Context over chaos. Disconnected technologies, siloed data, and reactive processes can only get you so far. Protecting businesses in today’s threat landscape demands more than a set of security tools – it requires context.
That's where Avertium comes in
Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.
Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.
Best-in-class technology from our partners... backed by service excellence from Avertium.
Interested in becoming a partner?
With Avertium's deal registration, partners can efficiently and confidently connect with Avertium on opportunities to protect your deals.
Microsoft Copilot for Security analyzes and synthesizes high volumes of security data which can help healthcare cybersecurity teams do more with less.
Dive into our resource hub and explore top
cybersecurity topics along with what we do
and what we can do for you.
overview
Nation-state threat actors are currently exploiting two zero-day vulnerabilities discovered in Cisco firewalls. Over the past five months, these attacks have breached government networks across the globe. Among the targeted devices, Cisco's Adaptive Security Appliances (ASA) have been particularly exploited, leveraging zero-day vulnerabilities tracked as CVE-2024-20353 (CVSS 8.6) and CVE-2024-20359.
The threat actor responsible for these attacks, identified as UAT4356 by Cisco and STORM-1849 by Microsoft, uses sophisticated custom malware known as Line Dancer and Line Runner. Line Dancer, operating solely in memory, executes arbitrary shellcode payloads, while Line Runner ensures persistence on compromised devices. These attacks involve intricate exploit chains, backdoors, and meticulous anti-forensic measures. The threat actors appear to be motivated by espionage and have in-depth knowledge of the targeted devices.
Cisco has released security updates to patch CVE-2024-20353 and CVE-2024-20359. The company highly recommends that all ASA users install the updates as soon as possible. However, patching the vulnerabilities is only the first step in mitigating this threat, as the means of initial access by the threat actor still remains unknown. Organizations should monitor system logs for signs of compromise and strengthen authentication mechanisms to prevent unauthorized access.
INDICATORS OF COMPROMISE (IoCs)
Actor Controlled Infrastructure (IPs)
Multi-Tenant Infrastructure (IPs)
SUPPORTING DOCUMENTATION