Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Mississippi's Age Guarantee Act Tests Decentralized Social Networks

August 28, 2025

Threads test how to share long format text on the platform

August 28, 2025

Do you hire AI, or are you a human being? Next frontier for Startup Ops in 2025

August 28, 2025
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    Mississippi's Age Guarantee Act Tests Decentralized Social Networks

    August 28, 2025

    Threads test how to share long format text on the platform

    August 28, 2025

    New AI features in WhatsApp allow you to rearrange and adjust the tone of your message

    August 27, 2025

    Google and Grok are catching up to ChatGpt, says the latest AI report from A16Z

    August 27, 2025

    Google Vids adds AI avatars to the video editor and launches the consumer version

    August 27, 2025
  • Crypto

    Coinbase CEO explains why he fired an engineer who didn't try AI right away

    August 22, 2025

    Your next customer is destroying the 2025 Expo floor

    August 19, 2025

    Crypto Company Gemini File for Winklevoss Twins IPO

    August 16, 2025

    North Korean spies pretending to be remote workers have invaded hundreds of businesses, CloudStrike says

    August 4, 2025

    Telegram's Crypto Wallet will be released in the US

    July 22, 2025
  • Security

    According to Transunion, hackers say they stole the personal information of 4.4 million customers

    August 28, 2025

    The FBI says that China's salt typhoon has hacked at least 200 US companies

    August 27, 2025

    US sanctions fraud network used by North Korea's “remote IT workers” to steal money for work

    August 27, 2025

    Doge uploads live copies of Social Security databases to “vulnerable” cloud servers, whistleblower says

    August 26, 2025

    Security researchers map hundreds of Teslamate servers spilling Tesla vehicle data

    August 26, 2025
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    Do you hire AI, or are you a human being? Next frontier for Startup Ops in 2025

    August 28, 2025

    From streaming to healthcare to AI, Mark Cuba reveals his “formula of confusion”

    August 27, 2025

    Uncork Capital in a 21-year venture cycle – and what's the difference between this?

    August 26, 2025

    A16z spends $1.49 million on lobbying in Washington, with rivals mostly going outside

    August 25, 2025

    Openai warns against SPVs and other “unauthorized” investments

    August 23, 2025
TechBrunchTechBrunch

Simple history of mass hacks

TechBrunchBy TechBrunchJanuary 31, 20257 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


Enterprise cyber security tools such as routers, firewalls, and VPNs exist to protect corporate networks from intruders and malicious hackers.

However, while the organization is sold as a tool to maintain safety from external threats, many of these products include software bugs that make malicious hackers just compromise the network. It turns out that there are many times.

These bugs have been blamed for explosions in recent mass hacking campaigns, and malicious hackers have been abused on these simple security flaws, invading thousands of tissue networks, and sensitive. Steal corporate data.

We have summarized the simple history of mass hacks. And update this article when it becomes more inevitable.

One of the first mass hacks in the last 10 years is the GOANY WHERE Managed, a product used by companies to share large -scale files and confidential data sets by notorious ransomware crews on the Internet. He used the vulnerability of File Transfer Software. The CLOP Ransum Wear Gang compromised over 130 organizations and used bugs to steal millions of personal data. Since the vulnerability was abused as a zero day, FORTRA had no time to fix it before being attacked. Later, CLOP stolen data stolen from a victim organization who did not pay hackers. Hitachi Energy、Security Giant Rubrik、およびFloridaに拠点を置くヘルステクノロジー組織Nation-Benefitsは、攻撃で盗まれた300万人以上のメンバーのデータを見た – は、バギーソフトウェアに起因する侵入を報告しました。

May 2023: Moveit defects allowed the data of 60 million people to theft

Moveit's large -scale hack is one of the largest abuses in history, and hackers abuse other widely used file transfer software deficiencies developed by Progress software, thousands of organizations. I will steal. According to cyber security companies, EMSISOFT, the attack was re -asserted by the Clop Ransomware Group, abusing Moveit vulnerabilities to steal more than 60 million individuals. The US government service, which contracted for a huge Maximus, was the biggest victim of Moveit violations after confirming that Hackers had accessed 11 million personal protected health information.

October 2023: Cisco Zero-day exposed thousands of routers to acquire

Mashack lasts until the latter half of 2023, and in October, the hacker exploits the vulnerability of the zero day of Cisco's networking software and compromise on tens of thousands of devices that depend on software, such as enterprise switches, wireless controllers, and access points. , And industrial router. The bug has given the attacker a “complete control of the infringed device.” Cisco did not confirm the number of customers affected by the device connected to the Internet and the asset search engine, but an infringement device exposed to the Internet was observed. I mentioned it.

Stock image of the Cisco logo and sign from the ceiling of the convention centerImage Credit: Ramon Costa/Sopa Image/Getty Image Light Rocket)

November 2023: Ransomwear gang abuses Citrics Bug

Citrix Netscaler, which is used by large companies and the government for application distribution and VPN connection, became the latest mass hack target just one month later in November 2023. Confidential information from Netscaler systems influenced by famous companies. Aerospace major Boeing, law firm Allen & Oberry, and Chinese industries and commercial banks have been asserted as victims.

