- Gone Phishing
- Posts
- Cisco says VPN and SSH services will be hit
Cisco says VPN and SSH services will be hit

Welcome to Gone Phishing, your daily cybersecurity newsletter thatโs keeping its eye on the cyberwarfare abroad like itโs Benjamin Netanyahulu ๐๐๐
Todayโs hottest cybersecurity news stories:
โ ๏ธ Warning! Cisco says VPN and SSH services will be hit w/ attacks ๐ฅ
๐จโ๐ป PuTTY SSH client has been found wanting. Key recovery attacks galore ๐ณ
๐ฏ Hive Rat responsible for $3.5M crypto-jack arrested by the buzz. Sorry, fuzz ๐ฎ
You gotta be Cisco Kidding me ๐๐๐
๐จ Global Surge in Brute-Force Attacks: Cisco Issues Warning ๐
๐ Cisco has sounded the alarm regarding a worldwide spike in brute-force attacks targeting a variety of devices, including Virtual Private Network (VPN) services, web application authentication interfaces, and SSH services, dating back to at least March 18, 2024.
๐ "These attacks all appear to be originating from TOR exit nodes and a range of other anonymizing tunnels and proxies," reported Cisco Talos.
๐ Successful breaches could lead to unauthorised network access, account lockouts, or denial-of-service conditions, cautioned the cybersecurity company.
๐ฏ The attacks, described as broad and opportunistic, have been observed targeting several devices, including:
Cisco Secure Firewall VPN
Checkpoint VPN
Fortinet VPN
SonicWall VPN
RD Web Services
Mikrotik
Draytek
Ubiquiti
๐ Cisco Talos identified the brute-force attempts as utilising both generic and valid usernames, indiscriminately targeting various sectors globally.
๐ The source IP addresses for the attacks are commonly linked with proxy services, including TOR, VPN Gate, IPIDEA Proxy, and others. A full list of indicators associated with the activity can be found here.
๐ This development follows Cisco's warning of password spray attacks on remote access VPN services and a report from Fortinet FortiGuard Labs detailing ongoing exploitation of a patched security flaw in TP-Link Archer AX21 routers.
๐ "As usual, botnets relentlessly target IoT vulnerabilities, continuously attempting to exploit them," remarked security researchers Cara Lin and Vincent Li. "Users should be vigilant against DDoS botnets and promptly apply patches to safeguard their network environments from infection, preventing them from becoming bots for malicious threat actors."

Learn AI in 5 minutes a day. We'll teach you how to save time and earn more with AI. Join 400,000+ free daily readers for trending tools, productivity boosting prompts, the latest news, and more.

Donโt let yourselves be PuTTY in the hands of hackers! ๐ฉ๐คฒ๐
๐จ Critical Vulnerability Alert: PuTTY SSH and Telnet Client at Risk ๐
๐ฅ The maintainers of the PuTTY Secure Shell (SSH) and Telnet client are issuing a critical warning to users of versions 0.68 through 0.80 due to a vulnerability that could lead to full recovery of NIST P-521 private keys.
๐ Assigned the CVE identifier CVE-2024-31497, the flaw was discovered by researchers Fabian Bรคumer and Marcus Brinkmann from the Ruhr University Bochum.
๐ฅ "The effect of the vulnerability is to compromise the private key," stated the PuTTY project in an advisory.
๐ก๏ธ "An attacker in possession of a few dozen signed messages and the public key has enough information to recover the private key, allowing them to forge signatures as if they were from you," they added.
๐ Bรคumer detailed the flaw as originating from the generation of biassed ECDSA cryptographic nonces, enabling full secret key recovery in roughly 60 signatures.
๐ ๏ธ Besides PuTTY, the vulnerability affects other products such as FileZilla, WinSCP, TortoiseGit, and TortoiseSVN, all incorporating vulnerable versions of the software.
๐ง Following responsible disclosure, fixes have been implemented in PuTTY 0.81, FileZilla 3.67.0, WinSCP 6.3.3, and TortoiseGit 2.15.0.1. Users of TortoiseSVN are advised to utilise Plink from the latest PuTTY 0.81 release when accessing SVN repositories via SSH until a patch is available.
๐ Specifically, the issue has been addressed by adopting the RFC 6979 technique for all DSA and ECDSA key types, replacing the earlier method prone to biassed nonces when using P-521.
๐ PuTTY developers emphasised revoking compromised ECDSA NIST-P521 keys from SSH servers to mitigate risks associated with the vulnerability.

