Chinese Attackers Favorite Flaws Prove Global Threats, Research Shows

  /     /     /  
Publicated : 23/11/2024   Category : security


Chinese Attackers Favorite Flaws Prove Global Threats, Research Shows


Following the NSAs list of 25 security flaws often weaponized by Chinese attackers, researchers evaluated how theyre used around the world.



The 25 vulnerabilities most commonly scanned for and targeted by Chinese nation-state attackers were exploited seven times more often than other flaws in the past six months, researchers report in their analysis of a list published by the US National Security Agency (NSA).
NSA
officials released
a cybersecurity advisory detailing vulnerabilities most frequently used in Chinese state-sponsored cyber activity, which they consider one of the greatest threats to US National Security Systems, US Defense Industrial Base, and Department of Defense information networks. This activity often employs a range of tactics to target networks for sensitive intellectual property and economic, political, and military data.
Most of the flaws on its list can be exploited to gain access to victim networks using products that are directly accessible from the Internet and can act as gateways into internal networks. Many of the products are popular; many are used for remote access or external Web services.
Check Point researchers curious about the global impact of these vulnerabilities turned to its threat intelligence tools to evaluate how theyre being weaponized. They found these attacks targeted 161 countries around the world, primarily in the US (500,000+ attacks) but also in Germany, the United Kingdom, Indonesia, and the Netherlands,
their data shows
.
Following the NSA report, we wanted to see whats going on worldwide on attacks targeting those vulnerabilities, as those are on high-profile products, such as Microsoft, Adobe, and the majority of them may have severe impact, says Adi Ikan, group manager for Check Points network research and protection team.
Attacks were also seen across industries. Government and military targets were most common in attacks using these vulnerabilities, as were retail/wholesale, manufacturing, and finance. In the US, nearly 30% of attacks targeted government and military victims, which researchers say is 31% more compared with the rest of the world. Ikan notes government and military were also often targeted in Spain, Canada, and Denmark.
Three key reasons could explain the increased use of these flaws, he says. Some are easy to exploit — such as the remote code execution vulnerability in the Atlassian Confluence Server (CVE-2019-3396) — which increases the likelihood theyll be exploited more often. Flaws that cause severe impact are more attractive to attackers, as are vulnerabilities in high-profile tools that could boost the number of potentially affected systems.
There were five flaws exploited more often than others. One of these was critical DrayTek Vigor Command Injection vulnerability CVE-2020-8515, which could allow remote code execution without authentication in DrayTek Vigor VPN routers. Microsoft Windows NTLM Authentication Bypass flaw (CVE-2019-1040) is a tampering vulnerability that exists in Windows when a man-in-the-middle attackers can bypass the NTLM Message Integrity Check (MIC) protection.
Check Points top five also included CVE-2019-19781, a bug in Citrix Application Delivery Controller and Gateway that could allow directory traversal and lead to remote code execution without credentials. An unauthenticated remote attacker could exploit Pulse Secure VPN flaw CVE-2019-11510 to do an arbitrary file reading and expose keys or passwords. A critical remote code execution flaw in F5 BIG-IP proxy/load balancer devices (CVE-2020-5902) could enable an attacker with access to the Traffic Management User Interface to execute commands.
If You Arent Patching, You Should Be
NSA officials urge public and private organizations to patch these vulnerabilities immediately.
NSA recommends that critical system owners consider these actions a priority, in order to mitigate the loss of sensitive information that could impact U.S. policies, strategies, plans, and competitive advantage,
the advisory
states. All network defenders are urged to take action.
Organizations should expect that credentials, accounts, software, and other data stolen or modified before a device was patched wont be fixed by patching; therefore, password changes and account reviews should be regular. The NSA also advises disabling external management capabilities and setting up an out-of-band management network to mitigate risk, as well as blocking unused protocols at the network edge and disabling them in device configurations.
While these attacks can
cause major damage
and businesses are advised to apply these patches as quickly as possible, Ikan acknowledges its not always easy for organizations to stay updated with security fixes.
[A] potential challenge that organizations may face when patching is related to the operational side, he says. It may require significant efforts and operation to patch all systems as ongoing efforts, especially in cases like patching all the computers within the organization.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Chinese Attackers Favorite Flaws Prove Global Threats, Research Shows