This VPN and Windows 10 Bug Combo is Every Organization’s Nightmare

By chaining vulnerabilities in VPN services and Windows 10 together, hackers have managed to achieve entry to authorities networks according to a new joint security alert released by the FBI and CISA.

These assaults have focused federal as well as state, local, tribal and territorial (SLTT) government networks, although non-government networks have also been focused.

The FBI and CISA warned in their joint cybersecurity advisory that information about the 2020 election might be at risk from hackers accessing these authorities networks, saying:

“Though it does not seem these targets are being chosen due to their proximity to elections information, there could also be some danger to elections information housed on authorities networks. CISA is conscious of some cases the place this exercise resulted in unauthorized entry to elections help programs; nevertheless, CISA has no proof up to now that integrity of elections data has been compromised.”

Exploiting multiple vulnerabilities

The joint alert revealed that hackers are combining a vulnerability in the Fortinet ForitOS Secure Socket Layer (SSL) VPN, tracked as CVE-2018-13379, and the Zerlogon vulnerability in Windows 10’s Netlogon protocol, tracked as CVE-2020-1472, to launch this latest wave of attacks.

While the vulnerabilities in Fortinet’s VPN software present hackers with preliminary entry to a community, Zerologon permits them to achieve full management over a targeted community by taking up area controllers that are servers used to handle a network and often include the passwords for all linked workstations.

The FBI and CISA’s joint alert did not title the hackers behind this new wave of assault outright but it did say they have been “advanced persistent threat (APT) actors” which means they’re likely state-sponsored hackers.

To avoid falling sufferer to those attacks, the agencies advocate that each public sector and personal sector organizations update their programs instantly as patches have been available for months. Nonetheless, by failing to put in them, organizations have left themselves and their networks open to assault.