Researchers Discover 14,000 #Routers Wrangled Into Never-Before-Seen #Botnet

Researchers say they have uncovered a takedown-resistant botnet of 14,000 routers and other network devices -- primarily made by #Asus -- that have been conscripted into a proxy network that #anonymously carries traffic used for #cybercrime. The #malware -- dubbed #KadNap -- takes hold by #exploiting #vulnerabilities that have gone #unpatched by their owners
#privacy #security #exploit

https://it.slashdot.org/story/26/03/11/2140227/researchers-discover-14000-routers-wrangled-into-never-before-seen-botnet?utm_source=rss1.0mainlinkanon&utm_medium=feed

Researchers Discover 14,000 Routers Wrangled Into Never-Before-Seen Botnet - Slashdot

An anonymous reader quotes a report from Ars Technica: Researchers say they have uncovered a takedown-resistant botnet of 14,000 routers and other network devices -- primarily made by Asus -- that have been conscripted into a proxy network that anonymously carries traffic used for cybercrime. The ma...

FBI Warns FSB-Linked Hackers Exploiting Unpatched Cisco Devices for Cyber Espionage

Russian hackers exploit Cisco CVE-2018-0171 since 2022, breaching global networks and targeting U.S. infrastructure.

The Hacker News
Over 800 N-able servers left unpatched against critical flaws

Over 800 N-able N-central servers remain unpatched against a pair of critical security vulnerabilities tagged as actively exploited last week.

BleepingComputer
Microsoft: Happy 2025. Here’s 161 Security Updates – Krebs on Security

#KRITIS Sektor #Energie

UK #nuclear site #Sellafield fined $440,000 for #cybersecurity shortfalls

"Sellafield failed to follow its own approved cybersecurity protocols by leaving multiple #vulnerabilities in its IT systems #unpatched, violating the Nuclear Industries Security Regulations 2003."
https://www.bleepingcomputer.com/news/security/uk-nuclear-site-sellafield-fined-440-000-for-cybersecurity-shortfalls/

UK nuclear site Sellafield fined $440,000 for cybersecurity shortfalls

Nuclear waste processing facility Sellafield has been fined £332,500 ($440k) by the Office for Nuclear Regulation (ONR) for failing to adhere to cybersecurity standards and putting sensitive nuclear information at risk over four years, from 2019 to 2023.

BleepingComputer
Chinese malware removed from SOHO routers after FBI issues covert commands

Routers were being used to conceal attacks on critical infrastructure.

Ars Technica
“This vulnerability is now under mass exploitation.” Citrix Bleed bug bites hard
A vulnerability that allows attackers to bypass multifactor authentication and access enterprise networks using hardware sold by Citrix is under mass exploitation by ransomware hackers despite a patch being available for three weeks.
By some estimates, 20,000 devices have already been hacked.
https://arstechnica.com/security/2023/10/critical-citrix-bleed-vulnerability-allowing-mfa-bypass-comes-under-mass-exploitation/
#CitrixBleed #MFA #vulnerability #exploits #unpatched #devices #OpenID
“This vulnerability is now under mass exploitation.” Citrix Bleed bug bites hard

By some estimates, 20,000 devices have already been hacked.

Ars Technica

How #China gets free intel on tech companies’ #vulnerabilities

For state-sponsored #hacking operations, #unpatched vulnerabilities are valuable ammunition.

https://arstechnica.com/?p=1966082

How China gets free intel on tech companies’ vulnerabilities

If your company operates in China, it must reveal all hackable bugs to government.

Ars Technica

How an #unpatched #MicrosoftExchange #0-day likely caused one of the #uk ‘s biggest hacks ever

#hack #privacy #breach #Microsoft
https://arstechnica.com/?p=1959987

How an unpatched Microsoft Exchange 0-day likely caused one of the UK’s biggest hacks ever

Evidence appears to show a critical 0-day tracked as ProxyNotShell was exploited.

Ars Technica
Multiple #ThreatActors 1 working on behalf of a nation-stat gained access 2 network of a US fed agency by exploiting a 4 yr-old #vulnerability that remained #unpatched, #Exploit activities by 1 group likely began in August 2021 & last August by the other, according advisory jointly published by #Cybersecurity & Infrastructure Security Agency, FBI, and Multi-State Information Sharing & Analysis Center. From November 22 to early January server exhibited signs of compromise. https://arstechnica.com/information-technology/2023/03/federal-agency-hacked-by-2-groups-thanks-to-flaw-that-went-unpatched-for-4-years/
Federal agency hacked by 2 groups thanks to flaw that went unpatched for 4 years

A code-execution bug with a 9.8 severity rating gave control over agency's network.

Ars Technica