Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the gravity-forms-pdf-extended domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/laditech/public_html/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the post-title-marquee-scroll domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/laditech/public_html/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the schema-and-structured-data-for-wp domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/laditech/public_html/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the uael domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/laditech/public_html/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/laditech/public_html/wp-includes/functions.php on line 6114
US: Chinese Government Hackers Hacked Telecoms to Eavesdrop on Network Traffic

US: Chinese Government Hackers Hacked Telecoms to Eavesdrop on Network Traffic

Chinese Government Hackers Hacked Telecoms

Several US federal agencies announced today that Chinese-backed threat actors have targeted and infiltrated key telecommunications and network service providers in order to steal credentials and harvest data.

Chinese hacking gangs have used publicly known vulnerabilities to infiltrate everything from unpatched small office/home office (SOHO) routers to medium and even big enterprise networks, according to a joint cybersecurity alert released on Tuesday by the NSA, CISA, and the FBI.

Once the devices were infiltrated, the threat actors used them as command-and-control servers and proxy systems to break into other networks as part of their own assault infrastructure.

“Once within a telecommunications organization or network service provider, PRC state-sponsored cyber actors identified essential users and infrastructure, including systems critical to maintaining the security of authentication, authorization, and accounting,” according to the report.

The attackers then used SQL commands to dump user and admin credentials from key Remote Authentication Dial-In User Service (RADIUS) servers after stealing credentials to access underlying SQL databases.

“The cyber actors returned to the network, armed with valid accounts and credentials from the compromised RADIUS server and the router configurations, and used their access and knowledge to successfully authenticate and execute router commands to surreptitiously route, capture, and exfiltrate traffic out of the network to actor-controlled infrastructure,” the federal agencies added.

Since 2020, the following common vulnerabilities and exposures (CVEs) have been most commonly exploited by Chinese-backed state hackers, according to the three federal authorities.

“Since 2020, the PRC has been using specialized approaches and common vulnerabilities to its advantage in cyber campaigns,” according to the NSA.

Vendor CVE Vulnerability Type
CiscoCVE-2018-0171Remote Code Execution
CVE-2019-15271Remote Code Execution
CVE-2019-1652Remote Code Execution
CitrixCVE-2019-19781Remote Code Execution
DrayTekCVE-2020-8515Remote Code Execution
D-LinkCVE-2019-16920Remote Code Execution
FortinetCVE-2018-13382Authentication Bypass
MikroTikCVE-2018-14847Authentication Bypass
NetgearCVE-2017-6862Remote Code Execution
PulseCVE-2019-11510Authentication Bypass
CVE-2021-22893Remote Code Execution
QNAPCVE-2019-7192Privilege Elevation
CVE-2019-7193Remote Inject
CVE-2019-7194XML Routing Detour Attack
CVE-2019-7195XML Routing Detour Attack
ZyxelCVE-2020-29583Authentication Bypass

Chinese-sponsored threat actors have created large infrastructure networks as a result of exploiting these vulnerabilities, allowing them to infiltrate an even broader spectrum of public and private sector targets.

The NSA, CISA, and FBI are also urging US and allied governments, critical infrastructure, and private business entities to implement a set of mitigation measures to help reduce the likelihood of similar attacks infiltrating their networks.

Security updates should be applied as quickly as feasible, unneeded ports and protocols should be disabled to reduce the attack surface, and end-of-life network infrastructure that no longer receives security patches should be replaced, according to federal agencies.

Segmenting networks to prevent lateral movement and enabling robust monitoring on internet-exposed services to detect attack attempts as soon as possible are also recommended.

This joint advisory follows two previous that exchanged information on Chinese state-sponsored hackers’ tactics, methods, and procedures (TTPs) utilized in their assaults (in 2021) and publicly known vulnerabilities exploited in their attacks (in 2020).

Source

Share this on

Facebook
LinkedIn
Twitter
Pinterest
Email
WhatsApp
Telegram
Skype