The MITRE Corporation, a non-profit that oversees federally funded research, suffered a data breach in January and has explained that it was caused by threat actors who exploited two zero-day vulnerabilities in products from its IT vendor, Ivanti's Connect Secure.
Ivanti has shared that the threat actors exploited the two vulnerabilities (CVE-2023-46805 and CVE-2024-21887) to attack at least 10 of its customers.
MITRE CTO Charles Clancy shared that the affected network 'provides storage, computing, and networking resources.' Clancy added that there is 'no indication that MITRE's core enterprise network or partners' systems were affected by this incident.'
In the blog post, MITRE shared that the threat actors used a 'combination of sophisticated backdoors and webshells to maintain persistence and harvest credentials.' They also shared,' At the time we believed we took all the necessary actions to mitigate the vulnerability, but these actions were clearly insufficient.'
MITRE has stated that they would further investigate the depth of the attack.
While MITRE has not attributed the incident to anyone, Volexcity, who initially discovered the Ivanti vulnerabilities, attributed it to the alleged Chinese nation-state-level threat actor.
,Regístrepor correo electrónico ahora para acciones semanales de promoción
100% free, Unsubscribe any time!Add 1: Room 605 6/F FA YUEN Commercial Building, 75-77 FA YUEN Street, Mongkok KL, HongKong Add 2: Room 405, Building E, MeiDu Building, Gong Shu District, Hangzhou City, Zhejiang Province, China
Whatsapp/Tel: +8618057156223 Tel: 0086 571 86729517 Tel en Hong Kong: 00852 66181601
Correo electrónico: [email protected]