Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Showing posts with label firewall vulnerability. Show all posts

Digital Intrusion at the Heart of UK Diplomacy Verified by Officials


In the wake of the revelation of a serious cybersecurity breach at the Foreign, Commonwealth, and Development Office of the United Kingdom, the integrity of national institutions once again came into the focus of public attention. In October, its systems were breached by an external intrusion, which exposed widespread cybersecurity vulnerabilities.

There is growing concern in the global community about the existence of state-linked cyberattacks targeting government infrastructure, as revealed by minister Chris Bryant in his statement following the revelations. 

Although officials have determined that the breach does not pose a high risk for individuals, preliminary findings suggest that the incident may have involved large volumes of sensitive administrative records, including potentially tens of thousands of visa-related details. Although the precise scale and impact of the attack have not been determined, it is believed that the incident was of a low risk.

Bryant emphasized and cautioned that no attribution has been formally established, nor has a definite link to the operation been established, yet unverified intelligence assessments have pointed to possible involvement by a Chinese cyber group dubbed Storm 1849; however, it is important not to make definitive conclusions before the investigation has been conducted. 

A number of cybersecurity analysts have compared the breach with the 2024 ArcaneDoor campaign, a sophisticated attack that brought together state-sponsored actors, and prompted them to consider overlapping methods and the broader implications of coordinated data targeting campaigns in the future. 

An investigation has already been conducted by government response teams to identify and neutralize the vulnerability that enabled the intrusion, and forensic specialists are now studying log files and access patterns in an effort to determine the intent, origin, and extent of the breach.

Bryant highlighted the complexity of the investigation and stressed that speculation is of no benefit to the investigation, and admitted that determining who is responsible could take a considerable amount of time, reinforcing the government's belief that the official narrative will be based only on substantiated findings. Consequently, authorities have not yet publicly verified the full extent of what information was accessed by this breach, which was detected by government monitoring systems in October. 

It is possible that tens of thousands of visa-related data entries are included in the breach, although there has been no official confirmation yet from the government. When the intrusion was discovered, international security advisories also noted that active exploitation of vulnerabilities affecting a series of Cisco firewalls, including Cisco firewalls manufactured by Cisco, was being detected by government agencies across the country, including the United States and Asia.

Even though the Cyber Security and Communication Centre (CISC) and the Foreign, Commonwealth and Development Office (FCDO) attacks occurred at almost the same time, the UK government has declined to confirm whether the CISC attack was caused by the same infrastructure vulnerabilities as FCDO or a known threat actor, citing the sensitivity of ongoing forensic investigations. 

The trade minister, Sir Chris Bryant, has made public remarks to Sky News acknowledging the compromise, stating that the government had been aware of the intrusion since October, but has cautioned against premature attribution to the cyber group Storm-1849. According to Bryant, the reports circulated are mostly speculative rather than evidence-based, adding that disclosure is limited due to the complexity and anticipated duration of the investigation, which remains unresolved. 

The department's technical response teams confirmed that the vulnerability that enabled the breach had been neutralised swiftly, describing the incident as a technical fault isolated to one of the department's web platforms. 

As a result of risk assessments, it appears that a low likelihood exists that individuals' data will be directly affected, as is the case with current risk assessments. After the intrusion was detected in October, the National Cyber Security Centre (NCSC) confirmed that it is coordinating closely with government departments to determine what operational and personal implications the breach might have, as it has been discovered that systems managed by the Foreign, Commonwealth and Development Office infrastructure have been accessed without authorization without authority, following its discovery. 

The trade minister, Sir Chris Bryant, spoke to national broadcasters and radio networks about the incident. He stressed that the security vulnerability had been swiftly addressed by government response units, and that early risk analysis suggests a low probability of individuals becoming materially affected as a result. Moreover, Bryant stressed the lack of veracity of claims made by foreign states to be involved in the intrusion, especially those linking the intrusion to Chinese actors or the Chinese state. 

According to Bryant, the investigation is at a stage in which only a limited amount of technical details can be divulged at present. A number of reports, including those published in The Sun, suggested that visa-related records may have been a target of the investigation, but the government hasn't provided any confirmation of scope or attribution. 

