Spy groups hack into companies using zero-day flaw in Pulse Secure VPN

Spy groups hack into companies using zero-day flaw in Pulse Secure VPN

Over the past few months, several cyberespionage groups, including one believed to be tied to the Chinese government, have been breaking into the networks of organizations from the United States and Europe by exploiting vulnerabilities in VPN appliances from zero-trust access provider Pulse Secure. Some of the flaws date from 2019 and 2020, but one was unknown until this month.

[ Keep up with 8 hot cyber security trends (and 4 going cold). Give your career a boost with top security certifications: Who they're for, what they cost, and which you need. | Sign up for CSO newsletters. ]

"Mandiant is currently tracking 12 malware families associated with the exploitation of Pulse Secure VPN devices," researchers from Mandiant, the MDR and incident response arm of security vendor FireEye, said in a newly released report. "These families are related to the circumvention of authentication and backdoor access to these devices, but they are not necessarily related to each other and have been observed in separate investigations. It is likely that multiple actors are responsible for the creation and deployment of these various code families."

To read this article in full, please click here



Support the originator by clicking the read the rest link below.