Cyber security news for all

More

    Cisco Cautions of Global Surge in Aggressive Force Attacks Targeting VPN and SSH Services

    Cisco issues a caution concerning a worldwide surge in aggressive force assaults directed towards various apparatuses, encompassing Virtual Private Network (VPN) services, web application authentication interfaces, and SSH services, as of March 18, 2024.

    “TOR exit nodes and a spectrum of other anonymizing tunnels and proxies appear to be the origins of these assaults,” remarked Cisco Talos.

    Triumph in these assaults could clear the path for unsanctioned network entry, account lockouts, or conditions of denial-of-service, the cybersecurity corporation appended.

    These assaults, proclaimed as expansive and opportunistic, have been spotted zeroing in on the subsequent apparatuses –

    • Cisco Secure Firewall VPN
    • Checkpoint VPN
    • Fortinet VPN
    • SonicWall VPN
    • RD Web Services
    • Mikrotik
    • Draytek
    • Ubiquiti

    Cisco Talos delineated the aggressive force attempts as employing both generic and valid usernames for distinct organizations, with the assaults targeting a vast spectrum of sectors globally in a non-selective manner.

    The origin IP addresses for the flux are typically linked with proxy amenities. This encompasses TOR, VPN Gate, IPIDEA Proxy, BigMama Proxy, Space Proxies, Nexus Proxy, and Proxy Rack, among others.

    The exhaustive index of indicators connected with the activity, such as the IP addresses and the usernames/passwords, is accessible here.

    This development emerges as the significant networking equipment provider cautioned against password spray assaults targeting remote access VPN services as a part of reconnaissance endeavors.

    It ensues a notification from Fortinet FortiGuard Labs indicating that threat actors persist in exploiting a now-rectified security vulnerability affecting TP-Link Archer AX21 routers (CVE-2023-1389, CVSS score: 8.8) to disseminate DDoS botnet malware families such as AGoent, Condi, Gafgyt, Mirai, Miori, and MooBot.

    “As customary, botnets tenaciously target IoT vulnerabilities, perpetually endeavoring to exploit them,” articulated security researchers Cara Lin and Vincent Li.

    “End-users ought to remain vigilant against DDoS botnets and expeditiously implement patches to safeguard their network environments from infection, thereby forestalling their transformation into bots for malicious threat actors.”

    Recent Articles

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here