Threat actors target and abuse VPN flaws because VPNs are often used to secure sensitive data and communications, making them valuable targets for exploitation.
By exploiting the VPN flaws, threat actors can gain unauthorized access to networks, intercept confidential data, and launch various cyber attacks.
CISA (The Cybersecurity and Infrastructure Security Agency), along with the following partners, recently warned that hackers are actively exploiting multiple vulnerabilities (CVE-2023-46805, CVE-2024-21887, and CVE-2024-21893) in Ivanti VPN:-
The Ivanti gateways have serious vulnerabilities impacting all supported versions (9.x and 22.x), enabling attackers to bypass authentication, execute commands, and evade detection.
CISA found Ivanti’s ICT systems failed to detect the compromise, due to which they urged network defenders to assume credential compromise and perform the following tasks:-
Organizations should be wary of rootkit-level persistence even after factory resets, as sophisticated threat actors may remain undetected for extended periods.
Due to significant risks, it’s strongly advised to reconsider using Ivanti Connect Secure and Policy Secure gateways in enterprise environments.
CISA responded to Ivanti vulnerabilities by detecting the threat actors exploiting CVEs to implant web shells and harvest credentials.
Post-compromise threat actors used Ivanti-native tools like freerdp and SSH for lateral movement, which led to full domain compromises.
Ivanti’s ICT failed to detect the compromise, while the integrity checker and forensic analysis proved unreliable. Cybercriminals could erase traces by highlighting the unreliability of the ICT scans in indicating compromise.
Independent research validated Ivanti’s ICT insufficiency that allows cyber threat actors to persist even after factory resets and upgrades.
Here below, we have mentioned all the mitigations provided by the cybersecurity researchers:-
You can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, with Perimeter81 malware protection. All are incredibly harmful, can wreak havoc, and damage your network.
Subscribe on LinkedInA groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently detailed…
Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria Stealer,"…
Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton Pass,…
The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly sophisticated…
Proofpoint researchers have identified a marked increase in phishing campaigns and malicious domain registrations designed…
A recent investigation by Unit 42 of Palo Alto Networks has uncovered a sophisticated, state-sponsored…