Article Details

Scrape Timestamp (UTC): 2024-11-21 16:25:42.469

Source: https://thehackernews.com/2024/11/warning-over-2000-palo-alto-networks.html

Original Article Text

Click to Toggle View

Warning: Over 2,000 Palo Alto Networks Devices Hacked in Ongoing Attack Campaign. As many as 2,000 Palo Alto Networks devices are estimated to have been compromised as part of a campaign abusing the newly disclosed security flaws that have come under active exploitation in the wild. According to statistics shared by the Shadowserver Foundation, a majority of the infections have been reported in the U.S. (554) and India (461), followed by Thailand (80), Mexico (48), Indonesia (43), Turkey (41), the U.K. (39), Peru (36), and South Africa (35). Earlier this week, Censys revealed that it had identified 13,324 publicly exposed next-generation firewall (NGFW) management interfaces, with 34% of these exposures located in the U.S. However, it's important to note that not all of these exposed hosts are necessarily vulnerable. The flaws in question, CVE-2024-0012 (CVSS score: 9.3) and CVE-2024-9474 (CVSS score: 6.9), are a combination of authentication bypass and privilege escalation that could allow a bad actor to perform malicious actions, including modifying configurations and executing arbitrary code. Palo Alto Networks, which is tracking the initial zero-day exploitation of the flaws under the name Operation Lunar Peek, said they are being weaponized to achieve command execution and drop malware, such as PHP-based web shells, on hacked firewalls. The network security vendor has also warned that cyber attacks targeting the security flaws are likely to escalate following the availability of an exploit combining them. To that end, it said it "assesses with moderate to high confidence that a functional exploit chaining CVE-2024-0012 and CVE-2024-9474 is publicly available, which will enable broader threat activity." It further noted that it has observed both manual and automated scanning activity, necessitating that users apply the latest fixes as soon as possible and secure access to the management interface as per recommended best practice deployment guidelines. This particularly includes restricting access to only trusted internal IP addresses to prevent external access from the internet.

Daily Brief Summary

CYBERCRIME // Over 2,000 Palo Alto Networks Devices Compromised by Hackers

Palo Alto Networks devices around 2,000 in number have been hacked due to exploitation of newly revealed security flaws.

The infected devices predominantly reside in the U.S. (554) and India (461), with other notable infections in Thailand, Mexico, and other countries.

Censys identified 13,324 exposed next-generation firewall management interfaces worldwide, indicating widespread potential vulnerabilities.

The exploited vulnerabilities, CVE-2024-0012 and CVE-2024-9474, involve authentication bypass and privilege escalation, allowing attackers to modify configurations and execute malicious code.

The campaign, named Operation Lunar Peek by Palo Alto Networks, has seen these vulnerabilities being weaponized to deploy malware such as PHP-based web shells.

Palo Alto Networks warns that cyber attacks may increase following the public release of an exploit that combines these vulnerabilities.

The company observes both manual and automated scanning activities, stressing the urgent need for users to apply the latest security patches and adhere to best practices, such as restricting management interface access to trusted internal IP addresses.