Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » More than 2,000 Palo Alto Networks devices have been compromised in the current campaign of attacks
Global Security

More than 2,000 Palo Alto Networks devices have been compromised in the current campaign of attacks

AdminBy AdminNovember 21, 2024No Comments2 Mins Read
Palo Alto Networks Devices
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


November 21, 2024Ravi LakshmananVulnerability / Cyber ​​attack

Palo Alto Networks

As many as 2,000 Palo Alto Networks devices is evaluated was compromised as part of a campaign to exploit recently discovered security flaws that were widely exploited in the wild.

According to statistics In association with the Shadowserver Foundation, the majority of infections were reported in the US (554) and India (461), followed by Thailand (80), Mexico (48), Indonesia (43), Turkey (41), the United Kingdom (39), Peru ( 36) and South Africa (35).

Earlier this week Censys revealed that it identified 13,324 open next-generation firewall (NGFW) management interfaces, of which 34% are in the US. However, it is important to note that not all of these open hosts are vulnerable.

Cyber ​​security

The flaws in questionCVE-2024-0012 (CVSS Score: 9.3) and CVE-2024-9474 (CVSS Score: 6.9) are a combination of authentication bypass and elevation of privilege that could allow an attacker to perform malicious actions, including modifying configurations and executing arbitrary code.

Palo Alto Networks, which is tracking the initial exploitation of the flaws, called Operation Lunar Peek, said they are using the weapon to execute commands and drop malware, such as PHP-based web shells, onto breached firewalls.

The network security vendor also warned that cyber-attacks targeting security flaws could increase after an exploit that combines them emerges.

To that end it is said it “estimates with moderate to high confidence that the functional exploit associated with CVE-2024-0012 and CVE-2024-9474 is in the public domain, which would allow broader threat action.”

Cyber ​​security

In addition, he noted that both manual and automatic scans are observed, requiring users to apply the latest patches as soon as possible and ensure access to the management interface according to recommended deployment guidelines.

This includes, in particular, restricting access to only trusted internal IP addresses to prevent external access from the Internet.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025

Breaking: 7000-Delicious Proxy using iol Systems Systems

May 9, 2025

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.