• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
chinese cyber espionage hackers continue to target pulse secure vpn

Chinese Cyber Espionage Hackers Continue to Target Pulse Secure VPN Devices

You are here: Home / General Cyber Security News / Chinese Cyber Espionage Hackers Continue to Target Pulse Secure VPN Devices
May 28, 2021

Cybersecurity researchers from FireEye unmasked extra strategies, techniques, and procedures (TTPs) adopted by Chinese risk actors who were being just lately found abusing Pulse Secure VPN devices to fall malicious web shells and exfiltrate sensitive information from organization networks.

FireEye’s Mandiant threat intelligence crew, which is monitoring the cyberespionage activity under two threat clusters UNC2630 and UNC2717, claimed the intrusions lines up with critical Chinese govt priorities, including “many compromised businesses operate in verticals and industries aligned with Beijing’s strategic objectives outlined in China’s recent 14th 5 Year Plan.”

password auditor

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


On April 20, the cybersecurity agency disclosed 12 unique malware households, including STEADYPULSE and LOCKPICK, that have been designed with the specific intent to infect Pulse Safe VPN appliances and place to use by quite a few cyberespionage teams believed to be affiliated with the Chinese governing administration.

  • UNC2630 – SLOWPULSE, RADIALPULSE, THINBLOOD, ATRIUM, PACEMAKER, SLIGHTPULSE, and PULSECHECK
  • UNC2717 – HARDPULSE, QUIETPULSE, AND PULSEJUMP

FireEye’s continued investigation into the attacks as component of its incident reaction endeavours has uncovered 4 extra malware families deployed by UNC2630 — BLOODMINE, BLOODBANK, CLEANPULSE, and RAPIDPULSE — for applications of harvesting qualifications and sensitive technique facts, permitting arbitrary file execution, and eliminating forensic proof.

chinese hackers

In addition, the danger actors ended up also observed getting rid of web shells, ATRIUM, and SLIGHTPULSE, from dozens of compromised VPN gadgets in between April 17 and April 20 in what the scientists explain as “unconventional,” suggesting “this motion shows an attention-grabbing worry for operational security and a sensitivity to publicity.”

At the heart of these intrusions lies CVE-2021-22893, a recently patched vulnerability in Pulse Safe VPN products that the adversaries exploited to acquire an preliminary foothold on the focus on network, working with it to steal qualifications, escalate privileges, conduct inner reconnaissance by relocating laterally throughout the network, ahead of keeping long-time period persistent accessibility, and accessing delicate information.

“Each UNC2630 and UNC2717 display superior tradecraft and go to amazing lengths to stay away from detection. The actors modify file timestamps and consistently edit or delete forensic proof these kinds of as logs, web server core dumps, and files staged for exfiltration,” the researchers mentioned. “They also exhibit a deep knowing of network appliances and highly developed expertise of a targeted network. This tradecraft can make it complicated for network defenders to establish a finish listing of instruments made use of, qualifications stolen, the preliminary intrusion vector, or the intrusion start day.”

Located this write-up fascinating? Stick to THN on Fb, Twitter  and LinkedIn to examine additional unique information we post.


Some pieces of this post are sourced from:
thehackernews.com

Previous Post: «what is dmarc and how can it improve your email What is DMARC and how can it improve your email security?
Next Post: Three-Quarters of Infosec Pros Concerned About Next SolarWinds Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.