Jump to content

CISA confirms it was breached by attackers using Ivanti flaws, some systems taken offline


Recommended Posts

rssImage-5945279fb0c7dddc7168ed23c19989b4.jpeg

One of the organizations compromised through a recently-discovered flaw in Ivanti products was, ironically enough, the US government's Cybersecurity and Infrastructure Security Agency (CISA).

Confirmation of the breach came from CISA itself, as well as from an anonymous source “with knowledge of the situation”, with a CISA spokesperson telling The Record the organization “identified activity indicating the exploitation of vulnerabilities in Ivanti products the agency uses”.

“The impact was limited to two systems, which we immediately took offline. We continue to upgrade and modernize our systems, and there is no operational impact at this time,” the spokesperson said. As they shared no further details, the publication spoke to an anonymous source familiar with the matter, who claimed that the systems breached, and subsequently turned off, included the Infrastructure Protection (IP) Gateway, and the Chemical Security Assessment Tool (CSAT).

Ivanti's 2024 woes

The former holds “critical information” about the interdependency of U.S. infrastructure, while the latter holds “private sector chemical security plans”. CSAT holds “some of the country’s most sensitive industrial information”, the publication further claimed, saying that includes the Top Screen tool for high-risk chemical facilities, Site Security Plans, and the Security Vulnerability Assessment. 

Unfortunately, we don’t know if this was a ransomware attack, and if the attackers actually stole any of the sensitive data allegedly stored on these endpoints. Furthermore, the identity of the attacks is also unknown, but if it was ransomware, it’s most likely either LockBit, BlackCat (ALPHV), or Cl0p. 

News of security flaws in Ivanti products first broke in early January 2024, when the company announced addressing a critical vulnerability in its Endpoint Management Software (EPM), allowing for remote code execution (RCE). In the weeks to come, Ivanti found a handful of additional flaws, which were later found to be abused en-masse, by different threat actors looking to deploy various malware and infostealers. 

More from TechRadar Pro

View the full article

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...