<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Leak Archives - ShadowMap</title>
	<atom:link href="https://shadowmap.com/tag/data-leak/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Digital Risk Management - Asset Inventory &#38; Cyber Threat Intelligence - ShadowMap</description>
	<lastBuildDate>Mon, 10 Aug 2020 10:31:17 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>

<image>
	<url>https://shadowmap.com/wp-content/uploads/2019/07/favicon-50x50.png</url>
	<title>Data Leak Archives - ShadowMap</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Hackers Publish 1800 Vulnerable Pulse VPN Servers &#8211; Includes MCX India, ICRA &#038; Panasonic</title>
		<link>https://shadowmap.com/threat-intelligence/hackers-publish-1800-vulnerable-pulse-vpn-servers/</link>
					<comments>https://shadowmap.com/threat-intelligence/hackers-publish-1800-vulnerable-pulse-vpn-servers/#respond</comments>
		
		<dc:creator><![CDATA[Yash Kadakia]]></dc:creator>
		<pubDate>Tue, 04 Aug 2020 11:26:17 +0000</pubDate>
				<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[Dark Web]]></category>
		<category><![CDATA[Data Leak]]></category>
		<category><![CDATA[Pulse Secure]]></category>
		<guid isPermaLink="false">https://shadowmap.com/?p=1789</guid>

