Close Menu
Nabka News
  • Home
  • News
  • Business
  • China
  • India
  • Pakistan
  • Political
  • Tech
  • Trend
  • USA
  • Sports

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

India-made smartphones surpass Chinese shipments to U.S.

July 29, 2025

Punjab opposition demands CJP’s intervention in May 9 cases

July 29, 2025

Waymo plans to bring its robotaxi service to Dallas in 2026

July 29, 2025
Facebook X (Twitter) Instagram
  • Home
  • About NabkaNews
  • Advertise with NabkaNews
  • DMCA Policy
  • Privacy Policy
  • Terms of Use
  • Contact us
Facebook X (Twitter) Instagram Pinterest Vimeo
Nabka News
  • Home
  • News
  • Business
  • China
  • India
  • Pakistan
  • Political
  • Tech
  • Trend
  • USA
  • Sports
Nabka News
Home » Dutch intelligence says Chinese government hackers have infected 20,000 Fortinet VPNs.
China

Dutch intelligence says Chinese government hackers have infected 20,000 Fortinet VPNs.

i2wtcBy i2wtcJune 11, 2024No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email WhatsApp Copy Link
Follow Us
Google News Flipboard Threads
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Dutch intelligence says Chinese government hackers have infected 20,000 Fortinet VPNs.

Dutch government officials say hackers working for the Chinese government used a critical vulnerability that Fortinet did not disclose for two weeks after fixing it to gain access to more than 20,000 VPN devices sold by the company.

Tracked as CVE-2022-42475, the vulnerability is a heap-based buffer overflow that could allow hackers to execute malicious code remotely. It has a severity rating of 9.8 out of 10. Network security software maker Fortinet quietly patched the vulnerability on November 28, 2022, but did not mention the threat until December 12 of the same year, when it announced it had become aware of “examples of this vulnerability being exploited in the wild.” On January 11, 2023, more than six weeks after the vulnerability was patched, Fortinet warned that threat actors were exploiting it to infect government and government-related organizations with sophisticated custom-made malware.

Introducing CoatHanger

Dutch authorities first reported in February that Chinese government hackers had exploited CVE-2022-42475 to install an advanced and stealthy backdoor, tracked as CoatHanger, on Fortigate appliances within the Dutch Ministry of Defense. Once installed, the unprecedented malware, designed specifically for the underlying FortiOS operating system, was able to remain persistent on the device across reboots and firmware updates. CoatHanger was also able to evade traditional detection measures, authorities warned. However, the damage from the breach was limited because the infection was confined to segments reserved for non-sensitive use.

Officials from the Dutch Military Intelligence and Security Service (MIVD) and the General Intelligence and Security Service said on Monday that Chinese government hackers had so far used critical vulnerabilities to infect more than 20,000 FortiGate VPN appliances sold by Fortinet Inc. Targets include dozens of Western government agencies, international organizations and companies in the defense industry.

“Since then, MIVD has conducted further investigations that have revealed that Chinese cyber espionage operations are much more widespread than previously known,” Dutch National Cyber ​​Security Centre officials wrote. “The NCSC therefore calls for special attention to this activity and the exploitation of vulnerabilities in edge devices.”

advertisement

Monday’s report said exploitation of the vulnerability began two months before Fortinet first disclosed it, installing backdoors on 14,000 servers during the zero-day period. Officials warned that because CoatHanger is so difficult to detect and remove, the Chinese threat group probably still has access to many victims.

Dutch government officials wrote in a report on Monday:

Since its announcement in February, MIVD has continued to investigate a broader Chinese cyber espionage campaign, which revealed that a state actor gained access to at least 20,000 FortiGate systems around the world within a few months in both 2022 and 2023 using a vulnerability with identifier CVE-2022-42475. Furthermore, the investigation has found that the state actor behind this campaign was already aware of this vulnerability in FortiGate systems at least two months before Fortinet announced the vulnerability. During this so-called “zero-day” period, the actor alone infected 14,000 devices. Targets included dozens of (Western) governments, international organizations, and numerous companies in the defense industry.

