The highly sophisticated Russian advanced persistent threat (APT) group Sandworm (also known as APT44) is adapting its strategy for attacking critical infrastructure. According to recent security research, the group is increasingly bypassing traditional, lengthy intrusions through corporate IT networks. Instead, Sandworm is now focusing on exploiting misconfigured or vulnerable edge devices—such as firewalls, VPN concentrators, and other network appliances—that bridge IT and Operational Technology (OT) environments. This tactical shift provides a more direct and rapid path to compromising sensitive Industrial Control Systems (ICS), allowing the attackers to achieve their objectives of disruption or espionage more efficiently. This evolution underscores the critical importance of securing the IT/OT boundary and the inherent risks of converging these once-separate networks.
Sandworm's tactical evolution is a response to improved security in traditional IT environments. As organizations have hardened their corporate networks, attackers are seeking the path of least resistance. Edge devices at the IT/OT boundary often represent a weak link.
The Attack Path:
This approach is more efficient for the attacker as it requires fewer steps and can lead to a faster impact on physical processes.
T0886 - Remote Services: Exploiting services like VPNs on edge devices.T0819 - Exploit Public-Facing Application: Targeting vulnerabilities in the firmware of edge devices.T0869 - Valid Accounts: Using default or stolen credentials to log into edge devices.T0846 - Network Sniffing: Once on the edge device, sniffing traffic to and from the OT network.T0855 - Spearphishing Attachment: A potential initial vector to gain credentials for edge devices.The consequences of a successful Sandworm attack on an OT environment are severe and can transcend the digital realm.
No specific Indicators of Compromise were provided in the source articles.
Detecting this activity requires a focus on the IT/OT boundary.
System Configuration Permissions monitoring.Network Traffic Analysis.Network Isolation.Use a data historian in a DMZ as a one-way buffer between IT and OT networks, preventing direct IT-to-OT connections.
Implement strict, default-deny firewall rules at the IT/OT boundary.
Regularly patch firmware on all edge devices and OT components.
Ensure that IT and OT networks are properly segmented and isolated.
To counter Sandworm's tactic of pivoting from edge devices, organizations must enforce strict network isolation between their IT and OT environments. This should be implemented using a DMZ architecture, often based on the Purdue Model. All communication between IT and OT must be terminated in the DMZ. Direct connections, especially for protocols like RDP or SSH, from the IT network into the OT zone must be prohibited. Instead, data should be exchanged via specific application-layer proxies or data diodes within the DMZ. This prevents a compromised edge device or IT system from having a direct network path to sensitive Industrial Control Systems, forcing the attacker to traverse multiple, monitored security layers.
The foundation of defending against Sandworm's new tactic is rigorous platform hardening of all internet-facing edge devices. This includes firewalls, VPN concentrators, and routers. A mandatory hardening checklist must be enforced: 1) Change all default administrator credentials immediately. 2) Implement strong, unique passwords for all accounts and use MFA wherever possible. 3) Disable all unnecessary services and ports (e.g., Telnet, HTTP management if HTTPS is available). 4) Establish a regular patching cycle for device firmware. 5) Restrict management access to a dedicated, secure network segment. By treating these edge devices as critical, high-risk assets and hardening them accordingly, organizations can close the misconfiguration gaps that Sandworm seeks to exploit.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.