![]() The research revealed that “since the issues uncovered are the result of insecure design practices affecting core system functionality, many of them will remain unpatched in production environments for a significant amount of time.” The OT:ICEFALL issues primarily affect level 1 and 2 devices and could be used in OT-specific attacks targeting those devices. Unpatched systems exploited by hackers also surfaced in Forescout’s research this week that disclosed the presence of 56 vulnerabilities caused by insecure-by-design practices called OT:ICEFALL, affecting devices from ten OT (operational technology) vendors. In one confirmed compromise, these APT actors were able to move laterally inside the network, gain access to a disaster recovery network, and collect and exfiltrate sensitive data,” it added. “As part of this exploitation, suspected APT actors implanted loader malware on compromised systems with embedded executables enabling remote command and control (C2). “Since December 2021, multiple threat actor groups have exploited Log4Shell on unpatched, public-facing VMware Horizon and UAG servers,” according to a joint Cybersecurity Advisory issued on Thursday. Additionally, cybercriminals breached these loopholes to obtain initial access to organizations that did not apply available patches or workarounds. Cybersecurity and Infrastructure Security Agency (CISA) and the Coast Guard Cyber Command (CGCYBER) said that cyber hackers, including state-sponsored advanced persistent threat (APT) hackers, have continued to exploit CVE-2021-44228 ( Log4Shell) in VMware Horizon and Unified Access Gateway (UAG) servers.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |