Cybersecurity firm FireEye said it is tracking 12 malware families associated with the exploitation of Pulse Secure VPN devices.
VPN compromise illustrates growing malware trend
April 22, 2021 / By ICBA
Cybersecurity firm FireEye said it is tracking 12 malware families associated with the exploitation of Pulse Secure VPN devices.
Cybersecurity firm FireEye said it is tracking 12 malware families associated with the exploitation of Pulse Secure VPN devices.
Details: FireEye issued a report detailing the activities of the UNC2630 group against U.S. Defense Industrial Base networks and providing analysis and detection methods to identify a wide range of related malicious activity.
Federal Alerts: The Cybersecurity and Infrastructure Security Agency (CISA) and Treasury’s Office of Cybersecurity and Critical Infrastructure Protection (OCCIP) separately issued directives on the vulnerabilities.
Background: The reports underscore the growth of malicious actors breaching institutions’ VPNs to install malware, spyware, ransomware, and other malicious apps.
More: ICBA offers prevention and risk mitigation resources on its Cyber and Data Security page.
Subscribe now
Sign up for the Independent Banker newsletter to receive twice-monthly emails about new issues and must-read content you might have missed.
Sponsored Content
Featured Webinars
Join ICBA Community
Interested in discussing this and other topics? Network with and learn from your peers with the app designed for community bankers.
Subscribe Today
Sign up for Independent Banker eNews to receive twice-monthly emails that alert you when a new issue drops and highlight must-read content you might have missed.
News Watch Today
Join the Conversation with ICBA Community
ICBA Community is an online platform led by community bankers to foster connections, collaborations, and discussions on industry news, best practices, and regulations, while promoting networking, mentorship, and member feedback to guide future initiatives.