11:00am, 15 December 2025
TLP Rating:
Pro-Russia hacktivists conduct opportunistic attacks against US and global critical infrastructure
The NCSC along with international partners, has issued a joint advisory that:
- details the development of four pro-Russia hacktivist groups (CyberArmy of Russia Reborn - CARR, NoName057 (16), Z-Pentest and Sector16), as well as their techniques, tactics and procedures (TTPs) for targeting operational technology (OT) vendors and critical infrastructure operators.
- provides awareness of specific malicious activities and useful mitigations for OT and critical infrastructure asset owners, operators and device manufacturers.
Partners include:
- U.S. Department of Energy (DOE)
- U.S. Environmental Protection Agency (EPA)
- U.S. Department of Defense Cyber Crime Center (DC3)
- U.S. Federal Bureau of Investigation (FBI)
- U.S. Cybersecurity and Infrastructure Security Agency (CISA)
- U.S. National Security Agency (NSA)
- Europol European Cybercrime Centre (EC3) EUROJUST – European Union Agency for Criminal Justice Cooperation
- Australian Signals Directorate’s Australian Cyber Security Centre (ASD ACSC)
- Canadian Centre for Cyber Security (Cyber Centre)
- Canadian Security Intelligence Service (CSIS)
- Czech Republic Military Intelligence (VZ)
- Czech Republic National Cyber and Information Security Agency (NÚKIB)
- Czech Republic National Centre against Terrorism, Extremism, and Cyber Crime (NCTEKK)
- French National Cybercrime Unit – Gendarmerie Nationale (UNC)
- French National Jurisdiction for the Fight Against Organized Crime (JUNALCO)
- German Federal Office for Information Security (BSI)
- Italian State Police (PS)
- Latvian State Police (VP)
- Lithuanian Criminal Police Bureau (LKPB)
- New Zealand National Cyber Security Centre (NCSC-NZ)
- Romanian National Police (PR)
- Spanish Civil Guard (GC)
- Spanish National Police (CNP)
- Swedish Polisen (SC3)
- United Kingdom National Cyber Security Centre (NCSC-UK)
What's happening
Systems affected
The authoring organisations assess pro-Russia hacktivist groups are conducting less sophisticated, lower-impact attacks against critical infrastructure entities, compared to advanced persistent threat (APT) groups. These attacks use minimally secured, internet-facing virtual network computing (VNC) connections to infiltrate (or gain access to) OT control devices within critical infrastructure systems. Pro-Russia hacktivist groups—Cyber Army of Russia Reborn (CARR), Z-Pentest, NoName057(16), Sector16, and affiliated groups—are capitalising on the widespread prevalence of accessible VNC devices to execute attacks against critical infrastructure entities, resulting in varying degrees of impact, including physical damage. Targeted sectors include Water and Wastewater Systems, Food and Agriculture, and Energy.44444
What this means
The authoring organisations encourage critical infrastructure organisations to implement the recommendations in the Mitigations section of this advisory External Link to reduce the likelihood and impact of pro-Russia hacktivist-related incidents. For additional information on Russian state-sponsored malicious cyber activity, see CISA’s Russia Threat Overview and Advisories External Link webpage.
What to look for
How to tell if you're at risk
If your organisation or role involves sensitive data, policy, or research (particularly in areas of geopolitical interest), you may be a target for spear-phishing. Review recent communications for suspicious or unexpected sender behaviour.
What to do
Prevention
- Reduce exposure of OT assets to the public-facing internet.
- Adopt mature asset management processes, including mapping data flows and access points.
- Ensure that OT assets are using robust authentication procedures.
Mitigation
The authoring organisations recommend organisations implement the mitigations detailed in the advisory External Link to help improve cybersecurity posture. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats and TTPs. Visit CISA’s CPGs webpage External Link for more information on the CPGs, including additional recommended baseline protections.
More information
Download the advisory. External Link
If you require more information or further support, submit a report on our website:
Report an incident External Link .
If you need assistance using the tool, call us on 0800 114 115. Calling us is free within New Zealand. We’re open 7am to 7pm, Monday to Friday, and we’re closed on public holidays.
How helpful was this page?
This site is protected by reCAPTCHA and the Google Privacy Policy External Link and Terms of Service External Link apply.