Multiple China-linked groups attacking Ivanti vulnerabilities

Patches have been made available by Ivanti

clock • 2 min read
Multiple China-linked groups attacking Ivanti vulnerabilities
Image:

Multiple China-linked groups attacking Ivanti vulnerabilities

Researchers from cybersecurity firm Mandiant have identified multiple China-linked hacker groups exploiting security vulnerabilities in Ivanti appliances to gain unauthorised access to targeted networks.

According to Mandiant, eight threat groups, including UNC5221, UNC5266, UNC5291, UNC5325, UNC5330, UNC5337, and the previously identified UNC3886, have been exploiting zero-day vulnerabilities, not...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
MoD hacked: Personal details exposed

Hacking

Government suspects China

clock 07 May 2024 • 2 min read
Experimental Morris II worm can exploit popular AI services to steal data and spread malware

Threats and Risks

Cornell researchers created worm 'to serve as a whistleblower'

clock 01 May 2024 • 3 min read
Global government networks breached in 'ArcaneDoor' espionage campaign

Hacking

Threat actors compromised networks using Cisco zero-day exploits

clock 26 April 2024 • 2 min read

More on Threats and Risks

Bots now account for half of all web activity

Bots now account for half of all web activity

Nearly half of internet traffic is now automated, with malicious bots on the rise

clock 07 May 2024 • 3 min read
CISA identifies GitLab vulnerability under exploit

CISA identifies GitLab vulnerability under exploit

Hope you have two-factor

Tom Allen
clock 03 May 2024 • 2 min read
Experimental Morris II worm can exploit popular AI services to steal data and spread malware

Experimental Morris II worm can exploit popular AI services to steal data and spread malware

Cornell researchers created worm 'to serve as a whistleblower'

clock 01 May 2024 • 3 min read