Russian hackers have successfully taken data from a significant number of companies and government agencies over the past year, according to US security firm CrowdStrike.
CrowdStrike confirmed uncovering the operation, codenamed Energetic Bear, while tracking 50 of the world's most notorious hack campaigns in its 2013 Global Threat Report. The report claimed the operation was focused on stealing valuable data from the energy sector.
"Energetic Bear is an adversary group with a nexus to the Russian Federation that conducts intelligence operations against a variety of global victims with a primary focus on the energy sector," read the report. "CrowdStrike intelligence has been tracking the adversary since August 2012."
The report declines to mention which companies were hit by the campaign, but listed its target base as including businesses operating in the US, Japan, Poland, Greece, Romania, Spain, France, Turkey, China and Germany. The UK was not included on the victim list.
The campaign is also believed to have infected machines outside of the energy industry. CrowdStrike reported finding compromised hosts in government systems, academic institutions, manufacturing firms, defence contractors, healthcare providers and IT companies.
CrowdStrike said the Energetic Bear attacks were atypical and dangerous as they primarily infected systems using strategic web compromises (SWC), also known as watering-hole attacks.
"Subsequent investigation revealed that the SWC tactic appears to be this adversary's preferred delivery vector, however there is also evidence that it leverages exploits for popular document readers, such as Adobe Reader," read the report.
Watering hole attacks work to infect users' machines with malicious code by hijacking trusted websites often visited by their intended target and transforming them into malware-distribution tools.
CrowdStrike reported that the Energetic Bear campaign used a variety of malware to extract three key types of data from its victims.
These included information-harvesting tools that gathered data on the infected system, such as what operating system was running. The campaign also used a credential-harvesting tool that stole passwords stored on open web browsers and secondary implants that "talk to different C2 infrastructures using custom protocols and execute tertiary payloads in memory".
The watering hole tactic has been used to compromise several big-name institutions over the past year, including the US Department of Labor. Vice president of Intelligence at CrowdStrike Adam Meyers, said he expects the tactic to become increasingly common in 2014.
"Compromising and weaponising a legitimate website has significant advantages over spear phishing, which historically has been the most common method of launching a targeted attack," he said.
"A strategic web compromise does not require social engineering a victim, which can expose an adversary to detection. We believe this tactic will be used with increasing frequency among the adversaries that we are tracking."
CrowdStrike is one of many security companies to warn businesses to expect an increase in cyber attacks this year. Network giant Cisco warned companies to be particularly vigilant about advanced Java and Android-based exploits in its latest threat report earlier in January.
Microsoft receives a 30 per cent cut of all purchases on the Xbox digital store
Credit card thieves used Apple ID accounts to buy and sell virtual currency for Clash of Clans and Clash Royale and Marvel Contest of Champions
$5.1bn fine further evidence that the EU is anti-US, claims Trump
New cable will connect Virginia to France