Friday, December 27, 2024
HomeCVE/vulnerabilityMassive Cyber Attack Across the World Against ISPs & Data Centres: More...

Massive Cyber Attack Across the World Against ISPs & Data Centres: More than 200,000 Cisco Switches Hacked

Published on

SIEM as a Service

Biggest Hackers Group Performing Massive Cyber attack against internet service providers, and data centers around the world by compromising Cisco switches.

Hackers compromised more than 200,000 Cisco devices across the world in this widespread attack, including 3,500 switches in Iran country.

A recently discovered  Remote Code Execution flaw that affected the Cisco switches  Smart Install Client allows an attacker to gain full control of the Vulnerable Cisco switch deployed networks.

- Advertisement - SIEM as a Service

Iranian & Russian countries are mainly affected and hackers have left the image of a U.S. flag on screens that also contains a warning message: “Don’t mess with our elections”

This Cyber Attack initially hit the Internet service providers and stop the web access for subscribers by exploiting the vulnerability in Cisco switches that contains a critical Remote code execution Flaw.

This Attack was initiated by an unknown threat actor that is exploiting a vulnerability in a piece of software called Cisco Smart Install Client, which allows them to run arbitrary code and this leads the attacker to reset the vulnerable Cisco Switches to its default configuration.

Based on the Cisco investigation using Shodan and they were identified more than 168,000 systems have already been successfully exploited and another investigation made by Tenable Security revealed 251,000 exposed Cisco Smart Install Clients around the world.

According to Motherboard Report, The hackers said they did scan many countries for vulnerable systems, including the UK, US, and Canada, but only “attacked” Russia and Iran, perhaps referring to the post of an American flag and their message.

Iran’s IT Minister Mohammad Javad Azari-Jahromi posted a picture of a computer screen on Twitter with the image of the U.S. flag and the hackers’ message.

He said it was not yet clear who had carried out the Cyber Attack.

He said in another Tweet, “Approximately 3,500 routers come from a total of hundreds of thousands of nationwide network routers affected by the Cyber Attack.The performance of companies has been evaluated in repelling and restoring normal conditions. Weakness in informing the skilled center to companies and the weakness in the configuration of data centers have been”

Based on the Reuters Statment, This Cyber Attack mainly affected  Europe, India and the United States, in this case, Some 55,000 devices were affected in the United States and 14,000 in China.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Araneida Scanner – Hackers Using Cracked Version Of Acunetix Vulnerability Scanner

Threat Analysts have reported alarming findings about the "Araneida Scanner," a malicious tool allegedly...

A Dark Web Operation Acquiring KYC Details TO Bypass Identity Verification Systems

A major dark web operation dedicated to circumventing KYC (Know Your Customer) procedures, which...

Adobe Warns of ColdFusion Vulnerability Allows Attackers Read arbitrary files

Adobe has issued a critical security update for ColdFusion versions 2023 and 2021 to...

Beware of New Malicious PyPI packages That Steals Login Details

Two malicious Python packages, Zebo-0.1.0 and Cometlogger-0.1, were recently detected by Fortinet's AI-driven OSS...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

North Korean Hackers Stolen $2.2 Billion From Crypto Platforms In 2024

Cryptocurrency hacking incidents in 2024 surged 21.07% YoY to $2.2 billion, with 303 breaches...

IBM AIX TCP/IP Vulnerability Lets Attackers Exploit to Launch Denial of Service Attack

IBM has issued a security bulletin warning of two vulnerabilities in its AIX operating...

Apache Auth-Bypass Vulnerability Lets Attackers Gain Control Over HugeGraph-Server

The Apache Software Foundation has issued a security alert regarding a critical vulnerability...