BACKGROUND:
Yesterday, cybersecurity firm SonicWall sent an urgent warning to users of some of their legacy products about an ‘imminent ransomware campaign using stolen credentials’ and told some users to disconnect products immediately.
BACKGROUND:
Yesterday, cybersecurity firm SonicWall sent an urgent warning to users of some of their legacy products about an ‘imminent ransomware campaign using stolen credentials’ and told some users to disconnect products immediately.
2020 Cybersecurity Landscape: 100+ Experts’ Predictions
Cyber Security Predictions 2021: Experts’ Responses
Experts’ Responses: Cyber Security Predictions 2023
Celebrating Data Privacy Day – 28th January 2023
Data Privacy Protection Day (Thursday 28th) – Experts Comments
Information Security Buzz (aka ISBuzz News) is an independent resource that provides the experts comments, analysis and opinion on the latest Information Security news and topics
<p>The SonicWall exploit came to light back in April, but now the unpatched firmware has created a new critical threat against legacy devices in what Sonicwall is calling an “imminent ransomware campaign.” In an exploit that could have been avoided, organizations need to immediately understand what software and devices might be affected and identify whether there are any vulnerable legacy devices in their environment. This can be remarkably challenging because many organizations struggle to maintain an up-to-date inventory of devices in their environment, let alone detect software types and versions that devices are running and which need to be addressed. </p>
<p>In this case, the legacy SSL VPN devices which have been discontinued are still in operation with known vulnerabilities. These devices are easily found on the internet and cannot be patched because they are out of service. Most likely, they cannot be disabled by the business because they support a business-critical objective. Attackers are capitalizing on these facts. While according to ExtraHop threat research data, only .06% of devices are potentially impacted by this threat, it only takes one entry point for attackers to land and pivot within an organization. The faster an organization can identify the vulnerable devices, and whether they were compromised, the better the chances of avoiding irrecoverable damage. </p>