wp-plugin-hostgator
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114ol-scrapes
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114Source:https:\/\/techcrunch.com\/2023\/06\/09\/barracuda-rip-out-replace-hardware-exploited-by-hackers\/<\/a><\/br> Barracuda Networks has told customers they must replace vulnerable email gateway appliances following the disclosure of a critical security flaw.<\/p>\n The technology company, which provides security, networking and storage products, is issuing the extraordinary guidance<\/a> as it struggles to contain a zero-day flaw that hackers have exploited since October.<\/p>\n Hackers are abusing the critical-rated vulnerability, tracked as CVE-2023-2868<\/a>, to install two types of malware, dubbed \u201cSaltwater\u201d and \u201cSeaSpy,\u201d which create a backdoor on vulnerable Barracuda Email Security Gateway (ESG) appliances that can be used to exfiltrate sensitive corporate data. ESG products are essentially firewalls for email, and are used for filtering inbound and outbound emails for potentially malicious content.<\/p>\n Barracuda said it first discovered the vulnerability on May 19 and deployed a patch \u201cto all ESG appliances worldwide\u201d the following day. Another update was deployed on May 21.<\/p>\n This week, however, Barracuda added an \u201caction notice\u201d to its advisory, urging all affected customers to replace ESG appliances impacted by the vulnerability, regardless of firmware version or patch level. According to Barracuda, affected customers have already been notified through breached ESGs\u2019 user interface.<\/p>\n \u201cIf you have not replaced your appliance after receiving notice\u2026 contact support now,\u201d Barracuda said. \u201cBarracuda\u2019s remediation recommendation at this time is full replacement of the impacted ESG.\u201d<\/p>\n TechCrunch asked Barracuda why customers need to replace patched appliances but did not immediately receive a response. Barracuda, which claims to have more than 200,000 corporate customers globally, is also yet to confirm how many organizations have been impacted.<\/p>\n Cybersecurity firm Rapid7, which is investigating the incident<\/a>, tells TechCrunch that there appear to be about 11,000 vulnerable ESG devices still connected to the internet worldwide.<\/p>\n \u201cThe pivot from patch to total replacement of affected devices is fairly stunning and implies the malware the threat actors deployed somehow achieves persistence at a low enough level that even wiping the device wouldn\u2019t eradicate attacker access,\u201d said Caitlin Condon, a security researcher at Rapid7.<\/p>\n In addition to replacing impacted devices, Barracuda is urging ESG customers to rotate any credentials connected to the appliances and to check for signs of compromise dating back to at least October 2022.<\/p>\n CISA, the U.S. government\u2019s cybersecurity agency, added the Barracuda bug to its Known Exploited Vulnerabilities Catalog<\/a> late last month and has urged federal agencies with ESG appliances to check their networks for evidence of breaches.<\/p>\n Read more:<\/b><\/p>\n<\/p><\/div>\n <\/br><\/br><\/br><\/p>\n
\nBarracuda urges customers to remove and replace vulnerable hardware exploited by hackers<\/br>
\n2023-06-09 22:02:56<\/br><\/p>\n