Article Details

Scrape Timestamp (UTC): 2024-06-12 08:07:33.257

Source: https://thehackernews.com/2024/06/china-backed-hackers-exploit-fortinet.html

Original Article Text

Click to Toggle View

China-Backed Hackers Exploit Fortinet Flaw, Infecting 20,000 Systems Globally. State-sponsored threat actors backed by China gained access to 20,000 Fortinet FortiGate systems worldwide by exploiting a known critical security flaw between 2022 and 2023, indicating that the operation had a broader impact than previously known. "The state actor behind this campaign was already aware of this vulnerability in FortiGate systems at least two months before Fortinet disclosed the vulnerability," the Dutch National Cyber Security Centre (NCSC) said in a new bulletin. "During this so-called zero-day period, the actor alone infected 14,000 devices." The campaign targeted dozens of Western governments, international organizations, and a large number of companies within the defense industry. The names of the entities were not disclosed. The findings build on an earlier advisory from February 2024, which found that the attackers had breached a computer network used by the Dutch armed forces by exploiting CVE-2022-42475 (CVSS score: 9.8), which allows for remote code execution. The intrusion paved the way for the deployment of a backdoor codenamed COATHANGER from an actor-controlled server that's designed to grant persistent remote access to the compromised appliances, and act as a launching point for more malware. The NCSC said the adversary opted to install the malware long after obtaining initial access in an effort to retain their control over the devices, although it's not clear how many victims had their devices infected with the implant. The latest development once again underscores the ongoing trend of cyber attacks targeting edge appliances to breach networks of interest. "Due to the security challenges of edge devices, these devices are a popular target for malicious actors," the NCSC said. "Edge devices are located at the edge of the IT network and regularly have a direct connection to the internet. In addition, these devices are often not supported by Endpoint Detection and Response (EDR) solutions." Continuous Attack Surface Discovery & Penetration Testing Continuously discover, prioritize, & mitigate exposures with evidence-backed ASM, Pentesting, and Red Teaming.

Daily Brief Summary

NATION STATE ACTIVITY // China-Linked Hackers Exploit Fortinet Flaw, Infecting Global Systems

Chinese state-backed hackers exploited a critical flaw in Fortinet FortiGate systems, affecting 20,000 global systems.

The attackers were aware of the vulnerability two months before Fortinet disclosed it, utilizing this knowledge to infect 14,000 devices during the zero-day period.

The cyber campaign targeted Western governments, international organizations, and defense industry companies.

This operation included CVE-2022-42475, allowing remote code execution and resulting in a data breach of the Dutch armed forces' network.

Attackers deployed COATHANGER malware to maintain persistent access and control over the compromised devices, which could serve as a launch point for further infections.

It remains unclear how many of the 20,000 affected devices received the COATHANGER implant, indicating potential underestimation of the scope.

This incident highlights the significant risks associated with edge devices, which are susceptible due to their direct internet connections and lack of robust security measures like EDR solutions.