• Login
Whats Current In
No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

Iranian hackers breach US aviation org via Zoho, Fortinet bugs

Sergiu Gatlan by Sergiu Gatlan
September 7, 2023
Reading Time: 3 mins read
0
Iranian hackers breach US aviation org via Zoho, Fortinet bugs

Hackers airplane

RELATED POSTS

Amazon sends Mastercard, Google Play gift card order emails by mistake

Meet LostTrust ransomware — A likely rebrand of the MetaEncryptor gang

New Marvin attack revives 25-year-old decryption flaw in RSA

Image: Midjourney

State-backed hacking groups have breached a U.S. aeronautical organization using exploits targeting critical Zoho and Fortinet vulnerabilities, a joint advisory published by CISA, the FBI, and the United States Cyber Command (USCYBERCOM) revealed on Thursday.

The threat groups behind this breach are yet to be named, but while the joint advisory didn’t connect the attackers to a specific state, USCYBERCOM’s press release links the malicious actors to Iranian exploitation efforts.

CISA was part of the incident response between February and April and said the hacking groups had been in the compromised aviation organization’s network since at least January after hacking an Internet-exposed server running Zoho ManageEngine ServiceDesk Plus and a Fortinet firewall.

“CISA, FBI, and CNMF confirmed that nation-state advanced persistent threat (APT) actors exploited CVE-2022-47966 to gain unauthorized access to a public-facing application (Zoho ManageEngine ServiceDesk Plus), establish persistence, and move laterally through the network,” reads the advisory.

“This vulnerability allows for remote code execution on the ManageEngine application. Additional APT actors were also observed exploiting CVE-2022-42475 to establish presence on the organization’s firewall device.”

Buy JNews
ADVERTISEMENT

As the three U.S. agencies warn, these threat groups frequently scan for vulnerabilities on Internet-facing devices unpatched against critical and easy-to-exploit security bugs.

After infiltrating a target’s network, the attackers will maintain persistence on hacked network infrastructure components. These network devices will likely be used as stepping stones for lateral movement within the victims’ networks, as malicious infrastructure, or a combination of both.

Network defenders are advised to apply mitigations shared within today’s advisory and NSA-recommended best practices for securing infrastructure.

They include but are not limited to securing all systems against all known exploited vulnerabilities, monitoring for unauthorized use of remote access software, and removing unnecessary (disabled) accounts and groups (especially privileged accounts).

Previous attacks and warnings to secure systems

CISA ordered federal agencies to secure their systems against CVE-2022-47966 exploits in January, days after threat actors started targeting unpatched ManageEngine instances exposed online to open reverse shells after proof-of-concept (PoC) exploit code was released online.

Months after CISA’s warning, the North Korean Lazarus hacking group also started exploiting the Zoho flaw, successfully breaching healthcare organizations and an internet backbone infrastructure provider.

The FBI and CISA issued multiple other alerts (1, 2) regarding state-backed groups exploiting ManageEngine flaws to target critical infrastructure, including financial services and healthcare.

The CVE-2022-42475 FortiOS SSL-VPN vulnerability was also exploited as a zero-day in attacks against government organizations and related targets, as Fortinet disclosed in January.

Fortinet also cautioned that additional malicious payloads were downloaded onto the compromised devices during the attacks, payloads that could not be retrieved for analysis.

Customers were first urged to patch their appliances against ongoing attacks in mid-December after Fortinet quietly fixed the bug on November 28 without releasing information that it was already being exploited in the wild.

Share54Tweet34Pin12
Sergiu Gatlan

Sergiu Gatlan

Related Posts

Amazon sends Mastercard, Google Play gift card order emails by mistake
Cyber Security

Amazon sends Mastercard, Google Play gift card order emails by mistake

October 1, 2023
Meet LostTrust ransomware — A likely rebrand of the MetaEncryptor gang
Cyber Security

Meet LostTrust ransomware — A likely rebrand of the MetaEncryptor gang

October 1, 2023
New Marvin attack revives 25-year-old decryption flaw in RSA
Cyber Security

New Marvin attack revives 25-year-old decryption flaw in RSA

October 1, 2023
Hotel hackers redirect guests to fake Booking.com to steal cards
Cyber Security

Hotel hackers redirect guests to fake Booking.com to steal cards

September 23, 2023
BlackCat ransomware hits Azure Storage with Sphynx encryptor
Cyber Security

BlackCat ransomware hits Azure Storage with Sphynx encryptor

September 17, 2023
Caesars Entertainment confirms ransom payment, customer data theft
Cyber Security

Caesars Entertainment confirms ransom payment, customer data theft

September 14, 2023

Recommended Stories

Kuo: Apple to Launch Redesigned HomePod With 7-Inch Display in 2024

Kuo: Apple to Launch Redesigned HomePod With 7-Inch Display in 2024

March 10, 2023
Amazon sends Mastercard, Google Play gift card order emails by mistake

Amazon sends Mastercard, Google Play gift card order emails by mistake

October 1, 2023

Instagram Is Testing Photo Albums, Because Nothing Is Sacred Anymore

September 21, 2022

Popular Stories

  • Facts and myths about the warriors who raided Europe and explored the New World

    137 shares
    Share 55 Tweet 34
  • A Brief History of All the Women Who Have Won the Nobel Prize

    136 shares
    Share 54 Tweet 34
  • Will XRP make a comeback after the recent price decline? Data suggests…

    136 shares
    Share 54 Tweet 34
  • Gowalla returns to see if location-based networking is ready for its mainstream moment

    136 shares
    Share 54 Tweet 34
  • Saudi Arabia Seeks U.S. Security Pledges, Nuclear Help for Peace with Israel

    136 shares
    Share 54 Tweet 34
Whats Current In

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Visit our landing page to see all features & demos.

LEARN MORE »

Recent Posts

  • Solana’s TVL surges: Will the momentum last?
  • Is Shiba Inu about to fall off the Top 20 list?
  • Ethereum Classic reclaims $16: Will traders go long?

Categories

  • Apple Computer
  • Blockchain
  • Cyber Security
  • Tech News
  • Venture Capital

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?