Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Chinese hackers are exploiting a Cisco Zero-Day switch flaw to gain control of the system
Global Security

Chinese hackers are exploiting a Cisco Zero-Day switch flaw to gain control of the system

AdminBy AdminAugust 22, 2024No Comments2 Mins Read
Chinese Hackers
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


August 22, 2024Ravi LakshmananNetwork Security / Zero-Day

Chinese hackers

Details have emerged of the China-nexus threat group using a recently disclosed, now patched, security flaw in Cisco switches as a zero-day to seize control of the device and evade detection.

Activity attributed to the Velvet Ant was seen earlier this year and involved weapons CVE-2024-20399 (CVSS Score: 6.0) to deliver custom malware and gain extensive control over the compromised system, facilitating both data theft and permanent access.

“The zero-day exploit allows an attacker with valid administrator credentials for the switch management console to bypass the NX-OS command-line interface (CLI) and execute arbitrary commands on the underlying Linux operating system,” cybersecurity firm Sygnia said. the report shared with The Hacker News.

Cyber ​​security

Velvet ant first caught the attention of Israeli cybersecurity researchers in a multi-year campaign targeting an unnamed organization located in East Asia using legacy F5 BIG-IP devices as a vantage point to configure security in a compromised environment.

A hidden exploit in the CVE-2024-20399 threat came to light early last month, prompting Cisco to release security updates to address the flaw.

Chinese hackers

Notable among the tradecraft is the level of sophistication and shape-shifting tactics adopted by the group, initially infiltrating newer Windows systems before moving on to older Windows servers and network devices in an attempt to fly under the radar.

“The shift to operating from internal network devices represents another escalation of the evasion techniques used to ensure the continuation of the espionage campaign,” Signia said.

The latest attack chain involves compromising a Cisco switch using CVE-2024-20399 and performing reconnaissance, then moving to more network devices and eventually executing a backdoored binary using a malicious script.

Cyber ​​security

The payload, named VELVETSHELL, is a combination of two open source tools, a Unix backdoor called A tiny shell and called proxy utility 3 proxy. It also supports the ability to execute arbitrary commands, download/upload files, and establish tunnels to proxy network traffic.

“Velvet Ant’s modus operandi highlights the risks and issues surrounding third-party devices and software within organizations,” the company said. “Due to the ‘black box’ nature of many devices, every piece of hardware or software can become an attack surface that an adversary can exploit.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025

Breaking: 7000-Delicious Proxy using iol Systems Systems

May 9, 2025

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.