Context over chaos. Disconnected technologies, siloed data, and reactive processes can only get you so far. Protecting businesses in today’s threat landscape demands more than a set of security tools – it requires context.
That's where Avertium comes in
Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.
Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.
Best-in-class technology from our partners... backed by service excellence from Avertium.
Interested in becoming a partner?
With Avertium's deal registration, partners can efficiently and confidently connect with Avertium on opportunities to protect your deals.
Microsoft Copilot for Security analyzes and synthesizes high volumes of security data which can help healthcare cybersecurity teams do more with less.
Dive into our resource hub and explore top
cybersecurity topics along with what we do
and what we can do for you.
The FBI issued a notice yesterday warning that APT has been exploiting a zero-day vulnerability in FatPipe’s router clustering and load balancer products. FatPipe is a computer networking hardware firm in Salt Lake City that specializes in WAN optimization solutions for many Fortune 1000 companies. The FBI performed a forensic analysis which indicated that the vulnerability in the device software goes back to at least May 2021.
The flaw is found in the device software for FatPipe’s WARP WAN redundancy product, its IPVPN load balancing and reliability device for VPNs, and in its MPVPN router clustering device. The zero-day vulnerability allows for attackers to gain access to their victims’ virtual private networks (VPN), as well as access to an unrestricted file upload function. This access then allows APT to drop a webshell for exploitation activity with root access, leading to escalated privileges and potential follow-on activity. The attackers are using the compromised VPNs to move laterally into their targets’ networks.
While there is no CVE identification number for the vulnerability yet, FatPipe patched the vulnerability this month and it can be tracked under the FPSA006 tag. FatPipe products are used by many government organizations, as well as organizations within the utilities, education, financial industries. The company stated that this kind of vulnerability could allow a remote attacker to upload a file to any location the filesystem on an affected device and allow them to execute functions as if they were an administrative user.
The FatPipe Zero-Day Vulnerability affects the followings versions of the software:
FatPipe advises to update to the following versions:
indicators of compromise (iocs):
ERROR com.fatpipe[.]centralmanager.servlet.UploadConfigServlet-Exception occurred while uploading config. Exception is : null
Yara Signatures
rule APT_Webshell_1_jsp {
strings:
$s1 = "Runtime.getRuntime().exec(request[.]getParameter("
$s2 = "request.getParameter(\"pwd\")"
$s3 = "while((a=in.read(b))!=-1){"
condition:
filesize < 25KB and 2 of them }
FBI warns of APT group exploiting FatPipe VPN zero-day since May (bleepingcomputer.com)
Technical Support - FatPipe Networks (fatpipeinc.com)
FBI: FatPipe VPN Zero-Day Exploited by APT for 6 Months | Threatpost
FBI Flash Notice 211117-2.pdf (ic3.gov)