CISA: Chinese State Hackers Are Exploiting F5, Citrix, Pulse Secure, and Exchange Bugs (zdnet.com) 26
The Cybersecurity and Infrastructure Security Agency (CISA) has published a security advisory today warning of a wave of attacks carried out by hacking groups affiliated with China's Ministry of State Security (MSS). From a report: CISA says that over the past year, Chinese hackers have scanned US government networks for the presence of popular networking devices and then used exploits for recently disclosed vulnerabilities to gain a foothold on sensitive networks. The list of targeted devices includes F5 Big-IP load balancers, Citrix and Pulse Secure VPN appliances, and Microsoft Exchange email servers. For each of these devices, major vulnerabilities have been publicly disclosed over the past 12 months, such as CVE-2020-5902, CVE-2019-19781, CVE-2019-11510, and CVE-2020-0688, respectively. According to a table summarizing Chinese activity targeting these devices published by CISA today, some attacks have been successful and enabled Chinese hackers to gain a foothold on federal networks.
grain of salt (Score:2, Interesting)
How do they really know it's from gov't sponsored hackers? Often a chain of compromised private servers, routers, and PC's is used to hide the actual originator. "It matches their pattern" is often not good enough, because spoofing and cloning tools is common in the underground to hide the real origin.
Being the current administration enjoys bashing that country and readily fires dept. heads he doesn't like, I don't trust such announcements.
Re: (Score:3)
It is a pretty fair guess that Chinese hackers are indeed doing this. As are US hackers, Russian hackers, and hackers from pretty much every other country in the world. Who does not love easy exploits?
Not even sure why this is news.
Re: (Score:2)
I'm sure they are, but that doesn't necessarily mean they are being detected with certainty. I know there are mice under our house, but I can't reasonably blame every oddity on them.
I suspect political reasons, but I'll leave it at that.
karma (Score:4, Insightful)
This is called tit-for [wired.com]-tat [zdnet.com].
Re: (Score:2, Troll)
We all know the CIA has been spying for decades. That doesn't make it "ok" and it doesn't take away from Chinese espionage.
Re: (Score:2)
We all know the CIA has been spying for decades.
Why do you like to be a victim [washingtonpost.com] of [wikipedia.org] the three-letter-agencies?
Re: (Score:2)
This is called tit-for-tat.
You seemed to have forgotten that China violated [reuters.com] the U.S.-China Cyber Agreement of 2015 [fas.org] before discarding it.
This isn't tit-for-tat, this is China hacking the US regardless of what the US does.
Re: (Score:2)
as told you by the same three-letter-agencies that also told us about the danger of Iraq WMD?
Re: (Score:2)
And by the same token, why should you care if there's any human right violations in China (*) or not? If there're severe human right violations, the Chinese people will eventually revolt. That's not the American business.
(*) And the situations for Chinese including those Uyguirs and Tibetans are in fact way better than the situation of black Americans.
Was Commander Joseph Rochefort a state hacker? (Score:2)
Seventy years later we are talking about the exploits of the code b
Re:Was Commander Joseph Rochefort a state hacker? (Score:4, Interesting)
Re: (Score:2)
The rules change during a declared war. Example: The CIA organizing and supporting the overthrow of the democratically elected government of Iran was a crime. Doing the same to WW2 Italy would be legal.
To use a sports analogy, what Rochefort did is the equivalent of figuring out the signs of an opposing baseball team during the game by watching, while what the Chinese are doing would be the equivalent of sticking a camera/microphone in the opposing team's dugout.
Re: (Score:3)
Being legal by the pre-existing rules is the consolation prize given to the loser.
If SunTzu [wikipedia.org] did not say it himself, he most definitely would agree with it.
Re: (Score:2)
In both cases the target is the same: get intelligence on your (possible) opponent, but whereas the Allies in WW2 collected traffic by passive methods (they did nothing to the traffic itself or the hardware used to gene
Re: (Score:2)
1) Looks like your understanding of English is not too good, maybe your understanding of Chinese is better? The section you're presumably referring to in the link you provide reads thusly: "The American effort was directed from Washington, D.C. by the U.S. Navy's signals intelligence command, OP-20-G; at Pearl Harbor it was centered at the Navy's Combat Intelligence Unit (Station HYPO, also known as COM 14),[18] led by Commander Joseph Rochefort." There's a semicolon between the clause about OP-20-G and t
let me fix that... (Score:3)
Let me just fix the title:
"CISA: US State Hackers Are Exploiting F5, Citrix, Pulse Secure, and Exchange Bugs"
Re: (Score:2)
You can't read, huh?
Re: (Score:2)