China broke into govt, defense, finance networks via zero-day in Pulse Secure VPN gateways? No way

Crucial flaw won't be fixed until next month

Dozens of defense companies, government agencies, and financial organizations in America and abroad appear to have been compromised by China via vulnerabilities in their Pulse Connect Secure VPN appliances – including a zero-day flaw that won't be patched until next month.

On Tuesday, IT software supplier Ivanti, the parent of Pulse Secure, issued a wake-up call to its customers by revealing it looks as though select clients were compromised via their encrypted gateways.

"There is a new issue, discovered this month, that impacted a very limited number of customers," said Phil Richards, chief security officer at Pulse Secure, in a memo to the world. "The team worked quickly to provide mitigations directly to the limited number of impacted customers that remediates the risk to their system."

Richards said Ivanti, based in Utah, has been working with security firms and industry groups including FireEye/Mandiant, the US government's Cybersecurity and Infrastructure Security Agency, and Stroz Friedberg to investigate the break-ins. Uncle Sam has issued its alert here for IT and network admins.

The F5 red button logo

Now it is F5’s turn to reveal critical security bugs – and the Feds were quick to sound the alarm on these BIG-IP flaws


Meanwhile, FireEye/Mandiant in an advisory said it was tracking 12 malware families, focused on circumventing authentication and providing backdoor access, that have been linked to the exploitation of Pulse Secure VPN devices.

The infosec outfit believes multiple threat actors are using these malware strains, though the focus of its report today is on the activities of a group identified as UNC2630 and its efforts to target the networks of US government, defense, and private-sector entities.

That said, according to FireEye/Mandiant, "multiple intrusions at defense, government, and financial organizations around the world" have been linked to installations of Pulse's gear. "In each intrusion, the earliest evidence of attacker activity traced back to DHCP IP address ranges belonging to Pulse Secure VPN appliances in the affected environment," the biz added.

UNC2630, a FireEye spokesperson told The Register, has suspected ties to APT5, a group of cyber-spies said to operate with support from authorities in China.

“In recent months, Mandiant has responded to multiple intrusions involving the exploitation of the PulseSecure VPN solution," said Charles Carmakal, SVP and CTO at FireEye/Mandiant, in a statement to The Register.

"Through the course of our investigations, we learned that a zero-day and other known vulnerabilities in the VPN solution were exploited to facilitate intrusions across dozens of organizations including government agencies, financial entities, and defense companies in the United States and abroad. We suspect these intrusions align with data and intelligence collection objectives by China."

A zero-day and other known vulnerabilities in the VPN solution were exploited to facilitate intrusions across dozens of organizations including government agencies, financial entities, and defense companies in the United States and abroad

Ivanti said it discovered four issues, which mostly have to do with three vulnerabilities patched in 2019 and 2020: Security Advisory SA44101 (CVE-2019-11510), Security Advisory SA44588 (CVE-2020-8243) and Security Advisory SA44601 (CVE-2020-8260). Customers are advised to avail themselves of the Pulse Security Integrity Checker Tool to assess whether their systems are vulnerable and to apply the recommended mitigations if they've not already done so.

There's also an unpatched critical Pulse Connect Secure vulnerability related to Security Advisory SA44784 (CVE-2021-22893) that the developer says will be fixed in early May. This flaw, rated 10 out of 10 in terms of severity, involves an authentication bypass that lets an unauthenticated user remotely execute arbitrary files on the VPN gateway.

Not a one off

Carmakal said the snoops operating as UNC2630 have developed deep technical knowledge of the Pulse Secure product, in order to maintain long-term access to networks for credential harvesting and data theft.

"They developed malware that enabled them to harvest Active Directory credentials and bypass multifactor authentication on Pulse Secure devices to access victim networks," he said.

"They modified scripts on the Pulse Secure system which enabled the malware to survive software updates and factory resets. This tradecraft enabled the actors to maintain access to victim environments for several months without being detected."

FireEye/Mandiant said UNC2630 is using a novel malware family that it dubbed SLOWPULSE, which in three of its four variants are capable of bypassing two-factor authentication.

FireEye/Mandiant said an incident in March attributed to a different spying group, UNC2717, and targeting a European organization, has some similarities with what UNC2630 has been doing. At the moment, it's unclear whether UNC2717, spotted targeting government organizations between October 2020, and March 2021, has ties to government organizations.

"We don’t have enough information on UNC2717 to make a determination on country sponsorship and are still collecting evidence," said Sarah Jones, senior principal analyst at Mandiant Threat Intelligence, in a statement emailed to The Register.

The security firm also said it had spotted an OpenSSL library file that had been modified in a way that could weaken the encryption used to protect communication on Pulse Secure systems. The modification breaks random number generation by using a value known to the attacker. The company said it doesn't know enough about the origin of this file or the group(s) using it to provide more detail.

Coincidentally, the Biden administration on Tuesday announced a 100-day plan to improve the cybersecurity of US electric infrastructure, part of its broader commitment to shore up cybersecurity across multiple sectors. ®

Broader topics

Other stories you might like

  • Demand for PC and smartphone chips drops 'like a rock' says CEO of China’s top chipmaker
    Markets outside China are doing better, but at home vendors have huge component stockpiles

    Demand for chips needed to make smartphones and PCs has dropped "like a rock" – but mostly in China, according to Zhao Haijun, the CEO of China's largest chipmaker Semiconductor Manufacturing International Corporation (SMIC).

    Speaking on the company's Q1 2022 earnings call last Friday, Zhao said smartphone makers currently have five months inventory to hand, so are working through that stockpile before ordering new product. Sales of PCs, consumer electronics and appliances are also in trouble, the CEO said, leaving some markets oversupplied with product for now. But unmet demand remains for silicon used for Wi-Fi 6, power conversion, green energy products, and analog-to-digital conversion.

