"CISA-FireEye: 16 Malware Families From China Infect Pulse Secure VPN Appliances"
FireEye's Mandiant cyber forensics team, working together with the Cybersecurity and Infrastructure Security Agency (CISA) and Ivanti, provided details surrounding 16 malware families designed to infect Ivanti Pulse Connect Secure VPN appliances. These malware families have been used by China-linked cyber espionage groups. Mandiant reported that the compromises involving Pulse Secure's VPN appliances occurred at organizations within the defense, government, high tech, transportation, and financial sectors across the U.S. and Europe. According to the researchers, the espionage activity conducted by UNC2630 and UNC2717 supports significant Chinese government priorities. Many of the compromised organizations operate in verticals and industries aligned with Beijing's strategic objectives, which are highlighted by China's recent 14th Five-Year Plan. This article continues to discuss the discovery of 16 malware families custom-tailored for infecting Pulse Secure VPN appliances.
SC Media reports "CISA-FireEye: 16 Malware Families From China Infect Pulse Secure VPN Appliances"