ArcaneDoor – New campaign found targeting network devices

blog.talosintelligence.com

72 points by voisin 15 days ago


robocat - 15 days ago

> While we have been unable to identify the initial attack vector, we have identified two vulnerabilities (CVE-2024-20353 and CVE-2024-20359)

So update but probably remain vulnerable - there is no reason to think CISCO has fixed the original vulnerability.

Irrelevant aside: CISCO could have just reported a couple of zero-days they already knew of. Maybe vendors will start stockpiling zero-days ;-P

_obviously - 14 days ago

This attack is very sophisticated and still the root cause is undiscovered.

buildbot - 15 days ago

It’s interesting how it always the big vendors that seem to suffer attacks like this - is it the more positive angle that simply nobody important uses stuff like opnsense? Or more negatively, not enough people paying attention to catch these attacks?

GartzenDeHaes - 14 days ago

Might be off topic, but has Cisco ASA improved much in the past four or five years? The one I had years ago was not much use for anything other than basic access rules.

zmgsabst - 14 days ago

Could this kind of attack be used to intercept a WebEx call, say between German generals?

ChrisArchitect - 15 days ago

Related:

Cisco says hackers subverted its security devices to spy on governments

https://news.ycombinator.com/item?id=40174207

_wire_ - 15 days ago

"espionage-focused campaign found targeting network devices"

Nice copy.

—"multiple vendors" = Cisco and Microsoft... and others

"these devices need to be routinely and promptly patched; using up-to-date hardware"

Contact sales at xxx...

"Cisco’s position as a leading global network infrastructure vendor gives Talos’ Intelligence and Interdiction team immense visibility into the general state of network hygiene. This also gives us uniquely positioned investigative capability into attacks of this nature."

—Is this a security bulletin or a prospectus? When is a liability an asset? You decide

"Early in 2024, a vigilant customer reached out to both Cisco’s Product Security Incident Response Team (PSIRT) and Cisco Talos to discuss security concerns..."

—More fine copy.

"Cisco Secure Firewall (formerly Next-Generation Firewall and Firepower NGFW) appliances such as Threat Defense Virtual, Adaptive Security Appliance and Meraki MX can detect malicious activity associated with this threat."

—ABC: Always Be Closing!

"This threat demonstrates several techniques of the MITRE ATT&CK framework, most notably..."

—Several = 15

—List of 100s of vectors and effects over years

"As a part of our ongoing investigation, we have also conducted analysis on possible attribution of this activity. Our attribution assessment is based on the victimology..."

—We still don't know what's going on or why. Order now!

—Re Talos: back in 2008 there was a little upset in bank derivatives due to the standards and practices of a little sector of the bond market called The Ratings Agencies.

—In the tech sector Cisco stock rose sharply on HW sales surge after a critical vulnerability in government systems was exposed in existing HW...

THANK YOU THANK YOU I'LL BE HERE ALL WEEK TRY THE VEAL

hnthrowaway0328 - 14 days ago

> This implant is a memory-resident shellcode interpreter that enables adversaries to upload and execute arbitrary shellcode payloads.

This sounds interesting. I'm eager to see some code.

nuker - 14 days ago

All my edge devices would be OpenBSD ones. These Ciscos and Junipers have a bad history of backdoors.