    Zhao partly attributed sales slumps to the Ukraine war which has made the Russian market off limits to many vendors and effectively taken Ukraine's 44 million citizens out of the global market for non-essential purchases.

    Continue reading
  • Colocation consolidation: Analysts look at what's driving the feeding frenzy
    Sometimes a half-sized shipping container at the base of a cell tower is all you need

    Analysis Colocation facilities aren't just a place to drop a couple of servers anymore. Many are quickly becoming full-fledged infrastructure-as-a-service providers as they embrace new consumption-based models and place a stronger emphasis on networking and edge connectivity.

    But supporting the growing menagerie of value-added services takes a substantial footprint and an even larger customer base, a dynamic that's driven a wave of consolidation throughout the industry, analysts from Forrester Research and Gartner told The Register.

    "You can only provide those value-added services if you're big enough," Forrester research director Glenn O'Donnell said.

    Continue reading
  • D-Wave deploys first US-based Advantage quantum system
    For those that want to keep their data in the homeland

    Quantum computing outfit D-Wave Systems has announced availability of an Advantage quantum computer accessible via the cloud but physically located in the US, a key move for selling quantum services to American customers.

    D-Wave reported that the newly deployed system is the first of its Advantage line of quantum computers available via its Leap quantum cloud service that is physically located in the US, rather than operating out of D-Wave’s facilities in British Columbia.

    The new system is based at the University of Southern California, as part of the USC-Lockheed Martin Quantum Computing Center hosted at USC’s Information Sciences Institute, a factor that may encourage US organizations interested in evaluating quantum computing that are likely to want the assurance of accessing facilities based in the same country.

    Continue reading
  • Bosses using AI to hire candidates risk discriminating against disabled applicants
    US publishes technical guide to help organizations avoid violating Americans with Disabilities Act

    The Biden administration and Department of Justice have warned employers using AI software for recruitment purposes to take extra steps to support disabled job applicants or they risk violating the Americans with Disabilities Act (ADA).

    Under the ADA, employers must provide adequate accommodations to all qualified disabled job seekers so they can fairly take part in the application process. But the increasing rollout of machine learning algorithms by companies in their hiring processes opens new possibilities that can disadvantage candidates with disabilities. 

    The Equal Employment Opportunity Commission (EEOC) and the DoJ published a new document this week, providing technical guidance to ensure companies don't violate ADA when using AI technology for recruitment purposes.

    Continue reading
  • How ICE became a $2.8b domestic surveillance agency
    Your US tax dollars at work

    The US Immigration and Customs Enforcement (ICE) agency has spent about $2.8 billion over the past 14 years on a massive surveillance "dragnet" that uses big data and facial-recognition technology to secretly spy on most Americans, according to a report from Georgetown Law's Center on Privacy and Technology.

    The research took two years and included "hundreds" of Freedom of Information Act requests, along with reviews of ICE's contracting and procurement records. It details how ICE surveillance spending jumped from about $71 million annually in 2008 to about $388 million per year as of 2021. The network it has purchased with this $2.8 billion means that "ICE now operates as a domestic surveillance agency" and its methods cross "legal and ethical lines," the report concludes.

    ICE did not respond to The Register's request for comment.

    Continue reading
  • Fully automated AI networks less than 5 years away, reckons Juniper CEO
    You robot kids, get off my LAN

    AI will completely automate the network within five years, Juniper CEO Rami Rahim boasted during the company’s Global Summit this week.

    “I truly believe that just as there is this need today for a self-driving automobile, the future is around a self-driving network where humans literally have to do nothing,” he said. “It's probably weird for people to hear the CEO of a networking company say that… but that's exactly what we should be wishing for.”

    Rahim believes AI-driven automation is the latest phase in computer networking’s evolution, which began with the rise of TCP/IP and the internet, was accelerated by faster and more efficient silicon, and then made manageable by advances in software.

    Continue reading
  • Pictured: Sagittarius A*, the supermassive black hole at the center of the Milky Way
    We speak to scientists involved in historic first snap – and no, this isn't the M87*

    Astronomers have captured a clear image of the gigantic supermassive black hole at the center of our galaxy for the first time.

    Sagittarius A*, or Sgr A* for short, is 27,000 light-years from Earth. Scientists knew for a while there was a mysterious object in the constellation of Sagittarius emitting strong radio waves, though it wasn't really discovered until the 1970s. Although astronomers managed to characterize some of the object's properties, experts weren't quite sure what exactly they were looking at.

    Years later, in 2020, the Nobel Prize in physics was awarded to a pair of scientists, who mathematically proved the object must be a supermassive black hole. Now, their work has been experimentally verified in the form of the first-ever snap of Sgr A*, captured by more than 300 researchers working across 80 institutions in the Event Horizon Telescope Collaboration. 

    Continue reading
  • Shopping for malware: $260 gets you a password stealer. $90 for a crypto-miner...
    We take a look at low, low subscription prices – not that we want to give anyone any ideas

    A Tor-hidden website dubbed the Eternity Project is offering a toolkit of malware, including ransomware, worms, and – coming soon – distributed denial-of-service programs, at low prices.

    According to researchers at cyber-intelligence outfit Cyble, the Eternity site's operators also have a channel on Telegram, where they provide videos detailing features and functions of the Windows malware. Once bought, it's up to the buyer how victims' computers are infected; we'll leave that to your imagination.

    The Telegram channel has about 500 subscribers, Team Cyble documented this week. Once someone decides to purchase of one or more of Eternity's malware components, they have the option to customize the final binary executable for whatever crimes they want to commit.

    Continue reading

Biting the hand that feeds IT © 1998–2022