There has been a formal referral to the Information Commissioner's Office (ICO) of the incident, and the UK's data protection authority has been notified as well for regulatory review. The disclosure comes amid repeated warnings from UK intelligence agencies regarding the growing presence of state-linked espionage activities originating in China, spanning cyber campaigns and intelligence gathering to gather information about the political, commercial, and strategic affairs of the nation.

It has been reported by GCHQ publicly that its most significant national security focus is countering threats from China, which is greater than all other state adversaries when it comes to resources allocated to defensive purposes. According to Bryant's remarks released on Friday, government institutions remain persistent targets for outside cyber operations. In his remarks, he asserted that officials are still assessing the consequences of their actions, reaffirming that future statements will be based on validated findings, not speculation. 

It is expected that this breach will intensify the existing discussion around the government's digital transformation agenda, and the proposals to establish a national digital identity framework in particular. There is no doubt that government IT infrastructure is routinely tested for cybersecurity. However, the timing of the incident has given renewed momentum to those who have been critical of the consolidation of large amounts of identity data. 

There have been reports that centralised citizen authentication systems could be an attractive target for malicious cyber operators, as previously warned. This revelation coincides with an investigation by ITV News that highlighted security concerns surrounding One Login, which will be used to underpin digital identity services in the future. This investigation is part of an ongoing series of ITV News investigations highlighting security concerns associated with One Login. 

Originally documented by Computer Weekly earlier this year, these vulnerabilities were then examined in national media as well, putting a sustained focus on the system's security assurances. It is not surprising that the incident has taken place against a backdrop of disruptive cyber campaigns that have stretched far beyond Whitehall and into key commercial sectors. 

As of 2025, runsomware attacks caused Jaguar Land Rover (JLR) to halt production, affecting supply chains throughout the automobile industry. The Office for National Statistics then attributed part of the UK's November economic slowdown as a result of the operational paralysis caused by the breach. 

Several other major institutions, such as the Co-op and Marks & Spencer, have also confirmed they have been affected by significant cyber incidents, confirming what many analysts have said had been one of the most aggressive periods of online targeting the UK has faced in recent years. 

A coordinated attack on local government networks has disrupted services across four London councils, including the City of London, Hackney, Westminster, and Hammersmith and Fulham, three of whom share a unified IT service. In a later press conference, the NCSC confirmed that sensitive information could have been copied during the attack, prompting them to participate in further investigation as the broader implications of these shared public infrastructure vulnerabilities are assessed. 

A number of cyber threats targeting government and economic infrastructure are emerging rapidly, as evidenced by the incident. However, while the investigation into the Foreign Office breach continues, its broad implications go well beyond a single attack, making it even more important for the public sector to conduct proactive security audits, harden supply chains, and accelerate vulnerability disclosure protocols in order to avoid the same thing happening again. 

The analyst note that while shared infrastructure and centralised authentication platforms are extremely efficient in terms of operational efficiency, they require significantly higher level of safeguards, continuous penetration testing, and multilayered anomaly detection and mitigation procedures in order to mitigate systemic risks.

Despite the fact that the UK government has already signalled that it will increase defense resources through agencies such as the NCSC and GCHQ in order to enhance defence. However, experts argue that long-term resilience will be achieved by simultaneously investing in workforce capabilities, encrypting data compartmentalization, and collaborating with global coalitions that promote cybersecurity. 

It is also imperative for organizations and citizens alike to recognize that digital security is now intertwined with national stability as a matter of necessity. Public trust will be strengthened when emerging digital frameworks are not only responded to quickly, but they must also be transparent, responsible, and accountable to the community.

In order to maintain a sustainable digital governance environment, continued vigilance, structured incident reporting, as well as security-by-design implementation, remain the cornerstones.

Hackers Exploit Fortinet Firewall Bugs to Deploy Ransomware

 

Cybersecurity researchers have uncovered a new attack campaign in which hackers are exploiting vulnerabilities in Fortinet firewalls to breach corporate networks and deploy ransomware. The hacking group, tracked as “Mora_001,” is leveraging two specific flaws in Fortinet’s firewall software to infiltrate systems and launch a custom ransomware strain called “SuperBlack.” 

