Close Menu
Nabka News
  • Home
  • News
  • Business
  • China
  • India
  • Pakistan
  • Political
  • Tech
  • Trend
  • USA
  • Sports

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Fatima Sana aims to continue Pakistan women’s winning momentum on Ireland T20 tour – World

July 27, 2025

From crisis to control: Balochistan’s polio breakthrough

July 27, 2025

Global journalists explore China’s WWII sacrifices-Xinhua

July 27, 2025
Facebook X (Twitter) Instagram
  • Home
  • About NabkaNews
  • Advertise with NabkaNews
  • DMCA Policy
  • Privacy Policy
  • Terms of Use
  • Contact us
Facebook X (Twitter) Instagram Pinterest Vimeo
Nabka News
  • Home
  • News
  • Business
  • China
  • India
  • Pakistan
  • Political
  • Tech
  • Trend
  • USA
  • Sports
Nabka News
Home » Dutch intelligence says Chinese government hackers have infected 20,000 Fortinet VPNs.
China

Dutch intelligence says Chinese government hackers have infected 20,000 Fortinet VPNs.

i2wtcBy i2wtcJune 11, 2024No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email WhatsApp Copy Link
Follow Us
Google News Flipboard Threads
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Dutch intelligence says Chinese government hackers have infected 20,000 Fortinet VPNs.

Dutch government officials say hackers working for the Chinese government used a critical vulnerability that Fortinet did not disclose for two weeks after fixing it to gain access to more than 20,000 VPN devices sold by the company.

Tracked as CVE-2022-42475, the vulnerability is a heap-based buffer overflow that could allow hackers to execute malicious code remotely. It has a severity rating of 9.8 out of 10. Network security software maker Fortinet quietly patched the vulnerability on November 28, 2022, but did not mention the threat until December 12 of the same year, when it announced it had become aware of “examples of this vulnerability being exploited in the wild.” On January 11, 2023, more than six weeks after the vulnerability was patched, Fortinet warned that threat actors were exploiting it to infect government and government-related organizations with sophisticated custom-made malware.

Introducing CoatHanger

Dutch authorities first reported in February that Chinese government hackers had exploited CVE-2022-42475 to install an advanced and stealthy backdoor, tracked as CoatHanger, on Fortigate appliances within the Dutch Ministry of Defense. Once installed, the unprecedented malware, designed specifically for the underlying FortiOS operating system, was able to remain persistent on the device across reboots and firmware updates. CoatHanger was also able to evade traditional detection measures, authorities warned. However, the damage from the breach was limited because the infection was confined to segments reserved for non-sensitive use.

Officials from the Dutch Military Intelligence and Security Service (MIVD) and the General Intelligence and Security Service said on Monday that Chinese government hackers had so far used critical vulnerabilities to infect more than 20,000 FortiGate VPN appliances sold by Fortinet Inc. Targets include dozens of Western government agencies, international organizations and companies in the defense industry.

“Since then, MIVD has conducted further investigations that have revealed that Chinese cyber espionage operations are much more widespread than previously known,” Dutch National Cyber ​​Security Centre officials wrote. “The NCSC therefore calls for special attention to this activity and the exploitation of vulnerabilities in edge devices.”

advertisement

Monday’s report said exploitation of the vulnerability began two months before Fortinet first disclosed it, installing backdoors on 14,000 servers during the zero-day period. Officials warned that because CoatHanger is so difficult to detect and remove, the Chinese threat group probably still has access to many victims.

Dutch government officials wrote in a report on Monday:

Since its announcement in February, MIVD has continued to investigate a broader Chinese cyber espionage campaign, which revealed that a state actor gained access to at least 20,000 FortiGate systems around the world within a few months in both 2022 and 2023 using a vulnerability with identifier CVE-2022-42475. Furthermore, the investigation has found that the state actor behind this campaign was already aware of this vulnerability in FortiGate systems at least two months before Fortinet announced the vulnerability. During this so-called “zero-day” period, the actor alone infected 14,000 devices. Targets included dozens of (Western) governments, international organizations, and numerous companies in the defense industry.