					<description><![CDATA[<p>ShadowMap has picked up on new threat intelligence showing that hackers have released the details from 1800 vulnerable pulse VPN servers including those belonging to MCX India, ICRA &#038; Panasonic.</p>
<p>The post <a href="https://shadowmap.com/threat-intelligence/hackers-publish-1800-vulnerable-pulse-vpn-servers/">Hackers Publish 1800 Vulnerable Pulse VPN Servers &#8211; Includes MCX India, ICRA &#038; Panasonic</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>ShadowMap&#8217;s AI &amp; ML based <a href="https://shadowmap.com/">digital risk management platform </a>has picked up on new <a href="https://shadowmap.com/cyber-threat-intelligence/">threat intelligence</a> showing that hackers have released the details from 1800 vulnerable pulse VPN servers onto various deep &amp; dark web forums. The list of 1800 servers contain several Indian entities including the <a href="https://www.mcxindia.com/">Multi Commodity Exchange (MCX India)</a>, <a href="https://www.icra.in/">ICRA</a> &amp; <a href="https://lsin.panasonic.com/">Panasonic owned Anchor Electricals</a>.</p>
<h2>About the CVE-2019-11510 Pulse VPN Server Vulnerability</h2>
<p>The critical vulnerability (<a href="https://www.cvedetails.com/cve/CVE-2019-11510/">CVE-2019-11510</a>) in Pulse Secure Pulse Connect Secure, allows an unauthenticated remote attacker to arbitrary read files stored on the PCS device. The vulnerability affects versions 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4 of the platform.</p>
<p>ShadowMap&#8217;s <a href="https://shadowmap.com/cyber-threat-intelligence/">Cyber Threat Intelligence</a> modules have checks integrated for this vulnerability since May 2019 and will have corresponding alerts for any vulnerable servers.</p>
<h3><strong>Timeline</strong></h3>
<ul>
<li>April 24, 2019 – Pulse Secure releases initial advisory and software updates addressing multiple vulnerabilities.</li>
<li>May 28, 2019 – Large commercial vendors get reports of vulnerable VPN through HackerOne.</li>
<li>July 31, 2019 – Full use of exploit demonstrated using the admin session hash to get complete shell.</li>
<li>August 8, 2019 – Meh Chang and Orange Tsai demonstrate the VPN issues across multiple vendors (Pulse Secure) with detailed attack on active VPN exploitation.</li>
<li>August 24, 2019 – Bad Packets identifies over 14,500 vulnerable VPN servers globally still unpatched and in need of an upgrade.</li>
<li>October 7, 2019 – The National Security Agency (NSA) produces a Cybersecurity Advisory on Pulse Secure and other VPN products being targeted actively by advanced persistent threat actors.</li>
<li>October 16, 2019 – The CERT Coordination Center (CERT/CC) releases Vulnerability Note VU#927237: Pulse Secure VPN contains multiple vulnerabilities.</li>
<li>January 2020 – Media reports cybercriminals now targeting unpatched Pulse Secure VPN servers to install REvil (Sodinokibi) ransomware.</li>
</ul>
<p>&nbsp;</p>
<h2><a href="https://shadowmap.com/monitoring-dark-web-forums-data-breaches/">Monitoring The Dark Web &amp; Discovering The Breach</a></h2>
<p>The initial disclosure of the breach was made by Pulse Secure through an advisory in April 2019. This vulnerability was found to be mass exploited over the last 8-9 months with a large number of vulnerable servers found to be publicly open. As part of our continuous monitoring of 4000+ Surface, Deep &amp; Dark Web Forums, around the 4th of August, we picked up posts on various Deep &amp; Dark Web forums where attackers had published a dump of 1800 vulnerable servers along with several sensitive details.</p>
<h2>Inside The 1800 Vulnerable Pulse VPN Servers</h2>
<p>On analysing the data set, we found that the leak includes the following details for each of the 1800 IP addresses listed:</p>
<ul>
<li>IP addresses of Pulse Secure VPN servers</li>
<li>Pulse Secure VPN server firmware version</li>
<li>SSH keys for each server</li>
<li>A list of all local users and their password hashes</li>
<li>Admin account details</li>
<li>Last VPN logins (including usernames and cleartext passwords)</li>
<li>VPN session cookies</li>
</ul>
<p>On further analysis, we found several Indian entities that were a part of this breach.</p>
<h3>Multi Commodity Exchange (MCX India)</h3>
<p>The compromised VPN server was running the vulnerable firmware version 8.3.3.59199  included 8 internal users and 6 active sessions at the time of the breach.</p>
<div id="attachment_1796" style="width: 1034px" class="wp-caption aligncenter"><img fetchpriority="high" decoding="async" aria-describedby="caption-attachment-1796" class="wp-image-1796 size-large" src="https://shadowmap.com/wp-content/uploads/2020/08/MCX-India-Data-Leak-Vulnerable-Pulse-VPN-Servers-1024x426.png" alt="MCX India Data Leak Vulnerable Pulse VPN Servers" width="1024" height="426" srcset="https://shadowmap.com/wp-content/uploads/2020/08/MCX-India-Data-Leak-Vulnerable-Pulse-VPN-Servers-980x407.png 980w, https://shadowmap.com/wp-content/uploads/2020/08/MCX-India-Data-Leak-Vulnerable-Pulse-VPN-Servers-480x200.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /><p id="caption-attachment-1796" class="wp-caption-text">MCX India Data Leak Vulnerable Pulse VPN Servers</p></div>
<p>&nbsp;</p>
<h3>ICRA</h3>
<p>The compromised VPN server was running the vulnerable firmware version 9.0.3.64015 and included 4 internal users and 6 active sessions at the time of the breach.</p>
<div id="attachment_1795" style="width: 1034px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1795" class="wp-image-1795 size-large" src="https://shadowmap.com/wp-content/uploads/2020/08/ICRA-Data-Leak-Vulnerable-Pulse-VPN-Servers-1024x288.png" alt="ICRA Data Leak Vulnerable Pulse VPN Servers" width="1024" height="288" srcset="https://shadowmap.com/wp-content/uploads/2020/08/ICRA-Data-Leak-Vulnerable-Pulse-VPN-Servers-980x275.png 980w, https://shadowmap.com/wp-content/uploads/2020/08/ICRA-Data-Leak-Vulnerable-Pulse-VPN-Servers-480x135.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /><p id="caption-attachment-1795" class="wp-caption-text">ICRA Data Leak Vulnerable Pulse VPN Servers</p></div>
<p>&nbsp;</p>
<h3>Panasonic owned Anchor Electricals</h3>
<p>The compromised VPN server was running the vulnerable firmware version 8.3.7.65013 and included 665 internal users and 374 active sessions including both internal users and several third party consultants as well.</p>
<div id="attachment_1794" style="width: 1034px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-1794" class="wp-image-1794 size-large" src="https://shadowmap.com/wp-content/uploads/2020/08/Anchor-Panasonic-Data-Leak-Vulnerable-Pulse-VPN-Servers-1024x517.png" alt="Anchor Panasonic Data Leak Vulnerable Pulse VPN Servers" width="1024" height="517" srcset="https://shadowmap.com/wp-content/uploads/2020/08/Anchor-Panasonic-Data-Leak-Vulnerable-Pulse-VPN-Servers-980x494.png 980w, https://shadowmap.com/wp-content/uploads/2020/08/Anchor-Panasonic-Data-Leak-Vulnerable-Pulse-VPN-Servers-480x242.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw" /><p id="caption-attachment-1794" class="wp-caption-text">Anchor Panasonic Data Leak Vulnerable Pulse VPN Servers</p></div>
<p>&nbsp;</p>
<h2>General Recommendations</h2>
<ul>
<li>Apply the patch as recommended by Pulse Secure.</li>
<li>Review your patch management process to identify &amp; address gaps</li>
<li>Implement a hardware token, OTP or certificate based authentication to add a second factor check</li>
<li>If you are a ShadowMap customer, review your <a href="https://shadowmap.com/cyber-threat-intelligence/">Threat Intelligence</a> alerts to identify all currently open vulnerabilities that need to be mitigated.</li>
</ul>
<p>The post <a href="https://shadowmap.com/threat-intelligence/hackers-publish-1800-vulnerable-pulse-vpn-servers/">Hackers Publish 1800 Vulnerable Pulse VPN Servers &#8211; Includes MCX India, ICRA &#038; Panasonic</a> appeared first on <a href="https://shadowmap.com">ShadowMap</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://shadowmap.com/threat-intelligence/hackers-publish-1800-vulnerable-pulse-vpn-servers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
