Cisco says VPN and SSH services will be hit

Gone Phishing Banner

Welcome to Gone Phishing, your daily cybersecurity newsletter thatโ€™s keeping its eye on the cyberwarfare abroad like itโ€™s Benjamin Netanyahulu ๐Ÿ‘€๐Ÿ™ƒ๐Ÿ˜‚

 Todayโ€™s hottest cybersecurity news stories:

  • โš ๏ธ Warning! Cisco says VPN and SSH services will be hit w/ attacks ๐Ÿ’ฅ

  • ๐Ÿ‘จโ€๐Ÿ’ป PuTTY SSH client has been found wanting. Key recovery attacks galore ๐Ÿ˜ณ

  • ๐Ÿฏ Hive Rat responsible for $3.5M crypto-jack arrested by the buzz. Sorry, fuzz ๐Ÿ‘ฎ

You gotta be Cisco Kidding me ๐Ÿ‘€๐Ÿ˜๐Ÿ’€

๐Ÿšจ Global Surge in Brute-Force Attacks: Cisco Issues Warning ๐Ÿ”’

๐ŸŒ Cisco has sounded the alarm regarding a worldwide spike in brute-force attacks targeting a variety of devices, including Virtual Private Network (VPN) services, web application authentication interfaces, and SSH services, dating back to at least March 18, 2024.

๐Ÿ“ˆ "These attacks all appear to be originating from TOR exit nodes and a range of other anonymizing tunnels and proxies," reported Cisco Talos.

๐Ÿ”“ Successful breaches could lead to unauthorised network access, account lockouts, or denial-of-service conditions, cautioned the cybersecurity company.

๐ŸŽฏ The attacks, described as broad and opportunistic, have been observed targeting several devices, including:

  • Cisco Secure Firewall VPN

  • Checkpoint VPN

  • Fortinet VPN

  •  SonicWall VPN

  •  RD Web Services

  •  Mikrotik

  •  Draytek

  • Ubiquiti

๐Ÿ” Cisco Talos identified the brute-force attempts as utilising both generic and valid usernames, indiscriminately targeting various sectors globally.

๐Ÿ”‘ The source IP addresses for the attacks are commonly linked with proxy services, including TOR, VPN Gate, IPIDEA Proxy, and others. A full list of indicators associated with the activity can be found here.

๐Ÿ”” This development follows Cisco's warning of password spray attacks on remote access VPN services and a report from Fortinet FortiGuard Labs detailing ongoing exploitation of a patched security flaw in TP-Link Archer AX21 routers.

๐Ÿ”’ "As usual, botnets relentlessly target IoT vulnerabilities, continuously attempting to exploit them," remarked security researchers Cara Lin and Vincent Li. "Users should be vigilant against DDoS botnets and promptly apply patches to safeguard their network environments from infection, preventing them from becoming bots for malicious threat actors."

Learn AI in 5 minutes a day. We'll teach you how to save time and earn more with AI. Join 400,000+ free daily readers for trending tools, productivity boosting prompts, the latest news, and more.

Donโ€™t let yourselves be PuTTY in the hands of hackers! ๐Ÿ’ฉ๐Ÿคฒ๐Ÿ’€

๐Ÿšจ Critical Vulnerability Alert: PuTTY SSH and Telnet Client at Risk ๐Ÿ”‘

๐Ÿ”ฅ The maintainers of the PuTTY Secure Shell (SSH) and Telnet client are issuing a critical warning to users of versions 0.68 through 0.80 due to a vulnerability that could lead to full recovery of NIST P-521 private keys.

๐Ÿ”’ Assigned the CVE identifier CVE-2024-31497, the flaw was discovered by researchers Fabian Bรคumer and Marcus Brinkmann from the Ruhr University Bochum.

๐Ÿ’ฅ "The effect of the vulnerability is to compromise the private key," stated the PuTTY project in an advisory.

๐Ÿ›ก๏ธ "An attacker in possession of a few dozen signed messages and the public key has enough information to recover the private key, allowing them to forge signatures as if they were from you," they added.

๐Ÿ” Bรคumer detailed the flaw as originating from the generation of biassed ECDSA cryptographic nonces, enabling full secret key recovery in roughly 60 signatures.

๐Ÿ› ๏ธ Besides PuTTY, the vulnerability affects other products such as FileZilla, WinSCP, TortoiseGit, and TortoiseSVN, all incorporating vulnerable versions of the software.

๐Ÿ”ง Following responsible disclosure, fixes have been implemented in PuTTY 0.81, FileZilla 3.67.0, WinSCP 6.3.3, and TortoiseGit 2.15.0.1. Users of TortoiseSVN are advised to utilise Plink from the latest PuTTY 0.81 release when accessing SVN repositories via SSH until a patch is available.

๐Ÿ” Specifically, the issue has been addressed by adopting the RFC 6979 technique for all DSA and ECDSA key types, replacing the earlier method prone to biassed nonces when using P-521.

๐Ÿ”’ PuTTY developers emphasised revoking compromised ECDSA NIST-P521 keys from SSH servers to mitigate risks associated with the vulnerability.

