
Massive Brute Force Attack Targeting Networking Devices
A large-scale brute force attack is underway, using nearly 2.8 million IP addresses daily to target networking devices from Palo Alto Networks, Ivanti, and SonicWall….
TunnelVision is a new security vulnerability that affects VPN applications. It allows attackers to steal data that should be encrypted by the VPN. The vulnerability exists because of a setting called DHCP option 121, which can be used to manipulate routing rules. This diverts traffic away from the VPN’s encrypted tunnel.
Attackers can exploit the TunnelVision vulnerability by setting up a rogue DHCP server on the same network as the victim. The rogue DHCP server will then send a message to the victim’s device, telling it to use the rogue server for DNS resolution. Once the victim’s device is using the rogue server, the attacker can intercept and decrypt all of the victim’s traffic.
The TunnelVision vulnerability is a serious security risk. It can be used to steal sensitive data, such as credit card numbers, passwords, and personal information. It can also be used to spy on victims’ communications and track their online activity.
There are a few things you can do to protect yourself from the TunnelVision vulnerability:
If you think you may have been a victim of the TunnelVision vulnerability, you should take the following steps: