• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
mitre corporation breached by nation state hackers exploiting ivanti flaws

MITRE Corporation Breached by Nation-State Hackers Exploiting Ivanti Flaws

You are here: Home / General Cyber Security News / MITRE Corporation Breached by Nation-State Hackers Exploiting Ivanti Flaws
April 22, 2024

The MITRE Company exposed that it was the concentrate on of a country-state cyber attack that exploited two zero-working day flaws in Ivanti Connect Protected appliances starting in January 2024.

The intrusion led to the compromise of its Networked Experimentation, Investigation, and Virtualization Surroundings (NERVE), an unclassified investigation and prototyping network.

The mysterious adversary “done reconnaissance of our networks, exploited just one of our Virtual Non-public Networks (VPNs) by way of two Ivanti Connect Secure zero-day vulnerabilities, and skirted previous our multi-factor authentication applying session hijacking,” Lex Crumpton, a defensive cyber operations researcher at the non-gain, said past 7 days.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

The attack entailed the exploitation of CVE-2023-46805 (CVSS rating: 8.2) and CVE-2024-21887 (CVSS score: 9.1), which could be weaponized by danger actors to bypass authentication and run arbitrary commands on the contaminated method.

On attaining first accessibility, the threat actors moved laterally and breached its VMware infrastructure using a compromised administrator account, finally paving the way for the deployment of backdoors and web shells for persistence and credential harvesting.

“NERVE is an unclassified collaborative network that offers storage, computing, and networking methods,” MITRE mentioned. “Based mostly on our investigation to date, there is no indication that MITRE’s core business network or partners’ techniques ended up afflicted by this incident.”

The business claimed that it has due to the fact taken methods to comprise the incident, and that it undertook response and restoration endeavours as perfectly as forensic analysis to discover the extent of the compromise.

The original exploitation of the twin flaws has been attributed to a cluster tracked by cybersecurity firm Volexity under the identify UTA0178, a country-state actor probably linked to China. Given that then, various other China-nexus hacking teams have joined the exploitation bandwagon, in accordance to Mandiant.

Cybersecurity

“No corporation is immune from this form of cyber attack, not even one that strives to preserve the greatest cybersecurity probable,” Jason Providakes, president and CEO of MITRE, said.

“We are disclosing this incident in a timely fashion mainly because of our motivation to operate in the general public desire and to advocate for best tactics that enhance business security as very well as needed actions to strengthen the industry’s present-day cyber protection posture.”

Found this write-up fascinating? This write-up is a contributed piece from 1 of our valued associates. Adhere to us on Twitter  and LinkedIn to study much more unique articles we post.


Some areas of this post are sourced from:
thehackernews.com

Previous Post: «ransomware double dip: re victimization in cyber extortion Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Next Post: Pentera’s 2024 Report Reveals Hundreds of Security Events per Week, Highlighting the Criticality of Continuous Validation pentera's 2024 report reveals hundreds of security events per week,»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels
  • Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks
  • Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets
  • Ransomware’s Fragmentation Reaches a Breaking Point While LockBit Returns
  • Chinese Hackers Use Anthropic’s AI to Launch Automated Cyber Espionage Campaign
  • Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts
  • Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data
  • Fake Chrome Extension “Safery” Steals Ethereum Wallet Seed Phrases Using Sui Blockchain
  • When Attacks Come Faster Than Patches: Why 2026 Will be the Year of Machine-Speed Security
  • Operation Endgame Dismantles Rhadamanthys, Venom RAT, and Elysium Botnet in Global Crackdown

Copyright © TheCyberSecurity.News, All Rights Reserved.