๐ฃ Catch of the Day!! ๐๐๐ฆ
๐ The Motley Fool: โFool me once, shame on โ shame on you. Fool me โ you can't get fooled again.โ Good olโ George Dubya ๐ Let us tell whoโs not fooling around though; thatโs the Crรผe ๐ at Motley Fool. Youโd be a fool (alright, enough already! ๐) not to check out their Share Tips from time to time so your savings can one day emerge from their cocoon as a beautiful butterfly! ๐ Kidding aside, if you check out their website theyโve actually got a ton of great content with a wide variety of different investment ideas to suit most budgets ๐ค (LINK)
๐ต Wander: Find your happy place. Cue Happy Gilmore flashback ๐๏ธโณ๐๐๏ธ Mmmm Happy Placeโฆ ๐ So, weโve noticed a lot of you guys are interested in travel. As are we! We stumbled upon this cool company that offers a range of breath-taking spots around the United States and, honestly, the website alone is worth a gander. When all you see about the Land of the free and the home of the brave is news of rioting, looting and school shootings, itโs easy to forget how beautiful some parts of it are. The awe-inspiring locations along with the innovative architecture of the hotels sets Wander apart from your run of the mill American getaway ๐๏ธ๐ (LINK)
๐ Digital Ocean: If you build it they will come. Nope, weโre not talking about a baseball field for ghosts โพ๐ป๐ฟ (Great movie, to be fair ๐). This is the Digital Ocean whoโve got a really cool platform for building and hosting pretty much anything you can think of. If you check out their website youโll find yourself catching the buzz even if you canโt code (guilty ๐). But if you can and youโre looking for somewhere to test things out or launch something new or simply enhance what youโve got, weโd recommend checking out their services foโ sho ๐ And how can you not love their slogan: Dream it. Build it. Grow it. Right on, brother! ๐ฟ (LINK)

A Hive of RATs. Is there anything worse? ๐๐๐จ
๐จ Arrests Made in Connection to Hive RAT Scheme: DoJ Issues Warnings ๐
๐ฅ Two individuals have been apprehended in Australia and the U.S. linked to an alleged plot involving the development and dissemination of a remote access trojan dubbed Hive RAT (formerly Firebird).
๐ก๏ธ The U.S. Justice Department (DoJ) revealed that the malware bestowed control over victim computers, enabling access to private communications, login credentials, and personal data.
๐Edmond Chakhmakhchyan (aka "Corruption"), 24, from Los Angeles, California, faces charges of conspiracy and advertising an interception device. He allegedly marketed Hive RAT licences on cybercrime forums and provided customer support.
๐ Hive RAT grants capabilities including program termination, file browsing, keystroke logging, and credential theft from victims' machines surreptitiously.
๐ ๏ธ Meanwhile, in Australia, charges were brought against an unnamed individual involved in the creation and sale of Hive RAT. The suspect faces multiple offences carrying up to three years imprisonment each.
๐ "Remote Access Trojans are one of the most harmful cyber threats in the online environment," remarked AFP Acting Commander Cybercrime Sue Evans. "Once installed onto a device, a RAT can provide criminals with full access and control."
๐ธ In another cybercrime development, Charles O. Parks III (aka "CP3O"), 45, was indicted in the U.S. for orchestrating an illegal cryptojacking operation defrauding cloud computing providers out of millions of dollars in computing resources.
๐ Parks exploited various aliases and email addresses to register accounts with cloud providers, syphoning computing power to mine cryptocurrencies like Ether, Litecoin, and Monero.
๐ฐ The illicit proceeds were laundered through cryptocurrency exchanges and traditional bank accounts, funding lavish purchases including luxury cars and jewellery.
๐ฅ "Parks tricked the providers into approving heightened privileges and benefits, and deflected inquiries regarding questionable data usage," stated the DoJ.
Hopefully some good news tomorrow, folks ๐ฌ Although, we had an arrest at leastโฆ Every cloud ๐

๐๏ธ Extra, Extra! Read all about it!
Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!
๐ก๏ธ Tl;dr sec: Join 30,000+ security professionals getting the best tools, blog posts, talks, and resources right in their inbox for free every Thursday ๐
๐ต Crypto Pragmatist: Crypto made simple. Actionable alpha in 5 minutes, 3x a week. Join 47,000+ investors and insiders, for ๐
๐ Bitcoin Breakdown: The best in Bitcoin, carefully curated by an alien from the future ๐พ
Let us know what you think!
So long and thanks for reading all the phish!
Give us a rating? |

