article thumbnail

Experts warn of mass exploitation of Ivanti Connect Secure VPN flaws

Security Affairs

Experts warn that recently disclosed Ivanti Connect Secure VPN and Policy Secure vulnerabilities are massively exploited in the wild. Through forensic analysis of the memory sample, Volexity was able to recreate two proof-of-concept exploits that allowed full unauthenticated command execution on the ICS VPN appliance.

VPN 84
article thumbnail

Threat actors exploit Ivanti VPN bugs to deploy KrustyLoader Malware

Security Affairs

Threat actors are exploiting recently disclosed zero-day flaws in Ivanti Connect Secure (ICS) VPN devices to deliver KrustyLoader. The experts published the Yara rule for the detection of similar KrustyLoader samples. KrustyLoader – as I dubbed it – performs specific checks in order to run only if conditions are met.”

VPN 91
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Law enforcement shutdown the VPN service VPNLab used by many cybercriminal gangs

Security Affairs

Europol this week announced the shutdown of VPNLab, a VPN service that is very popular in the cybercrime ecosystem. An international operation conducted by law enforcement bodies from 10 countries took down VPNLab.net, a VPN service provider that is very popular in the cybercrime ecosystem. Europol said. Pierluigi Paganini.

VPN 83
article thumbnail

CEO-Level Guide to Prevent Data Hacking Technologies & Incidents

Security Affairs

Shareholders are now demanding that the information security should be dealt with by the upper management and CEOs should be held accountable for the data security measures. Given all these points, this article will talk about five most important things any CEO should know regarding their organization’s data security.

article thumbnail

U.S. CISA: hackers breached a state government organization

Security Affairs

The threat actor compromised network administrator credentials through the account of a former employee that was used to successfully authenticate to an internal virtual private network (VPN) access point. The government organization also hosts its sensitive data on an Azure environment which was not accessed by the attackers.

article thumbnail

CVE-2019-14899 flaw allows hijacking VPN connections on Linux, Unix systems

Security Affairs

Researchers discovered a vulnerability tracked as CVE-2019-14899 that can be exploited to hijack active TCP connections in a VPN tunnel. The experts explained that in this way, it is possible to hijack active connections within the VPN tunnel. ” reads the advisory published by the experts. Pierluigi Paganini.

VPN 70
article thumbnail

How to Deploy Your Own Algo VPN Server in the DigitalOcean Cloud

Lenny Zeltser

When analyzing malware or performing other security research, it’s often useful to tunnel connections through a VPN in a public cloud. Moreover, by using VPN exit nodes in different cities and even countries, the researcher can explore the target from multiple geographic vantage points, which sometimes yields additional findings.

VPN 111