Vulnerability Management, Threat Intelligence

Fortinet VPN zero-day leveraged in new Chinese credential theft campaign

Share
(Credit: monticellllo – stock.adobe.com)

BleepingComputer reports that Chinese threat operation BrazenBamboo has sought to compromise VPN credentials in a new attack campaign leveraging the DeepData post-exploitation toolkit to target a Fortinet FortiClient zero-day, which stems from the software's unsuccessful removal of memory-stored sensitive details.

Integration of a Fortinet plugin exploiting the yet-to-be-patched zero-day into its newest iteration has enabled DeepData to facilitate the identification and decryption of credentials and server details from VPN process memory-stored JSON objects, which are then exfiltrated by the DeepPost malware, according to a Volexity report. BrazenBamboo could then utilize the obtained information to infiltrate corporate networks and conduct farther reaching espionage operations, Volexity researchers said. Organizations using the most recent iterations of Fortinet FortiClient have been urged by researchers to limit VPN access and track atypical login activity while waiting for an official fix from Fortinet to avoid potential compromise in BrazenBamboo attacks.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.