Physical Address

304 North Cardinal St.
Dorchester Center, MA 02124

A brief history of mass hacks


The organization such as Routers, Firewalls and VPN, corporate networks are available to protect against aggressors and harmful hackers, something that is especially important in the wide range of remote and hybrid.

Although the organizations sounded like tools that help them remain safe threats, most of these products include software errors that allow harmful hackers to compromise to the protection of these products.

These errors were blamed For the blast in Mass Hacking Campaigns In recent years, harmful hackers are abusing such a exploitation and easy exploits to access the networks of thousands of organizations and steal sensitive company information.

We brought together a brief history of mass hacks and update this article when it comes to light.

One of the first mass volumes of this decade saw Notorious A Ransomware crew exploit a sensitivity of Fortra’s Goany A managed file transfer program, a product used by companies to share large files and sensitive databases over the internet. Prolific Clop Ransomware gang has made more than 130 organization compromise and exploited mistakes to steal millions of people. Weakness was exploited as a zero day, ie Fortra did not have time to repair before being attacked. Later, clop hackers were released from Sacrificial organizations that do not pay a ransom. Hitachi Energy, Security Giant Rubrikand organizational organizational health technology in Florida Those who see more than three million members in the attack – Interventions resulting from Buggy Program.

May 2023: Guitis defects allow theft of 60 million people to theft

This The mass of aititis It remains one always the largest mass violationsHackers abuse a flaw in a very widely used file transfer program developed by the Progress Program to steal data from several thousand organizations. Attacks were required by CLOP Ransomware Group, which explains the sensitivity of movement to steal information from 60 million people, according to Cybersecure EMSisoft. US government services were the largest victim of movement after confirmation of giant Maximus, hackers entered protected health information As long as 11 million people.

October 2023: Cisco Zero Day, took a thousand routers

Mass Hacks lasted until the second half of 2023 Hackers exploit a non-open zero day weakness in Cisco’s network program In October, tens of thousands of devices relying on the program such as keys, wireless controllers, access points and industrial routers. Bug, “Complete control of the discounted device” to the attackers. Cisco, several clients and assets for Internet connected devices and assets, when not confirming that the search engine is affected by the search engine, the Internet has observed 42,000 discounted devices, which are exposed to 42,000 discounted devices.

Exchange of a Cisco logo and sign the ceiling of a Congress Center
Photo Loan: Ramon Costa / Sopa Images / LightBocket via Getty IMGS)

November 2023: Ransomware Ganggi exploits Sitrix errors

Citrix Netscaler, which is the use of large enterprises and governments for the application delivery and VPN connection, The latest mass hack target Only a month later in November 2023. Aerospace giant Boeing, law firm Allen & Overy and China was allegedly as victims of Industry and Commercial Bank.

January 2024: Chinese hackers violated the companies that violated the Ervi VPN mistakes

Ivani became a name called Synonym with a massive hack after Hacks supported by the Chinese state started the mass exploiter Two critical zero-day vulnerabilities on Ivani Corporate Connect Secure VPN. Ivanti, only a limited number of customers affecting Kibers, cybersecurity company in Kibers, more than 1,700 Ivantic devices, has been affected by organizations in aerospace, banking, defense and telecommunications industries. US government agencies have been ordered immediately in operation with Ivantian systems affected Remove systems from service. These vulnerabilities have since then coordinated to a Chinese-supported group of spying, known as Salt TypeRecently, at least nine US telecommunications companies were found to hack their networks.

Hackers in February 2024 He got the purpose of ConnectWise ScreenConnect is a popular remote access tool that allows them to provide technical staff directly to provide direct customer systems to the vulnerabilities of the two “easy operating”. The giant bidders of cibers said, “The researchers, back doors and some cases, the two flaws were abused by various danger actors to place the rear doors, he said.

Hackers hit Ivandi customers with fresh mistakes (again)

Ivanti made headlines – In February 2024 – attackers, when the widely used enterprise has exploited another weakness in the VPN device To make mass hackers. The Shakraker Fund is a non-profit organization that scans and watching the Internet for exploitation, TechCrunch in Techcrunch, which has been observed more than 630 unique IP addresses that allow attackers access to devices and systems.

November 2024: Palo Alto Firewall Bugs put thousands of firms at risk

Later, in 2024, hackers were potentially violated by operating thousands of organizations Two zero days weaknesses CyberSecurity is used by the giant Palo Alto networks and is used anywhere in the world. Pan-OS vulnerabilities, the operating system of all generation firewalls of Palo Alto allowed aggressors to compromise and exfoliate sensitive information from corporate networks. According to Researchers Watchtowr Labs in security company Palo Alto reverse the patches, the defects were created as a result of the main mistakes in the development process.

December 2024: Clop Cleo is compromised to customers

In December 2024, the Clop Ransomware gang targeted another popular file transfer technology to start the fresh wave of mass hacks. This time the bunch Exploited flaws Tools developed by the Cleo program, an Illinois-based enterprise program, to target the customers of the company with them. In early 2025 in January Clop, almost 60 Cleo company listed The US Supply Chain Chain Program claimed to compromise, including giant blue yonder and German production giant condescing. Until the end of January, Klop added a 50 Cleo mass hack to the dark website leak.

A photo out of the headquarters of the covestro in Germany.
Photo Loan: through Getty Imager through Alex Kraus / Bloomberg

January 2025: New Year, New Ivani Bugs under attack

New Year started with the victim of Ivanti’s hackers – Again. The US program giant said in early January 2025, Haker’s enterprise, the company’s “limited number of” customers have influenced a new zero-day weakness, but several people said. Shadow fund says that their data showed Hundreds of retreated customer systems.

Fortinet firewall bugs operated since December

A few days after the last mistake of Ivii, Fastinet confirmed the hackers in their firewalls, in their firewalls, operating a sensitivity to access their corporate and enterprise customers. CyberCurity is a defect affecting Fortigate Firewalls been “mass exploitation” as a zero-day error since at least 2024According to security research firms. Fortinet was rejected to investigate several clients, but the investigation of the effects of security research companies affected by “dozens of” devices affected by security research companies.

Sonicwall says hackers hacked to clients remotely

January 2025, the Enterprise security program was a busy month for hackers who used hackers. Sonicwall said in January-January, still exploited a new discovered weakness in one of the institutions of unknown hackers Going out to customer networks. SonicWall’s SMA1000 Remote Input Vulnerability was discovered by Microsoft’s threats, and according to Sonicwall, “It is confirmed as in the wild.” If the company has several people affects its customers or the company’s approval is the technical ability, however More than 2300 devices exposed to the internetThis error has the potential to be the latest mass of 2025.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *