![]() Pulse Secure VPN devices are currently being targeted by four new malware tools. ![]() E3 is the most important yearly trade show the USD 78.5 billion videogame industry. (Photo : Photo by David McNew/Getty Images) People in the audience are illuminated by the screens of their laptop computers during the Sony press conference on the eve of the Electronic Entertainment Expo (E3) on Jin Los Angeles, California. The Chaos Computer Club is Europe's biggest network of computer hackers and its annual congress draws up to 3,000 participants. This story was first published on CNN.(Photo : Photo by Adam Berry/Getty Images) A particpant checks a circuit board next to an oscilloscope on the first day of the 28th Chaos Communication Congress (28C3) - Behind Enemy Lines computer hacker conference on Decemin Berlin, Germany. "We will continue to provide guidance and recommendations to support potentially impacted organizations." to better understand the vulnerability in Pulse Secure VPN devices and mitigate potential risks to federal civilian and private sector networks," Nicky Vogt, an agency spokesperson, said Tuesday. "CISA has been working closely with Ivanti, Inc. It added: "Customers are also encouraged to apply and leverage the efficient and easy-to-use Pulse Secure Integrity Checker Tool to identify any unusual activity on their system."ĭHS' Cybersecurity and Infrastructure Security Agency said that since March 31, it has assisted "multiple entities" whose vulnerable products have been exploited by a cyber threat actor. "The PCS team has provided remediation guidance to these customers directly." "The Pulse Connect Secure (PCS) team is in contact with a limited number of customers who have experienced evidence of exploit behavior on their PCS appliances," Pulse Secure said. Software patches already exist for the other vulnerabilities. In a blog post, Pulse Secure said the newly discovered flaw affects a "very limited number of customers" and that a more permanent software update to address that vulnerability will be issued in early May. Other actors have exploited the vulnerabilities as well, though FireEye said it's unclear whether they may be linked to a particular government. The group conducting those attacks may be working for the Chinese government, the report said, and Carmakal added that "there are some similarities between portions of this activity and a Chinese actor we call APT5." Some of the intrusions using the vulnerabilities began as early as August of last year, according to FireEye's report. "These actors are highly skilled and have deep technical knowledge of the Pulse Secure product," Carmakal said. The attackers who exploited Pulse Secure are extremely sophisticated and used their access to steal account credentials and other sensitive data belonging to victim organizations, said Charles Carmakal, FireEye's senior vice president. The US Department of Homeland Security confirmed the intrusions in its own public advisory Tuesday, urging network administrators to run a special tool designed to scan for signs of compromise and to install an emergency workaround published by Ivanti, the owner of Pulse Secure. Tuesday's revelations represent the latest cybersecurity crisis to hit the US, following the SolarWinds intrusion campaign by Russia's foreign intelligence service and a raft of server software exploits that Microsoft has attributed to Chinese state-sponsored hackers. The alarming report highlights how hackers repeatedly took advantage of several known flaws and one newly discovered vulnerability in Pulse Secure VPN, a widely used remote connectivity tool, to gain access to dozens of organizations in the defense industrial sector. (CNN) - For months, hackers with suspected ties to China have exploited a popular workplace tool to break into government agencies, defense companies and financial institutions in the US and Europe, according to a report by the cybersecurity firm FireEye.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |