Navigation
Search
|
Inside a Firewall Vendor's 5-Year War With the Chinese Hackers Hijacking Its Devices
Friday November 1, 2024. 04:20 PM , from Slashdot
Sophos planted surveillance code on its own devices used by the hackers, allowing it to monitor their development of sophisticated intrusion tools, including previously unseen 'bootkit' malware designed to hide in the firewalls' boot code. The hackers' campaigns evolved from mass exploitation in 2020 to precise attacks on government agencies and infrastructure across Asia, Europe and the United States. Wired story adds: Sophos' report also warns, however, that in the most recent phase of its long-running conflict with the Chinese hackers, they appear more than ever before to have shifted from finding new vulnerabilities in firewalls to exploiting outdated, years-old installations of its products that are no longer receiving updates. That means, company CEO Joe Levy writes in an accompanying document, that device owners need to get rid of unsupported 'end-of-life' devices, and security vendors need to be clear with customers about the end-of-life dates of those machines to avoid letting them become unpatched points of entry onto their network. Sophos says it's seen more than a thousand end-of-life devices targeted in just the past 18 months. 'The only problem now isn't the zero-day vulnerability,' says Levy, using the term 'zero-day' to mean a newly discovered hackable flaw in software that has no patch. 'The problem is the 365-day vulnerability, or the 1,500-day vulnerability, where you've got devices that are on the internet that have lapsed into a state of neglect.' Read more of this story at Slashdot.
https://it.slashdot.org/story/24/11/01/088213/inside-a-firewall-vendors-5-year-war-with-the-chinese-...
Related News |
25 sources
Current Date
Nov, Thu 21 - 10:57 CET
|