrough in Vulnerability Prioritization,” we polled attendees on their preferred vulnerability prioritization criteria. We also asked them which new Tenable Vulnerability Priority Rating (VPR) drivers they expect to use the most. Check out what they said.

Pie chart with results from Tenable webinar poll about vulnerability prioritization

(141 webinar attendees polled by Tenable, August 2025)
Pie chart with results from Tenable webinar poll about vulnerability prioritization

(101 webinar attendees polled by Tenable, August 2025)

Watch the on-demand webinar to learn how Tenable Vulnerability Management’s AI-powered, context-rich approach transforms risk scoring, enhances prioritization, improves efficiency and boosts clarity.

5 - Fresh CIS Benchmarks are here for Microsoft, Cisco, AWS products

Time for a configuration check-up. The Center for Internet Security (CIS) just dropped a batch of new and updated Benchmarks to help you harden key systems against attack.

Specifically, these secure-configuration recommendations were updated in July:

CIS Benchmarks logo


In addition, CIS released these brand new Benchmarks: CIS Cisco NX OS Switch RTR STIG Benchmark; CIS DigitalOcean Foundations Benchmark v1.0.0; and CIS DigitalOcean Services Benchmark v1.0.0.

Organizations can use the CIS Benchmarks’ secure-configuration guidelines to harden products against attacks. Currently, the guidelines include more than 100 Benchmarks for 25-plus vendor product families in categories including: 

  • cloud platforms
  • databases
  • desktop and server software
  • mobile devices
  • operating systems

To get more details, read the CIS blog “CIS Benchmarks August 2025 Update.” 

For more information about the CIS Benchmarks list, check out its home page, as well as:


Cybersecurity news you can use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.