AI
AI

Fortinet Acknowledges Zero-Day Vulnerability Exploited in Attacks on Its Firewalls

Photo credit: www.csoonline.com

Analysis of Recent Cyber Intrusions by Arctic Wolf

Recent observations by Arctic Wolf have brought to light concerning patterns in login events associated with cyber intrusions. The attackers employed spoofed source IP addresses during their activities, including the local loopback address 127.0.0.1 and public DNS resolver IPs from major providers, such as Google and Cloudflare (1.1.1.1, 2.2.2.2, 8.8.8.8, and 8.8.4.4). In certain instances, the attackers neglected to properly disguise their origin, inadvertently exposing addresses that linked back to a virtual private server (VPS) provider.

The initial phase of these attacks involved a series of brief login and logout attempts that appeared random and targeted a wide range of organizations across different industries. After this initial reconnaissance, the attackers revisited the compromised systems to implement configuration changes. These changes began with modifications to display settings that govern output across multiple pages in the jsconsole.

Subsequently, the attackers escalated their activities by creating new superadmin accounts, often employing naming patterns of five to six characters. Utilizing these superadmin privileges, they established as many as six local user accounts on each device, again following a similar naming convention. These accounts were integrated into existing user groups that had SSL VPN access, effectively expanding the attackers’ foothold within the target networks. In some reported cases, they also seized existing accounts or reset the password for guest accounts, adding these to the SSL VPN group as well.

This series of events highlights the sophisticated strategies employed by cyber attackers in infiltrating systems, making it imperative for organizations to bolster their cybersecurity measures and monitor user account activities closely.

Source
www.csoonline.com

Related by category

Cybersecurity Leaders Condemn ‘Political Persecution’ of Chris Krebs in Letter to the President

Photo credit: www.csoonline.com In November 2018, President Trump appointed Chris...

Broadcom-Supported SAN Devices Vulnerable to Code Injection Attacks Due to Critical Fabric OS Flaw

Photo credit: www.csoonline.com Critical Vulnerability Found in Broadcom’s Brocade Fabric...

Cyberattack on berlin.de | CSO Online

Photo credit: www.csoonline.com Cyberangriff auf Berlins Info- und Serviceportal berlin.de Ende...

Latest news

Firefly’s Rocket Experiences One of the Most Unusual Launch Failures in History

Photo credit: arstechnica.com Firefly Aerospace's Alpha Rocket: Navigating a Niche...

Saskatchewan Students Experience Hands-On Automotive Training

Photo credit: globalnews.ca On Tuesday, April 29th, the Saskatchewan Distance...

NASA Assembles Specialists to Explore Advancements in Astrophysics Technologies

Photo credit: www.nasa.gov The Future of Astrophysics: Harnessing Emerging Technologies The...

Breaking news