Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security Privacy

Unpatched VPN Makes Travelex Latest Victim of 'REvil' Ransomware (arstechnica.com) 34

An anonymous reader quotes a report from Ars Technica: In April of 2019, Pulse Secure issued an urgent patch to a vulnerability in its popular corporate VPN software -- a vulnerability that not only allowed remote attackers to gain access without a username or password but also to turn off multi-factor authentication and view logs, usernames, and passwords cached by the VPN server in plain text. Now, a cybercriminal group is using that vulnerability to target and infiltrate victims, steal data, and plant ransomware.

Travelex, the foreign currency exchange and travel insurance company, appears to be the latest victim of the group. On New Year's Eve, the company was hit by Sodinokibi ransomware, also known as REvil. The ransomware operators contacted the BBC and said they want Travelex to pay $6 million. They also claimed to have had access to Travelex's network for six months and to have extracted five gigabytes of customer data -- including dates of birth, credit card information, and other personally identifiable information. "In the case of payment, we will delete and will not use that [data]base and restore them the entire network," the individual claiming to be part of the Sodinokibi operation told the BBC. "The deadline for doubling the payment is two days. Then another seven days and the sale of the entire base." Security researcher Kevin Beaumont found that Travelex had seven unpatched Pulse Secure servers. An exploit for the vulnerability has been available on Internet bulletin boards since August of 2019.

This discussion has been archived. No new comments can be posted.

Unpatched VPN Makes Travelex Latest Victim of 'REvil' Ransomware

Comments Filter:
  • by Anonymous Coward
    ahaha hahahaha jajaja kekeke hahahaha
  • by Anonymous Coward on Wednesday January 08, 2020 @06:44PM (#59600790)
    What if I commit a seagoing crime? Am I a hydrocriminal? Or in space? An astrocriminal? Specialization could really get out of hand.
    • "CyberCrime" was a TechTV series that was canceled when it ran out of stories. Basically, everything they covered is still going on... there's no new problems, but we keep seeing the "caught you not patched" problems coming back.

    • Trivia: 100% of all crimes in space are committed by lesbians. No, really. [livescience.com]
    • What if I commit a seagoing crime? Am I a hydrocriminal?

      No. If you commit a seagoing crime, you are a pirate!

  • Feels like I've read this before, do the editors read /.?
    • Slashdot sometimes has to repeat big stories because the 11AM audience isn't the same as the 5PM audience. This may need repeated overnight so everyone sees it.

      This is a big scare to world markets... Travelex is the only major currency changer left.

      • Slashdot sometimes has to repeat big stories because the 11AM audience isn't the same as the 5PM audience.

        Well clearly the 5PM audience is better off since this "dupe" has new information the 11AM audience didn't get. In fact some may say the 5PM audience got a different article with different sources, different information and a completely different focus than the 11AM readers.

        The Fox and Friends among us may however note that this story is a dupe.

      • by AHuxley ( 892839 )
        Repeat for the ads so media sites staff dont have to learn to code.
      • I'm on the 24 Hours of Slashdot regime.

    • Really? Where have you read that? Because a quick search on Slashdot shows that the words VPN and Travelex have never been used in the same article posted before this one. In fact the only reference to Travelex doesn't mention in either summary or linked material at all the source of the exploit, nor does it mention the company behind the VPN.

      Are you against learning new information? Is that why you think this is a dupe?

  • I see a pattern here... patch announced months ago, then an exploit of the patched issue, then a major database found to not have the patch goes haywire.

    Seems like we're at a script kiddie level of hacking again. You don't need to understand the flaw, you just "check to see if their patched" and then attack the ones showing too low a version number. We've got to get better control of this.

    • by ceoyoyo ( 59147 ) on Wednesday January 08, 2020 @07:46PM (#59600974)

      We never left the script kiddie level of hacking. If anything, it's even worse now, since the script kiddies all have general purpose exploit scanners that are automatically updated over the internet.

      • The large corporate IT people buy proprietary security software so they can have somebody to blame - job security is more important than system security.

        One small problem.

      • HaXx0r tool updated over the internet - and I bet their computers are now mining Bitcoin or is a node for a bot net. There's no honour among thieves.
        • by ceoyoyo ( 59147 )

          That is an intriguing idea. Do you have a newsletter I could subscribe to?

          I wonder if one could find fame and fortune as a meta security researcher: tracking exploits for exploit tools.

    • by gweihir ( 88907 )

      One of the reason any halfway competent security audit makes sure there is somebody responsible for updates and patches for every security-relevant application and that there are processes that force timely execution.These morons either did not have a software-inventory with application owners, or the application owners just could ignore security issues without consequences. This is not a tech-fail, this is a process-fail. On the level of how bad they did screw up, I think negligence does not get much more

      • When stuff is outsourced, or you have contractors who come in, do their thing and leave this kind of responsibility gets completely lost.
      • It's a process fail, but let's not exclude the idiots in management who think of buying computer and networking systems like buying a washing machine -- you spend once, and the system runs for 10 years without any other costs besides electricity.

        The management processes exist for these tasks, but often they aren't funded right in terms of staffing levels, training, support contracts, and so on, let alone the business disruption challenges of reboots, downtime, etc.

    • Twas always thus. The bad news now is we are probably going to see more exploits layered together. A VPN exploit like this together with ransomeware and something like a BlueKeep exploit to propagate is bad news indeed.
    • by Slayer ( 6656 )

      You can blame TravelEx all day long for not patching their VPN (and they did fail comprehensively for eight straight months!), but that's not the whole story here IMHO. Yes, TravelEx had two full months between vulnerability report and first exploitation, but how in the world can a professional security company like Pulse Secure release such a shoddy firewall product, that can be so completely exploited through the port which it is meant to protect?

      14 years ago a similar situation all but wiped out most of

  • Travelex's website [travelex.com] is showing a press release dated yesterday instead of its normal page. They're not able to give quotes or exchange anything right now.

  • by sconeu ( 64226 ) on Wednesday January 08, 2020 @07:03PM (#59600850) Homepage Journal

    It's a good thing that nobody posted this story yet [slashdot.org].

    • Hey, it was a whole 7 stories ago and still on the front page. BeauHD would have to read slashdot or even scroll down in order to see that this was a dupe. That's too much to ask for someone paid to be an editor here.

    • Really? Where does that story mention VPNs? The exploit being used? Did you post the wrong link, because it seems you're implying this story here with completely different information is a dupe.

  • Travelex can still make a profit on this incident. All they have to do is charge high enough exchange and service fees on the $6M ransom.

One man's constant is another man's variable. -- A.J. Perlis

Working...