"Palo Alto Networks Faces Zero-Day Backdoor Exploitation"

Threat actors have been exploiting a zero-day vulnerability in Palo Alto Networks PAN-OS software to execute arbitrary code with root privileges on affected firewalls. The attack, known as Operation MidnightEclipse, involves the deployment of a Python-based backdoor to create a cron job that fetches and executes commands from an external server. The attackers have been observed creating a reverse shell, downloading additional tools, and exfiltrating data, prompting the U.S. Cybersecurity and Infrastructure Security Agency to add the flaw to its Known Exploited Vulnerabilities catalog. Organizations are advised to apply patches promptly, as the threat actor, dubbed UTA0218, is suspected to be state-backed and highly capable.
- Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack The Hacker News
- “Highly capable” hackers root corporate networks by exploiting firewall 0-day Ars Technica
- Palo Alto Networks firewalls under attack, hotfixes incoming! (CVE-2024-3400) Help Net Security
- Palo Alto Networks Warns of Exploited Firewall Vulnerability SecurityWeek
- Palo Alto Networks Discloses Exploitation Of 'Critical' Zero-Day Flaw Impacting PAN-OS CRN
Reading Insights
0
1
3 min
vs 4 min read
86%
746 → 105 words
Want the full story? Read the original article
Read on The Hacker News