arstechnica.com
Open in
urlscan Pro
3.132.177.250
Public Scan
URL:
https://arstechnica.com/security/2024/06/china-state-hackers-infected-20000-fortinet-vpns-dutch-spy-service-says/
Submission: On December 22 via api from AE — Scanned from CH
Submission: On December 22 via api from AE — Scanned from CH
Form analysis
0 forms found in the DOMText Content
Skip to content Ars Technica home Sections Forum Subscribe * AI * Biz & IT * Cars * Culture * Gaming * Health * Policy * Science * Security * Space * Tech * Feature * Reviews * Store * AI * Biz & IT * Cars * Culture * Gaming * Health * Policy * Science * Security * Space * Tech Forum Subscribe Story text Size Small Standard Large Width * Standard Wide Links Standard Orange * Subscribers only Learn more Pin to story Theme * HyperLight * Day & Night * Dark * System Search dialog... Sign In Sign in dialog... Sign in DISCLOSURE FUBAR CHINA STATE HACKERS INFECTED 20,000 FORTINET VPNS, DUTCH SPY SERVICE SAYS Critical code-execution flaw was under exploitation 2 months before company disclosed it. Dan Goodin – 12. Juni 2024 00:56 | 61 Credit: Getty Images Credit: Getty Images Text settings Story text Size Small Standard Large Width * Standard Wide Links Standard Orange * Subscribers only Learn more Minimize to nav Hackers working for the Chinese government gained access to more than 20,000 VPN appliances sold by Fortinet using a critical vulnerability that the company failed to disclose for two weeks after fixing it, Netherlands government officials said. The vulnerability, tracked as CVE-2022-42475, is a heap-based buffer overflow that allows hackers to remotely execute malicious code. It carries a severity rating of 9.8 out of 10. A maker of network security software, Fortinet silently fixed the vulnerability on November 28, 2022, but failed to mention the threat until December 12 of that year, when the company said it became aware of an “instance where this vulnerability was exploited in the wild.” On January 11, 2023—more than six weeks after the vulnerability was fixed—Fortinet warned a threat actor was exploiting it to infect government and government-related organizations with advanced custom-made malware. ENTER COATHANGER The Netherlands officials first reported in February that Chinese state hackers had exploited CVE-2022-42475 to install an advanced and stealthy backdoor tracked as CoatHanger on Fortigate appliances inside the Dutch Ministry of Defense. Once installed, the never-before-seen malware, specifically designed for the underlying FortiOS operating system, was able to permanently reside on devices even when rebooted or receiving a firmware update. CoatHanger could also escape traditional detection measures, the officials warned. The damage resulting from the breach was limited, however, because infections were contained inside a segment reserved for non-classified uses. On Monday, officials with the Military Intelligence and Security Service (MIVD) and the General Intelligence and Security Service in the Netherlands said that to date, Chinese state hackers have used the critical vulnerability to infect more than 20,000 FortiGate VPN appliances sold by Fortinet. Targets include dozens of Western government agencies, international organizations, and companies within the defense industry. “Since then, the MIVD has conducted further investigation and has shown that the Chinese cyber espionage campaign appears to be much more extensive than previously known,” Netherlands officials with the National Cyber Security Center wrote. “The NCSC therefore calls for extra attention to this campaign and the abuse of vulnerabilities in edge devices.” ARS VIDEO HOW THE CALLISTO PROTOCOL'S GAMEPLAY WAS PERFECTED MONTHS BEFORE RELEASE Monday’s report said that exploitation of the vulnerability started two months before Fortinet first disclosed it and that 14,000 servers were backdoored during this zero-day period. The officials warned that the Chinese threat group likely still has access to many victims because CoatHanger is so hard to detect and remove. Netherlands government officials wrote in Monday’s report: > Since the publication in February, the MIVD has continued to investigate the > broader Chinese cyber espionage campaign. This revealed that the state actor > gained access to at least 20,000 FortiGate systems worldwide within a few > months in both 2022 and 2023 through the vulnerability with the identifier > CVE-2022-42475 . Furthermore, research shows that the state actor behind this > campaign was already aware of this vulnerability in FortiGate systems at