← Back to Tech & Science

Global Cyberattacks Target U.S. Agencies and Venezuelan Energy Infrastructure

Tech & ScienceAI-Generated & Algorithmically Scored·

AI-generated from multiple sources. Verify before acting on this reporting.

WASHINGTON — A coordinated wave of cyberattacks targeting government agencies and critical infrastructure in the United States and Venezuela has been detected, involving multiple threat actors and sophisticated malware strains. The incidents, identified on April 27, 2026, include data theft, operational disruption, and unauthorized remote access attempts across various sectors.

In the United States, a federal agency was targeted by the FIRESTARTER backdoor, a tool designed to maintain persistent access to compromised systems. Simultaneously, the UNC6692 threat group deployed Snow malware by impersonating a help desk technician through Microsoft Teams. The attackers utilized social engineering tactics to trick employees into granting remote access, allowing the deployment of malicious payloads intended to exfiltrate sensitive data.

Separately, developers of the fast16 malware have been linked to new campaigns aimed at stealing credentials and financial information. The malware, known for its ability to evade detection, has been observed in various global networks. Security analysts noted that fast16 often operates in conjunction with other tools to maximize data extraction before detection.

In Venezuela, the energy sector faced a significant disruption as the Lotus Wiper malware attacked critical systems. The wiper malware is designed to erase data and render systems inoperable, causing potential outages in power distribution. The attack has raised concerns about the stability of the national grid and the safety of energy infrastructure.

The Gentlemen ransomware group, known for encrypting files and demanding payment for decryption keys, has also been active during this period. While no specific victim has been publicly confirmed in this wave, the group's involvement suggests a broader campaign of financial extortion targeting organizations with valuable data.

The attacks span multiple regions, indicating a coordinated effort by various state-sponsored and criminal groups. The United States and Venezuela are among the primary targets, but the global nature of the threats suggests other nations may be at risk. The motives behind these incidents range from espionage and financial gain to political disruption.

Government officials and cybersecurity firms are working to contain the breaches and prevent further damage. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued alerts to federal agencies and critical infrastructure operators, urging them to implement defensive measures and monitor for signs of compromise.

The full extent of the damage remains unclear as investigations continue. Questions persist regarding the coordination between the different threat actors and whether a single entity is orchestrating the attacks. Additionally, the potential for long-term impact on critical infrastructure and national security is under review.

As of now, no specific attribution has been made public, and the identities of the groups behind the attacks remain under investigation. The international community is monitoring the situation closely, with calls for increased cooperation to combat the growing threat of cyber warfare.