Hackers are targeting VPNs to Gain access to corporate systems

Hackers are targeting VPNs to Gain access to corporate systems

The software company Check Point warns that hackers are targeting remote access VPN devices to gain access to the corporate network.

The discovery comes shortly after At-Bay, a cyber insurance company, published a study that found that in 2023, 58% of ransomware attacks had remote access tools as penetration points.

In an advisory published on 5/27, the software company explained that a cyber attack was discovered after "a small number" of login attempts were flagged. These login attempts were aimed at older local VPN accounts that use insecure password-only authentication. 

The company also said it had recently witnessed VPNs being compromised, including cybersecurity providers.

Check Point said in its recommendations that hackers are targeting remote access tools to "find relevant corporate assets and users and seek vulnerabilities to gain the persistence of key corporate assets."

The company has released a solution that automatically prevents unauthorized access by local accounts with password-only authentication to customers' VPNs. The solution aims to address these unauthorized login attempts and prevent them from occurring in the future.

To improve their security, Check Point recommends that customers check their local accounts to see if they have them, whether they are used, and who is using them. If the user has a local account that they are not using, Check Point says it is best to disable them. 

Check Point also proposes adding another layer of authentication, such as certificates, to local accounts that customers use but are currently using password-only authentication. Finally, they urged customers to deploy prevention solutions across their security gateways.

Note that these vulnerabilities only apply to remote access VPNs and not to consumer products that are covered primarily on pages like tom's Guide.

Categories