Press ESC to close

Fortinet VPN zero-day exploited by Chinese threat actor

CategoryDetails
Threat ActorsBrazenBamboo (China-linked threat actor).
Campaign OverviewExploiting a zero-day vulnerability in Fortinet’s FortiClient VPN for Windows to extract credentials, VPN server details, and gain initial access for espionage.
Target RegionsLikely global, targeting corporate networks using Fortinet VPN solutions.
MethodologyExploitation of FortiClient VPN zero-day vulnerability; use of DeepData tool for credential theft, browser data extraction, and social media data theft.
Product TargetedFortinet FortiClient VPN for Windows, FortiManager servers (via FortiJump), Fortinet devices (historically exploited vulnerabilities).
Malware ReferenceDeepData (post-exploitation tool), FortiJump.
Tools UsedDeepData with plugins for credential theft, audio recording, browser data extraction, and social media data theft.
Vulnerabilities ExploitedFortiClient VPN zero-day (unpatched as of November 2024); CVE-2024-47575 (“FortiJump”), CVE-2022-42475 (FortiOS RCE vulnerability previously exploited).
TTPsCredential theft from memory, post-exploitation tools, RCE vulnerabilities, initial access via VPN zero-days, exfiltration of sensitive configuration data.
AttributionChina-linked threat actor (BrazenBamboo).
RecommendationsRestrict VPN access to trusted IPs; monitor login activity for anomalies; review Field Effect MDR notifications; wait for patch release from Fortinet.
SourceField Effect

Read full article: https://fieldeffect.com/blog/fortinet-vpn-zero-day-exploited

Disclaimer: The above summary has been generated by an AI language model

Leave a Reply

Your email address will not be published. Required fields are marked *