least > two months before Fortinet announced the vulnerability. During this so-called > 'zero-day' period, the actor alone infected 14,000 devices. Targets include > dozens of (Western) governments, international organizations and a large > number of companies within the defense industry. > > The state actor installed malware at relevant targets at a later date. This > gave the state actor permanent access to the systems. Even if a victim > installs security updates from FortiGate, the state actor continues to have > this access. > > It is not known how many victims actually have malware installed. The Dutch > intelligence services and the NCSC consider it likely that the state actor > could potentially expand its access to hundreds of victims worldwide and carry > out additional actions such as stealing data. > > Even with the technical report on the COATHANGER malware, infections from the > actor are difficult to identify and remove. The NCSC and the Dutch > intelligence services therefore state that it is likely that the state actor > still has access to systems of a significant number of victims. Fortinet’s failure to timely disclose is particularly acute given the severity of the vulnerability. Disclosures are crucial because they help users prioritize the installation of patches. When a new version fixes minor bugs, many organizations often wait to install it. When it fixes a vulnerability with a 9.8 severity rating, they’re much more likely to expedite the update process. Given the vulnerability was being exploited even before Fortinet fixed it, the disclosure likely wouldn't have prevented all of the infections, but it stands to reason it could have stopped some. Fortinet officials have never explained why they didn’t disclose the critical vulnerability when it was fixed. They have also declined to disclose what the company policy is for the disclosure of security vulnerabilities. Company representatives didn’t immediately respond to an email seeking comment for this post. Related Stories Fortinet says hackers exploited critical vulnerability to infect VPN customers Remote code-execution bug was exploited to backdoor vulnerable servers. Listing image: Getty Images Dan Goodin Senior Security Editor Dan Goodin Senior Security Editor Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords. In his spare time, he enjoys gardening, cooking, and following the independent music scene. Dan is based in San Francisco. Follow him at here on Mastodon and here on Bluesky. Contact him on Signal at DanArs.82. 61 Comments Comments Forum view Loading comments... Prev story Next story Most Read 1. 1. Journal that published faulty black plastic study removed from science index 2. 2. As firms abandon VMware, Broadcom is laughing all the way to the bank 3. 3. Rocket Report: ULA has a wild idea; Starliner crew will stay in orbit even longer 4. 4. We’re about to fly a spacecraft into the Sun for the first time 5. 5. Horizon: Zero Dawn gets the graphical remaster a modern classic deserves Customize by Taboolaby Taboola Sponsored LinksSponsored Links Promoted LinksPromoted Links Cut Your Mobile Bills Forever [Learn More]Lebara Learn More Undo It's the Best Mobile Plan I've Hadyallo Shop Now Undo Google Brain Co-Founder Andrew Ng, Recommends: Read These 5 Books And Turn Your Life AroundBlinkist: Andrew Ng's Reading List Undo Limited savings offer: the perfect gift for your savingsCA Bank Learn More Undo Warehouse Inventory Management Systems and Real-Time Warehouse Tracking in the UKWarehouse Inventory Undo ObviousFuture: Resident AI Transformational Tech Delivering Data SecurityTechBullion.com Undo Ars Technica has been separating the signal from the noise for over 25 years. With our unique combination of technical savvy and wide-ranging interest in the technological arts and sciences, Ars is the trusted source in a sea of information. After all, you don’t need to know everything, only what’s important. More from Ars * About Us * Staff Directory * Newsletters * Ars Videos * General FAQ * RSS Feeds Contact * Contact us * Advertise with us * Reprints Privacy Configurations © 2024 Condé Nast. All rights reserved. Use of and/or registration on any portion of this site constitutes acceptance of our User Agreement and Privacy Policy and Cookie Statement and Ars Technica Addendum and Your California Privacy Rights. Ars Technica may earn compensation on sales from links on this site. Read our affiliate link policy. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of Condé Nast. Ad Choices Search dialog... Sign in dialog... Sign in