The nation-state actor later installed malware on associated targets, which gave the actor persistent access to the systems that the actor would continue to have even if the victim installed security updates from FortiGate.

It is unclear how many victims actually had the malware installed, but the Dutch intelligence agency and the NCSC believe the nation-state attackers could then expand access to hundreds of victims around the world to carry out additional actions, such as data theft.

Despite technical reports on the COATHANGER malware, infections caused by this actor are difficult to identify and remove, which is why the NCSC and Dutch intelligence agency say it’s likely that nation-state actors still have access to a large number of victim systems.

Fortinet’s failure to disclose in a timely manner is particularly serious given the severity of the vulnerability. Disclosure is critical because it helps users prioritize patch installation. When minor bugs are fixed in new versions, many organizations often wait to install them. When a vulnerability with a severity of 9.8 is fixed, users are much more likely to expedite the update process. Given that the vulnerability was being exploited in the wild before Fortinet fixed it, disclosure would not have prevented all infections, but it would have stopped some.

Fortinet officials did not explain why they did not disclose the critical vulnerabilities when they were fixed, nor did they disclose the company’s policy on disclosing security vulnerabilities. Company representatives did not immediately respond to an email seeking comment on this post.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email WhatsApp Copy Link
i2wtc
  • Website

Related Posts

China

Global journalists explore China’s WWII sacrifices-Xinhua

July 27, 2025
China

2025 World AI Conference kicks off in Shanghai-Xinhua

July 27, 2025
China

Floods can’t stop the fun — China’s “Village Super League” roars back-Xinhua

July 26, 2025
China

Heat waves boost water-related activities, night tours in China-Xinhua

July 26, 2025
China

Disaster relief work underway in flood-hit county in China’s Shaanxi-Xinhua

July 26, 2025
China

Torch relay for World Games debuts in China, tracing cultural landmarks-Xinhua

July 26, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Fatima Sana aims to continue Pakistan women’s winning momentum on Ireland T20 tour – World

July 27, 2025

House Republicans unveil aid bill for Israel, Ukraine ahead of weekend House vote

April 17, 2024

Prime Minister Johnson presses forward with Ukraine aid bill despite pressure from hardliners

April 17, 2024

Justin Verlander makes season debut against Nationals

April 17, 2024
Don't Miss

Trump says China’s Xi ‘hard to make a deal with’ amid trade dispute | Donald Trump News

By i2wtcJune 4, 20250

Growing strains in US-China relations over implementation of agreement to roll back tariffs and trade…

Donald Trump’s 50% steel and aluminium tariffs take effect | Business and Economy News

June 4, 2025

The Take: Why is Trump cracking down on Chinese students? | Education News

June 4, 2025

Chinese couple charged with smuggling toxic fungus into US | Science and Technology News

June 4, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to NabkaNews, your go-to source for the latest updates and insights on technology, business, and news from around the world, with a focus on the USA, Pakistan, and India.

At NabkaNews, we understand the importance of staying informed in today’s fast-paced world. Our mission is to provide you with accurate, relevant, and engaging content that keeps you up-to-date with the latest developments in technology, business trends, and news events.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Fatima Sana aims to continue Pakistan women’s winning momentum on Ireland T20 tour – World

July 27, 2025

From crisis to control: Balochistan’s polio breakthrough

July 27, 2025

Global journalists explore China’s WWII sacrifices-Xinhua

July 27, 2025
Most Popular

BYD Seal 06GT leaked in China, sporty new EV hatchback

June 12, 2024

China’s #metoo journalist, labor activist jailed for ‘subversion’

June 14, 2024

China’s Long March 10 rocket enters ‘fast lane’ to send astronauts to the moon

June 15, 2024
© 2025 nabkanews. Designed by nabkanews.
  • Home
  • About NabkaNews
  • Advertise with NabkaNews
  • DMCA Policy
  • Privacy Policy
  • Terms of Use
  • Contact us

Type above and press Enter to search. Press Esc to cancel.