Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

Record Foreversion Chemicals Pollutions is located on 98% of the UK rivers

Government announces new plans to charge UK cyber

Q&A with ICC Wales for 2025 Sustainable Food Day

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Cisco confirms that the salt typhoon has used CVE-2018-0171 to target communications networks
Identity

Cisco confirms that the salt typhoon has used CVE-2018-0171 to target communications networks

userBy userFebruary 21, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 21, 2025Ravi LakshmananNetwork Security/Vulnerabilities

Cisco confirmed that a Chinese threat actor known as Salt Typhoon is likely to abuse a known security flaw tracked as CVE-2018-0171, targeting large US telecom companies. We have confirmed that we gained access by obtaining legitimate victim login credentials as part of our target campaign.

“Threat actors have since demonstrated their long-term sustainability in target environments across multiple vendor equipment, maintaining access for over three years,” says Cisco Talos, who has been extremely aware of the hackers. He explained that he is providing sophisticated funding.

Cybersecurity

“This campaign’s long timeline suggests high degree of coordination, planning, and perseverance. This is a standard feature of advanced persistent threats (APTs) and state-sponsored actors.”

Networking Equipment Major has hacked other known security bugs, contrary to recent recorded future reports that include attempts to exploit the defects tracked as CVE-2023-20198 and CVE-2023-20273. He said he had found no evidence of weaponization by the crew. Intrusion network.

An important aspect of the campaign is to gain initial access using valid and stolen credentials, but at this stage how it will be retrieved is unknown. It has also been observed that threat actors are getting their credentials through network device configuration and making efforts to decrypt local accounts with weak password types.

“In addition, threat actors have been observed capturing SNMP, TACAC and RADIUS traffic, including private keys used between network devices and TACACS/RADIUS servers,” Talos said. “The intent of this traffic capture is almost certainly to enumerate additional credential details for subsequent use.”

Another notable behavior that Salt Typhoon shows involves leveraging lifestyle (LOTL) techniques on network devices, and abuses trusted infrastructure to jump from one communication to another. Masu.

These devices are suspected to be used as intermediate relays to reach the intended final target, or as the first hop in an outbound data exfiltration operation.

Additionally, we found that Salt Typhoon has changed its network configuration to create local accounts, enabled guest shell access, and facilitated remote access over SSH. It also uses a custom utility called Jumble Path, which allows packet capture to be performed on remote Cisco devices via actor-defined jump hosts.

GO-based ELF binaries can also clear logs, obfuscate traces of malicious activity, and disable logs to make forensic analysis more difficult. This is complemented by regular steps made to clear relevant logs, such as .bash_history, auth.log, lastlog, wtmp, and btmp, if applicable.

Cybersecurity

“Using this utility will help obfuscate the source and final destination of the request, allowing operators to move devices or infrastructure that are not potentially breachable (or routable).” Cisco said.

“Threat actors repeatedly change the address of loopback interfaces on compromised switches, use that interface as the source of SSH connections to additional devices in the target environment, and then use them to determine the appropriate access control lists for those devices ( It will enable you to bypass the ACL effectively.

The company also identified “additional broad targeting” for Cisco devices with exposed smart installations (SMIs), followed by the use of CVE-2018-0171. It noted that its activity was unrelated to salt typhoons and did not share any overlap with known threat actors and groups.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCISA flag crafts vulnerability in CVE-2025-23209 CMS amid aggressive attack
Next Article US deportation 177 Venezuelan immigrants from Guantanamo Bay News
user
  • Website

Related Posts

CISA warns vulnerability of aggressive exploitation of Linux kernel privileges vulnerability

June 18, 2025

Former CIA analyst has been declared 37 months for leaking top secret defense documents

June 18, 2025

Critical RCE bug rated 9.9 cvss & replication

June 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Record Foreversion Chemicals Pollutions is located on 98% of the UK rivers

Government announces new plans to charge UK cyber

Q&A with ICC Wales for 2025 Sustainable Food Day

Jerome Vileta, Senior Project Coordinator at Impact XM

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Top 10 Startup and Tech Funding News – June 17, 2025

OpenAI’s AI Technology to Revolutionize Military Operations?

Elon Musk’s AI startup Xai raises $4.3 billion in equity funding in addition to $5 billion in debt transactions during the surge in AI costs

Sword Health lands $40 million to expand AI care into mental health, valuing $4 billion

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.