Yesterday, cybersecurity firm SonicWall sent an urgent warning to users of some of their legacy products about an ‘imminent ransomware campaign using stolen credentials’ and told some users to disconnect products immediately.
<p>The SonicWall exploit came to light back in April, but now the unpatched firmware has created a new critical threat against legacy devices in what Sonicwall is calling an “imminent ransomware campaign.” In an exploit that could have been avoided, organizations need to immediately understand what software and devices might be affected and identify whether there are any vulnerable legacy devices in their environment. This can be remarkably challenging because many organizations struggle to maintain an up-to-date inventory of devices in their environment, let alone detect software types and versions that devices are running and which need to be addressed. </p>
<p>In this case, the legacy SSL VPN devices which have been discontinued are still in operation with known vulnerabilities. These devices are easily found on the internet and cannot be patched because they are out of service. Most likely, they cannot be disabled by the business because they support a business-critical objective. Attackers are capitalizing on these facts. While according to ExtraHop threat research data, only .06% of devices are potentially impacted by this threat, it only takes one entry point for attackers to land and pivot within an organization. The faster an organization can identify the vulnerable devices, and whether they were compromised, the better the chances of avoiding irrecoverable damage. </p>
Information Security Buzz (aka ISBuzz News) is an independent resource that provides the experts comments, analysis and opinion on the latest Information Security news and topics