Source |
Checkpoint |
Identifiant |
8649660 |
Date de publication |
2025-02-21 17:57:21 (vue: 2025-02-21 18:08:17) |
Titre |
Check Point Research explique le pad Shadow, Nailaolocker et sa protection Check Point Research Explains Shadow Pad, NailaoLocker, and its Protection |
Texte |
> Un cluster d'activité de menace nouvellement identifié a exploité la vulnérabilité du point de contrôle déjà paralysé CVE-2024-24919 (fixe en mai 2024) pour déployer ShadowPad. Les rapports indiquent que, dans un petit nombre de cas, cette infection initiale a également abouti au déploiement de ransomwares Nailaolocker. Aucune nouvelle vulnérabilité n'a été exploitée uniquement la divulgation et corrigé précédemment. Les clients qui n'ont pas encore mis en œuvre le correctif doivent suivre les instructions ici. Cela empêchera les attaquants d'obtenir des informations d'identification VPN, qui est la première étape de la chaîne d'infection. La campagne a ciblé diverses organisations, principalement en Europe, en Afrique et dans les Amériques. Le secteur le plus ciblé était la fabrication. Vérifiez […]
>A newly identified threat activity cluster leveraged the already-patched Check Point vulnerability CVE-2024-24919 (fixed in May 2024) to deploy ShadowPad. Reports indicate that, in a small number of cases, this initial infection also resulted in the deployment of NailaoLocker ransomware. No new vulnerability was exploited-only the previously disclosed and patched one. Customers who have not yet implemented the patch should follow the instructions here. This will prevent attackers from getting VPN credentials, which is the first step in the infection chain. The campaign targeted various organizations, mainly in Europe, Africa, and the Americas. The most targeted sector was manufacturing. Check […]
|
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
2024 24919 activity africa already also americas attackers campaign cases chain check cluster credentials customers cve deploy deployment disclosed europe explains exploited first fixed follow from getting have here identified implemented indicate infection initial instructions its leveraged mainly manufacturing may most nailaolocker new newly not number one only organizations pad patch patched point prevent previously protection ransomware reports research resulted sector shadow shadowpad should small step targeted threat various vpn vulnerability which who will yet |
Tags |
Ransomware
Vulnerability
Threat
|
Stories |
|
Move |
|