May 8, 2024, 11:06 a.m. | Zeljka Zorz

Help Net Security www.helpnetsecurity.com

MITRE has shared a timeline of the recent breach if fell victim to and has confirmed that it began earlier than previously thought: on December 31, 2023. On that day, the attackers deployed a web shell on an external-facing Ivanti Connect Secure VPN appliance by exploiting CVE-2023–46805 and CVE-2024–21887, two zero days whose existence became publicly known in early January, when patches were still unavailable. Tools and techniques used to breach MITRE The attackers leveraged … More →


The post …

apt attackers backdoor breach connect connect secure cve cve-2024 data breach december don't miss exploiting external facing failures government-backed attacks hot stuff ivanti ivanti connect secure ivanti connect secure vpn mandiant mitre reconnaissance reveal secure vpn shell thought timeline victim volexity vpn web web shell

More from www.helpnetsecurity.com / Help Net Security

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Senior Security Analyst

@ Oracle | United States

Associate Vulnerability Management Specialist

@ Diebold Nixdorf | Hyderabad, Telangana, India

Cybersecurity Architect, Infrastructure & Technical Security

@ KCB Group | Kenya