Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

Nvidia-backed Sandboxaq accelerates drug discovery by launching AI molecular datasets

Hackers steal and destroy millions of Iran’s biggest crypto exchanges

Over 1,500 Minecraft players infected with Java malware pretending to be game mods on GitHub

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Cisco confirms that the salt typhoon has used CVE-2018-0171 to target communications networks
Identity

Cisco confirms that the salt typhoon has used CVE-2018-0171 to target communications networks

userBy userFebruary 21, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 21, 2025Ravi LakshmananNetwork Security/Vulnerabilities

Cisco confirmed that a Chinese threat actor known as Salt Typhoon is likely to abuse a known security flaw tracked as CVE-2018-0171, targeting large US telecom companies. We have confirmed that we gained access by obtaining legitimate victim login credentials as part of our target campaign.

“Threat actors have since demonstrated their long-term sustainability in target environments across multiple vendor equipment, maintaining access for over three years,” says Cisco Talos, who has been extremely aware of the hackers. He explained that he is providing sophisticated funding.

Cybersecurity

“This campaign’s long timeline suggests high degree of coordination, planning, and perseverance. This is a standard feature of advanced persistent threats (APTs) and state-sponsored actors.”

Networking Equipment Major has hacked other known security bugs, contrary to recent recorded future reports that include attempts to exploit the defects tracked as CVE-2023-20198 and CVE-2023-20273. He said he had found no evidence of weaponization by the crew. Intrusion network.

An important aspect of the campaign is to gain initial access using valid and stolen credentials, but at this stage how it will be retrieved is unknown. It has also been observed that threat actors are getting their credentials through network device configuration and making efforts to decrypt local accounts with weak password types.

“In addition, threat actors have been observed capturing SNMP, TACAC and RADIUS traffic, including private keys used between network devices and TACACS/RADIUS servers,” Talos said. “The intent of this traffic capture is almost certainly to enumerate additional credential details for subsequent use.”

Another notable behavior that Salt Typhoon shows involves leveraging lifestyle (LOTL) techniques on network devices, and abuses trusted infrastructure to jump from one communication to another. Masu.

These devices are suspected to be used as intermediate relays to reach the intended final target, or as the first hop in an outbound data exfiltration operation.

Additionally, we found that Salt Typhoon has changed its network configuration to create local accounts, enabled guest shell access, and facilitated remote access over SSH. It also uses a custom utility called Jumble Path, which allows packet capture to be performed on remote Cisco devices via actor-defined jump hosts.

GO-based ELF binaries can also clear logs, obfuscate traces of malicious activity, and disable logs to make forensic analysis more difficult. This is complemented by regular steps made to clear relevant logs, such as .bash_history, auth.log, lastlog, wtmp, and btmp, if applicable.

Cybersecurity

“Using this utility will help obfuscate the source and final destination of the request, allowing operators to move devices or infrastructure that are not potentially breachable (or routable).” Cisco said.

“Threat actors repeatedly change the address of loopback interfaces on compromised switches, use that interface as the source of SSH connections to additional devices in the target environment, and then use them to determine the appropriate access control lists for those devices ( It will enable you to bypass the ACL effectively.

The company also identified “additional broad targeting” for Cisco devices with exposed smart installations (SMIs), followed by the use of CVE-2018-0171. It noted that its activity was unrelated to salt typhoons and did not share any overlap with known threat actors and groups.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCISA flag crafts vulnerability in CVE-2025-23209 CMS amid aggressive attack
Next Article US deportation 177 Venezuelan immigrants from Guantanamo Bay News
user
  • Website

Related Posts

Over 1,500 Minecraft players infected with Java malware pretending to be game mods on GitHub

June 18, 2025

FedRamp at Startup Speed: Lessons Learned

June 18, 2025

Water Curse employs 76 GitHub accounts to provide multi-stage malware campaigns

June 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Nvidia-backed Sandboxaq accelerates drug discovery by launching AI molecular datasets

Hackers steal and destroy millions of Iran’s biggest crypto exchanges

Over 1,500 Minecraft players infected with Java malware pretending to be game mods on GitHub

Pro-Israel hackers will destroy $90 million with Iranian code, the company says

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Nvidia-backed Sandboxaq accelerates drug discovery by launching AI molecular datasets

BTCC Exchange celebrates its 14th anniversary with the launch of its first user badge program

Top 10 Startup and Tech Funding News – June 17, 2025

OpenAI’s AI Technology to Revolutionize Military Operations?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.