Cryptopolitan
2025-09-26 09:30:00

Hackers exploit Cisco firewalls in US federal systems

According to a senior federal official, hackers have slipped past defenses by compromising firewall devices inside the federal government. On Thursday, the US Cybersecurity and Infrastructure Security Agency (CISA) sent an urgent directive, telling agencies to secure Cisco firewall devices and look for any signs of compromise. Chris Butera, acting deputy executive assistant director for CISA’s cybersecurity division, has even asked other government bodies and private companies to take similar precautions, noting that the threat is widespread. According to a US official, about 10 organizations worldwide have been breached, although that number could increase. The official said there were still “a lot of unknowns” about the campaign. Another US official called the campaign “very sophisticated” and noted the hackers’ malware as highly intricate. “CISA is deeply concerned about this activity,” the second official said. “If agencies don’t get on this right away, it could be bad for them.” Two critical flaws (CVE-2025-20333 and CVE-2025-20363) and one medium (CVE-2025-20362) — affected Cisco’s Adaptive Security Appliance and Firepower Threat Defense devices that utilize ASA software. Cisco calls the attackers’ methods complex and sophisticated The group, which Cisco calls ArcaneDoor, has reportedly been conducting spying operations since last year. According to CISA, their attacks could hurt critical infrastructure in the US. Nonetheless, Washington is bracing for a busy few days as teams work to detect the hackers and secure vulnerable devices before more damage occurs. Agencies must update and submit reports by Friday. Cisco told reporters it collaborated with multiple agencies in May to investigate the hacks and later uncovered three additional vulnerabilities exploited by the attackers. It said the hackers used these flaws to install malware, run commands, and potentially steal data. The company has also advised customers to patch their systems immediately. The UK government had also issued its own warning Thursday, describing the hackers’ malware as a “major step forward” from their earlier tools. Per Cisco’s analysis, the hackers exploited several zero-day flaws and used stealth tactics like turning off logging, hijacking commands, and crashing devices to avoid detection. The company even describes the tactics as complex and sophisticated. The compromised devices included certain models from Cisco’s ASA 5500-X Series, which serve as firewalls to shield corporate networks from attacks. Analysts believe a China-linked group was involved in the attack So far, authorities have not named any suspects for the attack, but researchers believe the hackers are linked to China and have been targeting Cisco vulnerabilities for an extended period. Butera claimed that their directive will help map out the complete extent of the compromise affecting federal networks. Palo Alto Networks’ Unit 42 also told CNN they believe the campaign is China-linked and noted that more groups may soon target the same weaknesses now that the vulnerabilities and fixes are public. Sam Rubin, a senior vice president at Unit 42, iterated, “As we have seen before, now that patches are available, we can expect attacks to escalate as cybercriminal groups quickly figure out how to take advantage of these vulnerabilities.” Palo Alto has been monitoring hackers worldwide, and according to them, the group has been changing tactics and leaning towards more US entities. This disclosure comes just days after Mandiant, part of Google, said a separate group of suspected Chinese hackers infiltrated US software developers and law firms in an espionage campaign tied to the US-China trade dispute. The firm said full remediation may take months. KEY Difference Wire : the secret tool crypto projects use to get guaranteed media coverage

Crypto 뉴스 레터 받기
면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.