Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Outside the zero day violation exposes 17 SAAS customers using the compromised API key
Global Security

Outside the zero day violation exposes 17 SAAS customers using the compromised API key

AdminBy AdminFebruary 1, 2025No Comments2 Mins Read
BeyondTrust Zero-Day Breach
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


01 February 2025Red LakshmananVulnerability / zero day

Outside the zero day violation

Beyondtrust found that he had completed an investigation into a recent cybersecurity incident that sent some deleted SAAS support cases using the compromised API key.

The company said the violation provided 17 remote support for SAAS customers, and that the API key was used to include unauthorized access by dropping local applications. The violation was first noted on December 5, 2024.

“The investigation has determined that the vulnerability of the zero day of the third application was used to receive access to the Internet action on the account outside AWS,” the company – Note This week.

“Then access to this asset allowed the actor threatening to receive the API infrastructure key, which can then be used against a separate AWS account, which managed the remote support infrastructure.”

Cybersecurity

The American access management company did not name an application that was studied to obtain the API key but stated that the probe had discovered two separate ones in its products (Cve-2014-12356 and Cve-2014-12686).

Since then, beyondtrust has recalled the compromised API key and suspended all known cases of affected customers, as well as providing them with alternative deleted specimens of SAAS.

It is worth noting that the US Cybersecurity and infrastructure agencies (CISA) added both the CVE-2024-12356 and the CVE-2024-12686 to its famous vulnerability (KEV), citing evidence of active exploitation in the wild. The exact details of the malicious activity are currently unknown.

Development occurs as the US Finance Ministry – Note It was one of the affected parties. No other federal agencies are influenced.

The attacks were associated with a Chinese hacking group called the Silk Typhoon (formerly Hafnium), with the agency By imposing sanctions Against a cyber-actor based in Shanghai, nicknamed Yin Kechen for his allegedly involved in the abuse of the Treasury.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025

RCE Critical Error RCE Rate 9.9 CVSS in Backup and Replication

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.