Pulse Security Devices Identified with Malware: Alerts CISA

This article has been indexed from E Hacking News – Latest Hacker News and IT Security News

 

A detailed warning concerning almost 13 malware samples associated with Pulse Secure operated devices has been issued by the Cybersecurity and Infrastructure Security Agency (CISA). These specimens were flown beneath the anti-virus radar. 
In Pulse Connect Secure’s suite of virtual private network (VPN) devices, at least two main hacker groups have distributed a dozen malware families to spies on the US defense sector. Several hacking organizations supported by the Chinese are believed to be behind the attacks. 
Executives were urged to evaluate the document to identify the threat actor’s strategies, techniques, and procedures while looking for any signs of data being compromised. 
Pulse Secure is indeed a global business with offices around the world. Its headquarters are situated in Silicon Valley, with development offices in Massachusetts and India. Pulse has sales offices located across America, Europe, the Middle East, and Asia. It’s the most diverse SSL-VPN in the World to ensure user productivity, IT agility, and continuity in the enterprise. 
Pulse Secure devices, key infrastructure institutions, and other organizations in the commercial sector have been targeted by cyber threats ever since June 2020. Attackers used various vulnerabilities for the first entry and deployed backdoor web shells (CVE-2019-11510, CVE-2020-8260, CVE-2020-8243, CVE-2021-2289). 
All of the documents examined by the CISA were identified o

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

Read the original article: Pulse Security Devices Identified with Malware: Alerts CISA