September 24, 2023


Your Partner in The Digital Era

Norway states Ivanti zero-day was utilised to hack govt IT programs

The Norwegian National Protection Authority (NSM) has verified that attackers employed a zero-working day vulnerability in Ivanti’s Endpoint Manager Cellular (EPMM) option to breach a application platform made use of by 12 ministries in the state.

The Norwegian Security and Provider Business (DSS) said on Monday that the cyberattack did not affect Norway’s Primary Minister’s Office environment, the Ministry of Protection, the Ministry of Justice, and the Ministry of Foreign Affairs.

The Norwegian Information Safety Authority (DPA) was also notified about the incident, indicating that the hackers may have obtained obtain to and/or exfiltrated delicate information from compromised methods, major to a facts breach.

“This vulnerability was special, and was found for the pretty 1st time listed here in Norway. If we experienced introduced the details about the vulnerability way too early, it could have contributed to it getting misused in other places in Norway and in the rest of the planet,” the NSM explained.

“The update is now usually readily available and it is prudent to announce what kind of vulnerability it is, says Sofie Nystrøm, director of the Countrywide Protection Agency.

The Norwegian Countrywide Cyber ​​Security Middle (NCSC) also notified all known MobileIron Main customers in Norway about the existence of a safety update to tackle this actively exploited zero-working day bug (tracked as CVE-2023-35078).

As a recommendation, the NCSC urged these system owners to install stability updates to block incoming assaults as before long as feasible.

Actively exploited authentication bypass vulnerability

The CVE-2023-35078 safety bug is an authentication bypass vulnerability that impacts all supported variations of Ivanti’s Endpoint Manager Cell (EPMM) cellular product management computer software (formerly MobileIron Core), as nicely as unsupported and conclude-of-lifestyle releases.

Profitable exploitation permits distant menace actors to accessibility distinct API paths with out requiring authentication.

“An attacker with obtain to these API paths can accessibility personally identifiable information (PII) this sort of as names, mobile phone figures, and other cellular device details for users on a vulnerable process,” the U.S. Cybersecurity and Infrastructure Stability Company (CISA) warned in an advisory released on Monday.

“An attacker can also make other configuration changes, including building an EPMM administrative account that can make additional improvements to a vulnerable technique.”

The business has verified that the zero-day is staying exploited in attacks and also warned shoppers that it’s critical to “quickly consider action to assure you are fully safeguarded.

According to Shodan’s World-wide-web publicity scanning system, far more than 2,900 MobileIron consumer portals are presently exposed on the net, out of which close to three dozen are connected with U.S. community and condition federal government agencies.

MobileIron user portals exposed on the Internet
MobileIron person portals exposed on the World wide web (Shodan)

​Most of these exposed servers are in the United States, with other notable areas including Germany, the United Kingdom, and Hong Kong.

In light-weight of this, it is vital for all network administrators to promptly set up the most up-to-date Ivanti Endpoint Manager Mobile (MobileIron) patches to safeguard their devices from attacks.

Norway has disclosed other cyberattacks in which Chinese and Russian point out hackers targeted its federal government web sites and the country’s parliament.

Previous 12 months, in June, the NSM explained that Russian hacktivists took down multiple Norwegian government websites in DDoS attacks.

In March 2021, the Chinese state-sponsored Hafnium hacking group was joined to yet another incident in which they breached the systems of Norway’s parliament and stole data by exploiting ProxyLogon Microsoft Exchange vulnerabilities.

In another attack from August 2020, several Norwegian Parliament email accounts on August have been brute-forced. This incident was joined by Norway’s Minister of International Affairs in December 2020 to the Russian APT 28 point out-sponsored hacking group.