The FBI wants the public to help it track down Chinese hackers
Agency is asking anyone with information to reach out
When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.
The US Federal Bureau of Investigation (FBI) is asking the general public for help in the investigation, and identification, of a threat actor targeting edge devices and computer networks in government entities and other companies.
Citing a report from cybersecurity researchers Sophos, the FBI said an Advanced Persistent Threat (APT) group created and deployedmalware“as part of a widespread series of indiscriminate computer intrusions” built to steal sensitive information from firewalls worldwide.
The campaign leveraged, first and foremost, CVE-2020-12271, an SQL injection issue found in SFOS 17.0, 17.1, 17.5, and 18.0 before late April 2020, on Sophos XG Firewall devices. The vulnerability affected devices configured with either the administration (HTTPS) service or the User Portal exposed on the WAN zone. The crooks abused the bug to trigger remote code execution (RCE), leading to the exfiltration of usernames and hashed passwords from local device admins, portal admins, and user accounts.
Years-long campaign
The move is linked to a series of recent reports from Sophos which details multiple hacking campaigns that took place between 2018 and 2023 and apparently exploited edge infrastructure appliances to deploy custom malware. Sophosdubbed the campaign Pacific Rim, and attributed it to multiple Chinese state-sponsored threat actors, including the infamous Volt Typhoon.
Sophos also said that CVE-2020-12271 wasn’t the only vulnerability exploited in this campaign, also listing CVE-2020-15069, CVE-2020-29574, CVE-2022-1040, and CVE-2022-3236.
“From 2021 onwards the adversaries appeared to shift focus from widespread indiscriminate attacks to highly targeted, ‘hands-on-keyboard’ narrow-focus attacks against specific entities: government agencies, critical infrastructure, research and development organizations, healthcare providers, retail, finance, military, and public-sector organizations primarily in the Asia-Pacific region,” the company said at the time.
Those with actionableintelcan reach out to the FBI viaWhatsApp, Signal or Telegram.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
ViaThe Hacker News
You might also like
Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.
A critical Palo Alto Networks bug is being hit by cyberattacks, so patch now
3 reasons why PIA fell in our best VPN rankings
Stormforce Pro Creator 0601 workstation review