January 2024: Chinese hackers violated the company by exploiting the IVANTI VPN bug

Ivanti has been synchronized with a large amount of hack after a large amount of hackers supported by Ivanti's Corporate Connect Secure VPN appliance. At the time, Ivanti said that only a limited number of customers were affected, but Cyber ​​Security Company Volexity has exploited more than 1,700 IVANTI appliance around the world, aircraft, banks, banks, defenses. He discovered that it had an influence on the organization of the telecommunications industry. U.S. government agencies, which operate the affected Ivanti system, were immediately ordered to prevent the system. The exploitation of these vulnerabilities was later linked to a spy group supported by China, known as the Salt era, and has recently been hacked to at least nine US telecommunications companies. 。

In February 2024, the hacker aimed for two “easy extraction” vulnerabilities, ConnectWise ScreenConnect. Cyber ​​Security Giant Manding said that researchers had observed two defects “identified mass exploitation.” These were abused by various threat actors to develop passwordstellers, back doors, and in some cases ransomware.

The hacker attacked a (again) Ivanti customer with a fresh bug

In February 2024, Ivanti again created a headline again when a large number of customers were reduced in other vulnerabilities in the VPN appliance, which is widely used by attackers. ShadowServer Foundation, a non -profit organization that scanned the Internet for exploitation, told TechnoCrunch when observing more than 630 unique IP addresses to exploit the server defects. It is protected by vulnerable eyivanti equipment.

November 2024: Palo Olt Firewall bugs have thousands of companies in danger

In the latter half of 2024, the hacker was created by the cyber security giant Palo Alto Network and utilized two zero vulnerabilities in software used by customers around the world, so it infringes thousands of organizations. I did. With the vulnerability of Pan-OS, an operating system run on all the next-generation firewalls in Paralt, the attacker could compromise and remove sensitive data from a corporate network. According to a researcher of Watchtowr Labs, a security company, a reverse work of Palo Alto patches, this defect was due to the basic mistakes in the development process.

December 2024: CLOP compromise on CLEO customers

In December 2024, CLOP Ransomwear Gang launched a fresh wave of mass hacking, targeting even more popular file transfer technology. This time, the gangs are exploiting the tools created by CLEO Software, a manufacturer of enterprise software based in Illinois, and targeting dozens of customers. By early January 2025, CLOP listed 60 CLEO companies, which were allegedly compromised, including US supply chain software giants and German manufacturing giant cobestros. By the end of January, CLOP has added 50 CLEO Mass-Hack victims to a dark web leak site.

Photograph from the German Kesbestro outside headquarters.Image Credit: Alex Claus/Bloomberg via Getty Images

January 2025: New year, new IVANTI bug being attacked

The New Year began with Ivanti falling into a hacker victim. In early January 2025, US software giants warned customers that hackers are utilizing the new zero -day vulnerability of enterprise VPN appliance to violate corporate customer networks. Ivanti said that a “limited number” was affected, but refused to say how many people would say. According to Shadowerver Foundation, the data indicates hundreds of backladed customer systems.

The Fortinet Firewall bug was misused from December

A few days after the latest bugs of Ivanti were disclosed, Fortinet confirmed that hackers are using firewall vulnerabilities individually to invade corporate and corporate customers' network. According to security research companies, the defects affecting cyber security companies' FortiGate firewalls have been “large amounts of exploitation” as a zero day bug since at least December 2024. Fortinet refused to say the number of affected customers, but the security investigators investigating the attack have observed the invasion of the affected device, TEN.

SonicWall says that hackers are remotely hacking customers

January 2025 was a busy month for hackers who use bugs of enterprise security software. Sonic Wall stated in late January that the right hacker has invaded customer networks, utilizing the newly discovered vulnerabilities in one of the enterprise products. According to Sonic Wall, a vulnerability that affects SonicWall's SMA1000 Remote Access Appliance has been discovered by Microsoft's threat researchers and is “actively exploited in the wild.” The company does not say how many customers have been affected or have the technical ability to confirm by the company, but this bug is in 2025 because more than 2,300 devices are exposed to the Internet. It may be the latest mass hack.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

According to Transunion, hackers say they stole the personal information of 4.4 million customers

August 28, 2025

The FBI says that China's salt typhoon has hacked at least 200 US companies

August 27, 2025

US sanctions fraud network used by North Korea's “remote IT workers” to steal money for work

August 27, 2025

Doge uploads live copies of Social Security databases to “vulnerable” cloud servers, whistleblower says

August 26, 2025

Security researchers map hundreds of Teslamate servers spilling Tesla vehicle data

August 26, 2025

Thetruthspy phone spyware new security flaw puts victims at risk

August 25, 2025

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

Mississippi's Age Guarantee Act Tests Decentralized Social Networks

August 28, 2025

Threads test how to share long format text on the platform

August 28, 2025

Do you hire AI, or are you a human being? Next frontier for Startup Ops in 2025

August 28, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2025 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.