Volt Typhoon Compromises U.S. Critical Infrastructure (AA24-038A)

Related Vulnerabilities: CVE-2023-46805   CVE-2024-21887   cve-2023-46805  

Properties
Threat Severity

High

Description

Researchers have uncovered active exploitation of two vulnerabilities, CVE-2023-46805 and CVE-2024-21887, in Ivanti Connect Secure VPN devices. These vulnerabilities allow unauthenticated remote code execution, involving an authentication-bypass flaw and a command-injection vulnerability in various web components. The attackers were found to be placing webshells on both internal and external web servers. Additionally, the investigation revealed that the ICS VPN appliance had its logs wiped and logging disabled, with suspicious inbound and outbound communication detected from its management IP address in historic network traffic. The Trellix Threat Intelligence Group (TIG) gathers and analyzes information from multiple open and closed sources before disseminating intelligence reports. This campaign was researched by Volexity and shared publicly https://www.volexity.com/blog/2024/01/10/active-exploitation-of-two-zero-day-vulnerabilities-in-ivanti-connect-secure-vpn/

Knowledge Base
  • Available Soon
Global Prevalence
Low
High
Observed Countries23
  • Taiwan1080.5 devices found impacted per 1M devices
  • United States8.14 devices found impacted per 1M devices
  • Italy115.72 devices found impacted per 1M devices
  • Luxembourg470.09 devices found impacted per 1M devices
  • Norway671.02 devices found impacted per 1M devices
  • Spain17.47 devices found impacted per 1M devices
  • Austria57.84 devices found impacted per 1M devices
  • Dominican Rep.193.34 devices found impacted per 1M devices
  • Czech Rep.76.65 devices found impacted per 1M devices
  • Myanmar2049.18 devices found impacted per 1M devices
  • France10.58 devices found impacted per 1M devices
  • Hong Kong43.11 devices found impacted per 1M devices
  • Australia17.03 devices found impacted per 1M devices
  • Germany1.75 devices found impacted per 1M devices
  • Canada2.35 devices found impacted per 1M devices
  • United Arab Emirates7.96 devices found impacted per 1M devices
  • Argentina8.58 devices found impacted per 1M devices
  • Brazil3.42 devices found impacted per 1M devices
  • Colombia3.8 devices found impacted per 1M devices
  • Ireland6.24 devices found impacted per 1M devices
  • Netherlands4 devices found impacted per 1M devices
  • Singapore3.99 devices found impacted per 1M devices
  • Thailand7.87 devices found impacted per 1M devices
Observed Sectors7
  • Unknown Sectors
    136.63 devices found impacted per 1M devices
  • Wholesale
    1.66 devices found impacted per 1M devices
  • Government
    1.51 devices found impacted per 1M devices
  • Education
    5.42 devices found impacted per 1M devices
  • Healthcare
    3.64 devices found impacted per 1M devices
  • Outsourcing & Hosting
    4.63 devices found impacted per 1M devices
  • Telecom
    10.19 devices found impacted per 1M devices
Compare Detections

Detection rate is the number of artifact detections reported by McAfee global sensors for this threat over 8 days.

Threat Prevalence - Past 8 days

The detection rate bubbles are sized based on the values below:

1-20 20-50 50-100 100+
Feb 9, 2024
Feb 10, 2024
Feb 11, 2024
Feb 12, 2024
Feb 13, 2024
Feb 14, 2024
Feb 15, 2024
Feb 16, 2024
Sector
Country
Detection Rate: 0
Detection Rate: 0
Detection Rate: 0
Detection Rate: 0
Detection Rate: 0
Detection Rate: 0
Detection Rate: 0
Detection Rate: 0
Detection Rate: 0
Detection Rate: 0
Detection Rate: 0
Detection Rate: 0
Detection Rate: 0
Detection Rate: 0
Detection Rate: 0
Detection Rate: 0