wp-plugin-hostgator
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114ol-scrapes
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114Source:https:\/\/techcrunch.com\/2023\/04\/19\/russian-hackers-exploit-six-year-old-cisco-flaw-to-target-us-government-agencies\/<\/a><\/br> APT28, a state-sponsored hacking group operated by Russian military intelligence, is exploiting a six-year-old vulnerability in Cisco routers to deploy malware and carry out surveillance, according to the U.S. and U.K. governments.<\/p>\n In a joint advisory<\/a> issued on Tuesday, U.S. cybersecurity agency CISA along with the FBI, the NSA and the U.K.\u2019s National Cyber Security Center detail how the Russia-backed hackers exploited Cisco router vulnerabilities throughout 2021 with the aim of targeting European organizations and U.S. government institutions. The advisory said the hackers also hacked \u201capproximately 250 Ukrainian victims,\u201d which the agencies did not name.<\/p>\n APT28, also known as Fancy Bear<\/a>,\u00a0is known for carrying out a range of cyberattacks<\/a>,\u00a0espionage<\/a> and hack-and-leak information operations<\/a> on behalf of the Russian government.<\/p>\n According to the joint advisory, the hackers exploited a remotely exploitable vulnerability<\/a> patched by Cisco in 2017 to deploy a custom-built malware dubbed \u201cJaguar Tooth,\u201d which is designed to infect unpatched routers.<\/p>\n To install the malware, the threat actors scan for internet-facing Cisco routers using a default or easy-to-guess SNMP community string.<\/p>\n SNMP, or Simple Network Management Protocol, allows network administrators to remotely access and configure routers in place of a username or password, but can also be misused to obtain sensitive network information.<\/p>\n Once installed, the malware exfiltrates information from the router and provides stealthy backdoor access to the device, the agencies said.<\/p>\n Matt Olney, director of threat intelligence at Cisco Talos, said in a blog post<\/a> this campaign is an example of \u201ca much broader trend of sophisticated adversaries targeting networking infrastructure to advance espionage objectives or pre-position for future destructive activity.\u201d<\/p>\n \u201cCisco is deeply concerned by an increase in the rate of high-sophistication attacks on network infrastructure \u2014 that we have observed and have seen corroborated by numerous reports issued by various intelligence organizations \u2014 indicating state-sponsored actors are targeting routers and firewalls globally,\u201d Olney said.<\/p>\n Olney added that in addition to Russia, China has also been spotted attacking network equipment in several campaigns.<\/p>\n Earlier this year, Mandiant reported<\/a> that Chinese state-backed attackers exploited a zero-day vulnerability in Fortinet devices to carry out a series of attacks on government organizations.<\/p>\n<\/p><\/div>\n <\/br><\/br><\/br><\/p>\n
\nRussian hackers exploit six-year-old Cisco flaw to target US government agencies<\/br>
\n2023-04-19 22:06:09<\/br><\/p>\n