Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ABTV

10/8/2019
07:00 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

UK Spy Agency Warns About VPN Hacking

Advanced persistent threat actors linked to the Chinese government are attacking enterprise VPN servers from Fortinet, Palo Alto Networks and Pulse Secure.

Advanced persistent threat (APT) actors linked to the Chinese government are attacking enterprise VPN servers from Fortinet, Palo Alto Networks and Pulse Secure according to the UK's National Cyber Security Centre (NCSC).

They say that the activity is ongoing, and targets both UK and international organizations. Affected sectors were found to include government, military, academic, business and healthcare.

The APTs have been targeting several vulnerabilities, including CVE-2019-11510 and CVE-2019-11539 (affecting Pulse Secure products), CVE-2018-13379, CVE-2018-13382 and CVE-2018-13383 (affecting Fortinet products), and CVE-2019-1579 (affecting Palo Alto Networks).

Orange Tsai and Meh Chang of the research team at security consulting firm DEVCORE first identified the vulnerabilities this summer.

They described it as, "The bug is very straightforward. It is just a simple format string vulnerability with no authentication required! The sslmgr is the SSL gateway handling the SSL handshake between the server and clients. The daemon is exposed by the Nginx reverse proxy and can be touched via the path /sslmgr. During the parameter extraction, the daemon searches the string scep-profile-name and pass its value as the snprintf format to fill in the buffer. That leads to the format string attack. You can just crash the service with %n!" Palo Alto Networks GlobalProtect, Fortinet FortiGate (FortiOS), and Pulse Secure's Pulse Connect Secure (PCS) and Pulse Policy Secure (PPS) ended up being affected. The vendors released software patches for their users, even though they were not aware of any real-world use of the vulnerabilities at the time.

But, in September, Microsoft's Threat Intelligence Center tweeted that it had observed attacks using these vulnerabilities since July. It identified the threat actors as APT5. This group has been active since 2007 concentrating on telecommunications and technology companies in Asia.

No threat actor was directly named by the NCSC advisory.\r\nBasic mitigation of the problem is outlined, however. NCSC says to (1) patch and (2) "Reset authentication credentials associated with affected VPNs and accounts connecting through them."

The advisory also says that, "The NCSC strongly recommends that organizations previously targeted by APT actors, or which have detected successful exploitation of their VPNs" carry out some additional steps.

VPN: "Check all configuration options for unauthorised changes. This includes the SSH authorized_keys file, new iptables rules and commands set to run on connecting clients."

Log analysis and monitoring: "Review and continue to monitor logs for the VPN, network traffic and services users connect to through the VPN such as email. Check for connections from uncommon IP addresses, particularly those with successful logins or large data lengths returned."

2FA: "Where possible, enable two-factor authentication for the VPN to defend against password replay attacks."

The advisory shows that threats may be discovered and then exploited by threat actors after a time period. Even a patch from the vendor does not absolve the user from applying that patch throughout the possibly targeted system.

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-12777
PUBLISHED: 2020-08-10
A function in Combodo iTop contains a vulnerability of Broken Access Control, which allows unauthorized attacker to inject command and disclose system information.
CVE-2020-12778
PUBLISHED: 2020-08-10
Combodo iTop does not validate inputted parameters, attackers can inject malicious commands and launch XSS attack.
CVE-2020-12779
PUBLISHED: 2020-08-10
Combodo iTop contains a stored Cross-site Scripting vulnerability, which can be attacked by uploading file with malicious script.
CVE-2020-12780
PUBLISHED: 2020-08-10
A security misconfiguration exists in Combodo iTop, which can expose sensitive information.
CVE-2020-12781
PUBLISHED: 2020-08-10
Combodo iTop contains a cross-site request forgery (CSRF) vulnerability, attackers can execute specific commands via malicious site request forgery.