Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025

How to protect backups

June 17, 2025

Silver Fox Apt has on target Taiwan with sophisticated GH0Stcringe and Holdinghands Rats Malicious Programs

June 17, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Cisco confirms that the Typhoon Salt is operated by CVE-2018-0171 to navigate US telecommunications networks
Global Security

Cisco confirms that the Typhoon Salt is operated by CVE-2018-0171 to navigate US telecommunications networks

AdminBy AdminFebruary 21, 2025No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


February 21, 2025Red LakshmananNetwork security / vulnerability

Cisco has confirmed that the Chinese actor threats known as the Salt Typhoon have access to the infamous lack of security that traced as Cve-2018-0171And, having received legal accounts to enter the target company aimed at large telecommunications companies.

“Then the actor threats demonstrated his ability to maintain targeted conditions for equipment from multiple suppliers over a long period, keeping access to one instance for three years,” – Cisco Talos – NoteDescribing hackers as very complex and well -funded.

Cybersecurity

“The long term of this company involves the high degree of coordination, planning and patience-standard signs of an advanced sustainable threat (APT) and state subjects.”

Major networking equipment said she did not show evidence that other known security mistakes were armed with a hacking crew disclosed Operating attempts, which include deficiencies, are tracked both CVE-2013-20198 and CVE-2013-20273 to penetrate the network.

An important aspect of the company is the use of real, abducted powers to gain initial access, although at this stage it is unknown how they are purchased. The threatening actor is also observed by making efforts to get powers through networking configurations and deciphering local accounts with weak password types.

“In addition, we watched the actor threatens SNMP, Tacacs and Radius Traffic, including secret keys used between network devices and Tacac/Radius servers,” Tolos said. “The intention of this capture of traffic is almost certainly listing additional credentials for subsequent use.”

Another characteristic behavior expressed by the salt typhoon entails the use of resting methods (Lotl) on network devices, abusing the trusted infrastructure, because turns show to jump from one telecommunications to another.

It is suspected that these devices are used as an intermediate relay to achieve the intended final goal or as the first jump over the weekend operation as it offers the opponent to go unnoticed over a long period of time.

In addition, Salt Typhoon was seen on a configuration that changes networking, to create local accounts, enabling the guest shells and relief through SSH. Also used is the use of utility named JumbleDPath, which allows them to execute the sunset on the remote Cisco device through the actor, defined by the jump.

On the basis of Go Binary is also able to clear the logs and disable registration in an attempt to dimming traces of harmful activity and complicates forensic analysis. This is supplemented by the periodic steps that are carried out to destroy the relevant magazines, including .bash_history, Auth.log, Lastlog, WTMP and BTMP where it is applicable.

Cybersecurity

“The use of this utility will help stop the original source and the final destination of the request, as well as allow its operator to move through potentially non-public, which do not spread (either regularly) devices or infrastructure,” Cisco said.

“The actor threats repeatedly modified the Loopback Interface Address on the Combinable switch and used this interface as a SSH connection source with additional devices in the target environment, allowing them to be effectively bypassing access control lists (ACL) on these devices”

The company stated that it also determined the “additional common target” of Cisco devices with an open reasonable installation (SMI), after which the CVE-2018-0171 operation is operated. The activity, it is noted, is not related to the salt typhoon and does not share the overlapping with any famous actor and the threat group.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025

How to protect backups

June 17, 2025

Silver Fox Apt has on target Taiwan with sophisticated GH0Stcringe and Holdinghands Rats Malicious Programs

June 17, 2025

Google warns about scattered spider attacks focused on IT -commander by US insurance firms

June 17, 2025

Password “B” in Sitecore XP Sparks Sparks Erriss RCE when deploying businesses

June 17, 2025

Are you forgotten accounts of advertising services that leave you risk?

June 17, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025

How to protect backups

June 17, 2025

Silver Fox Apt has on target Taiwan with sophisticated GH0Stcringe and Holdinghands Rats Malicious Programs

June 17, 2025

Google warns about scattered spider attacks focused on IT -commander by US insurance firms

June 17, 2025

Password “B” in Sitecore XP Sparks Sparks Erriss RCE when deploying businesses

June 17, 2025

Are you forgotten accounts of advertising services that leave you risk?

June 17, 2025

New Flodrix Botnet Option Operates Langflow Ai Server RCE BUG to launch DDOS ATTACKS

June 17, 2025

Lack of the TP-Link Cve-2023-33538 router under active operation, CISA releases an immediate warning

June 17, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025

How to protect backups

June 17, 2025

Silver Fox Apt has on target Taiwan with sophisticated GH0Stcringe and Holdinghands Rats Malicious Programs

June 17, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.