The nation-state actor later installed malware on associated targets, which gave the actor persistent access to the systems that the actor would continue to have even if the victim installed security updates from FortiGate.

It is unclear how many victims actually had the malware installed, but the Dutch intelligence agency and the NCSC believe the nation-state attackers could then expand access to hundreds of victims around the world to carry out additional actions, such as data theft.

Despite technical reports on the COATHANGER malware, infections caused by this actor are difficult to identify and remove, which is why the NCSC and Dutch intelligence agency say it’s likely that nation-state actors still have access to a large number of victim systems.

Fortinet’s failure to disclose in a timely manner is particularly serious given the severity of the vulnerability. Disclosure is critical because it helps users prioritize patch installation. When minor bugs are fixed in new versions, many organizations often wait to install them. When a vulnerability with a severity of 9.8 is fixed, users are much more likely to expedite the update process. Given that the vulnerability was being exploited in the wild before Fortinet fixed it, disclosure would not have prevented all infections, but it would have stopped some.

Fortinet officials did not explain why they did not disclose the critical vulnerabilities when they were fixed, nor did they disclose the company’s policy on disclosing security vulnerabilities. Company representatives did not immediately respond to an email seeking comment on this post.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email WhatsApp Copy Link
i2wtc
  • Website

Related Posts

China

Emergency operations underway for flood-hit villages in north China’s Tianjin-Xinhua

July 29, 2025
China

China’s solutions to making AI more inclusive-Xinhua

July 29, 2025
China

Xinjiang’s two railway ports see over 10,000 China-Europe freight train trips in 2025-Xinhua

July 28, 2025
China

China’s Wang Zongyuan, Chen Yuxi win 4th straight world diving synchro titles-Xinhua

July 28, 2025
China

China speeds up sci-tech, industrial innovation integration to steer high-quality development-Xinhua

July 28, 2025
China

Explore the magic of “black tech” at 2025 WAIC -Xinhua

July 28, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

India-made smartphones surpass Chinese shipments to U.S.

July 29, 2025

House Republicans unveil aid bill for Israel, Ukraine ahead of weekend House vote

April 17, 2024

Prime Minister Johnson presses forward with Ukraine aid bill despite pressure from hardliners

April 17, 2024

Justin Verlander makes season debut against Nationals

April 17, 2024
Don't Miss

Trump says China’s Xi ‘hard to make a deal with’ amid trade dispute | Donald Trump News

By i2wtcJune 4, 20250

Growing strains in US-China relations over implementation of agreement to roll back tariffs and trade…

Donald Trump’s 50% steel and aluminium tariffs take effect | Business and Economy News

June 4, 2025

The Take: Why is Trump cracking down on Chinese students? | Education News

June 4, 2025

Chinese couple charged with smuggling toxic fungus into US | Science and Technology News

June 4, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to NabkaNews, your go-to source for the latest updates and insights on technology, business, and news from around the world, with a focus on the USA, Pakistan, and India.

At NabkaNews, we understand the importance of staying informed in today’s fast-paced world. Our mission is to provide you with accurate, relevant, and engaging content that keeps you up-to-date with the latest developments in technology, business trends, and news events.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

India-made smartphones surpass Chinese shipments to U.S.

July 29, 2025

Punjab opposition demands CJP’s intervention in May 9 cases

July 29, 2025

Waymo plans to bring its robotaxi service to Dallas in 2026

July 29, 2025
Most Popular

Female judges perform their daily duties in Beijing-Xinhua

March 10, 2025

China launches 8 new satellites -Xinhua

March 17, 2025

Hami-Chongqing UHV DC power transmission project enters final construction phase-Xinhua

March 23, 2025
© 2025 nabkanews. Designed by nabkanews.
  • Home
  • About NabkaNews
  • Advertise with NabkaNews
  • DMCA Policy
  • Privacy Policy
  • Terms of Use
  • Contact us

Type above and press Enter to search. Press Esc to cancel.