GossiTheDog,
@GossiTheDog@cyberplace.social avatar

Two days ago, mass exploitation of Cisco AnyConnect CVE-2020-3580 began, per @greynoise data. It’s another Positive Technologies vuln. SAML auth requests.

77 IP addresses are hammering the internet now. https://viz.greynoise.io/query?gnql=tags%3A%22Cisco%20ASA%20XSS%20Attempt%22

This isn’t to be confused with the other 2020 AnyConnect CVE being used by Akira ransomware group.

There are now three Cisco ASA vulns being used by Akira and Lockbit.

DavidPenington,
@DavidPenington@mastodon.au avatar

@GossiTheDog Does this AnyConnect vulnerability have any association with the CitrixBleed Netscaler vulnerability?

GossiTheDog,
@GossiTheDog@cyberplace.social avatar

It looks like the IPs involved may be linked to a ransomware group. I think what they're doing is fingerprinting patching status of AnyConnect.

barunick,

@GossiTheDog @greynoise well that’s certainly interesting. Thanks for the heads up!

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • slotface
  • kavyap
  • thenastyranch
  • everett
  • tacticalgear
  • rosin
  • Durango
  • DreamBathrooms
  • mdbf
  • magazineikmin
  • InstantRegret
  • Youngstown
  • khanakhh
  • ethstaker
  • megavids
  • ngwrru68w68
  • cisconetworking
  • modclub
  • tester
  • osvaldo12
  • cubers
  • GTA5RPClips
  • normalnudes
  • Leos
  • provamag3
  • anitta
  • JUstTest
  • lostlight
  • All magazines