Oasis Ticket Sales Scams: How to Stay Safe
During our weekly meetings with the banking industry and Police Scotland, we continue to see a significant increase in ticket scams over the last three…
Recently, Check Point has reported targeted attacks on their Remote Access VPN devices, causing concern for many businesses that rely on these networks for secure remote access. Attackers are exploiting old, insecure local accounts to breach these systems.
On May 27, 2024, Check Point issued an advisory warning of an ongoing campaign targeting their Remote Access VPN devices. This campaign is not isolated; it follows a series of similar attacks on various cyber security vendors. Attackers are leveraging old local accounts with insecure password-only authentication to breach security gateways.
The primary tactic involves targeting security gateways with outdated local accounts. These accounts often rely on password-only authentication, which is highly vulnerable to brute force and password-spraying attacks. In some cases, attackers have been able to identify and exploit these weak points to gain initial access.
The techniques used in these attacks include:
Check Point has provided several recommendations and solutions to mitigate these attacks:
If you suspect or have identified that your system has been compromised, take the following steps immediately:
The targeting of Check Point Remote Access VPNs highlights the critical need for robust cyber security practices and proactive measures. By enhancing authentication methods, regularly auditing accounts, and staying updated with the latest security patches, enterprises can significantly reduce the risk of such attacks.