These vulnerabilities, tracked as CVE-2024-55591 and CVE-2025-24472, have been actively exploited since December 2024, despite Fortinet releasing patches in January 2025. Many organizations have yet to apply these critical updates, leaving their networks vulnerable. Once inside a network, the attackers conduct reconnaissance to identify valuable data before deploying ransomware. Instead of immediately encrypting files, they first exfiltrate sensitive information, a tactic that has become increasingly common among ransomware groups seeking to pressure victims into paying a ransom to prevent data leaks. 

Security researchers at Forescout observed that the Mora_001 group selectively encrypted file servers only after stealing critical data, making their attacks more damaging and difficult to recover from. There is strong evidence linking Mora_001 to the notorious LockBit ransomware gang. The SuperBlack ransomware strain appears to be based on a leaked builder from LockBit 3.0 attacks, and the ransom notes left by Mora_001 include the same contact details previously used by LockBit affiliates. This suggests that Mora_001 may be a current LockBit affiliate with distinct operational methods or a separate group that shares infrastructure and communication channels. 

Cybersecurity experts believe that Mora_001 is primarily targeting organizations that have not yet applied Fortinet’s security patches. Companies that failed to update their firewalls or properly harden their network configurations when the vulnerabilities were first disclosed are at the highest risk. The ransom notes used in these attacks also bear similarities to those used by other cybercriminal groups, such as the now-defunct ALPHV/BlackCat ransomware gang, further indicating connections within the ransomware ecosystem. 

Despite Fortinet releasing fixes for the affected vulnerabilities, unpatched systems remain an easy target for attackers. Security professionals are urging organizations to update their firewalls immediately and implement additional security measures to prevent unauthorized access. Best practices include applying all available patches, segmenting networks to restrict access to critical systems, monitoring for suspicious activity using endpoint detection and response tools, and maintaining secure offline backups. Organizations that fail to take these precautions risk falling victim to sophisticated ransomware attacks that can result in severe financial and operational damage.

Palo Alto Networks Alerts on Exploit Causing Firewall Vulnerabilities

 

Palo Alto Networks has issued a warning about the active exploitation of the CVE-2024-3393 denial of service (DoS) vulnerability, which attackers are using to compromise firewall defenses by triggering device reboots.

Repeated exploitation of this vulnerability forces the firewall to enter maintenance mode, requiring manual intervention to restore normal functionality.

"A Denial of Service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall," the advisory states. The flaw enables an unauthenticated attacker to reboot affected devices by sending specifically crafted malicious packets.

This issue impacts devices where the 'DNS Security' logging feature is enabled. The affected PAN-OS versions are listed below. According to Palo Alto Networks, customers have already reported outages caused by firewalls blocking malicious DNS packets exploited through this vulnerability. The flaw has been addressed in the following PAN-OS versions: 10.1.14-h8, 10.2.10-h12, 11.1.5, 11.2.3, and later releases. However, no patch will be released for PAN-OS 11.0 due to its end-of-life (EOL) status as of November 17.

Palo Alto Networks has also provided workarounds for customers unable to immediately apply updates:

Mitigation Steps for Unmanaged NGFWs or Those Managed by Panorama:
  • Navigate to: Objects → Security Profiles → Anti-spyware → DNS Policies → DNS Security for each Anti-spyware profile.
  • Change the Log Severity to "none" for all configured DNS Security categories.
  • Commit the changes, then revert the settings after applying the fixes.
For NGFWs Managed by Strata Cloud Manager (SCM):
  • Option 1: Disable DNS Security logging directly on each NGFW using the steps above.
  • Option 2: Open a support case to disable DNS Security logging across all NGFWs in the tenant.
For Prisma Access Managed by SCM:
  • Open a support case to disable DNS Security logging across all NGFWs in the tenant.
  • If needed, request an expedited Prisma Access tenant upgrade through the support case.
The company urges all users to apply the recommended updates or follow the workarounds to mitigate the risk of exploitation.