๐ŸŽฃ Catch of the Day!! ๐ŸŒŠ๐ŸŸ๐Ÿฆž

๐Ÿƒ The Motley Fool: โ€œFool me once, shame on โ€” shame on you. Fool me โ€” you can't get fooled again.โ€ Good olโ€™ George Dubya ๐Ÿ˜‚ Let us tell whoโ€™s not fooling around though; thatโ€™s the Crรผe ๐Ÿ‘€ at Motley Fool. Youโ€™d be a fool (alright, enough already! ๐Ÿ™ˆ) not to check out their Share Tips from time to time so your savings can one day emerge from their cocoon as a beautiful butterfly! ๐Ÿ› Kidding aside, if you check out their website theyโ€™ve actually got a ton of great content with a wide variety of different investment ideas to suit most budgets ๐Ÿค‘ (LINK)

๐Ÿšต Wander: Find your happy place. Cue Happy Gilmore flashback ๐ŸŒ๏ธโ›ณ๐ŸŒˆ๐Ÿ•Š๏ธ Mmmm Happy Placeโ€ฆ ๐Ÿ˜‡ So, weโ€™ve noticed a lot of you guys are interested in travel. As are we! We stumbled upon this cool company that offers a range of breath-taking spots around the United States and, honestly, the website alone is worth a gander. When all you see about the Land of the free and the home of the brave is news of rioting, looting and school shootings, itโ€™s easy to forget how beautiful some parts of it are. The awe-inspiring locations along with the innovative architecture of the hotels sets Wander apart from your run of the mill American getaway ๐Ÿž๏ธ๐Ÿ˜ (LINK)

๐ŸŒŠ Digital Ocean: If you build it they will come. Nope, weโ€™re not talking about a baseball field for ghosts โšพ๐Ÿ‘ป๐Ÿฟ (Great movie, to be fair ๐Ÿ™ˆ). This is the Digital Ocean whoโ€™ve got a really cool platform for building and hosting pretty much anything you can think of. If you check out their website youโ€™ll find yourself catching the buzz even if you canโ€™t code (guilty ๐Ÿ˜‘). But if you can and youโ€™re looking for somewhere to test things out or launch something new or simply enhance what youโ€™ve got, weโ€™d recommend checking out their services foโ€™ sho ๐Ÿ˜‰ And how can you not love their slogan: Dream it. Build it. Grow it. Right on, brother! ๐ŸŒฟ (LINK)

A Hive of RATs. Is there anything worse? ๐Ÿ๐Ÿ€๐Ÿ˜จ

๐Ÿšจ Arrests Made in Connection to Hive RAT Scheme: DoJ Issues Warnings ๐Ÿš”

๐Ÿ”ฅ Two individuals have been apprehended in Australia and the U.S. linked to an alleged plot involving the development and dissemination of a remote access trojan dubbed Hive RAT (formerly Firebird).

๐Ÿ›ก๏ธ The U.S. Justice Department (DoJ) revealed that the malware bestowed control over victim computers, enabling access to private communications, login credentials, and personal data.

๐Ÿ”’Edmond Chakhmakhchyan (aka "Corruption"), 24, from Los Angeles, California, faces charges of conspiracy and advertising an interception device. He allegedly marketed Hive RAT licences on cybercrime forums and provided customer support.

๐Ÿ” Hive RAT grants capabilities including program termination, file browsing, keystroke logging, and credential theft from victims' machines surreptitiously.

๐Ÿ› ๏ธ Meanwhile, in Australia, charges were brought against an unnamed individual involved in the creation and sale of Hive RAT. The suspect faces multiple offences carrying up to three years imprisonment each.

๐Ÿ”’ "Remote Access Trojans are one of the most harmful cyber threats in the online environment," remarked AFP Acting Commander Cybercrime Sue Evans. "Once installed onto a device, a RAT can provide criminals with full access and control."

๐Ÿ’ธ In another cybercrime development, Charles O. Parks III (aka "CP3O"), 45, was indicted in the U.S. for orchestrating an illegal cryptojacking operation defrauding cloud computing providers out of millions of dollars in computing resources.

๐Ÿ” Parks exploited various aliases and email addresses to register accounts with cloud providers, syphoning computing power to mine cryptocurrencies like Ether, Litecoin, and Monero.

๐Ÿ’ฐ The illicit proceeds were laundered through cryptocurrency exchanges and traditional bank accounts, funding lavish purchases including luxury cars and jewellery.

๐Ÿ”ฅ "Parks tricked the providers into approving heightened privileges and benefits, and deflected inquiries regarding questionable data usage," stated the DoJ.

Hopefully some good news tomorrow, folks ๐Ÿ˜ฌ Although, we had an arrest at leastโ€ฆ Every cloud ๐ŸŒˆ

๐Ÿ—ž๏ธ Extra, Extra! Read all about it!

Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!

  • ๐Ÿ›ก๏ธ Tl;dr sec: Join 30,000+ security professionals getting the best tools, blog posts, talks, and resources right in their inbox for free every Thursday ๐Ÿ“…

  • ๐Ÿ’ต Crypto Pragmatist: Crypto made simple. Actionable alpha in 5 minutes, 3x a week. Join 47,000+ investors and insiders, for ๐Ÿ†“

  • ๐Ÿ“ˆ Bitcoin Breakdown: The best in Bitcoin, carefully curated by an alien from the future ๐Ÿ‘พ

Let us know what you think!

So long and thanks for reading all the phish!

Give us a rating?

Login or Subscribe to participate in polls.