Did I miss the bit where they said how it was delivered?
Seems it’s exploiting vulnerabilities in some software called “Ivanti Connect Secure VPN”, so unless you’re running that, you’re safe I guess. Says in the past they used vulnerabilities in “Qlik Sense” and Adobe “Magento”. Never heard of any of those, but I guess maybe some businesses use them?
ITT people who don’t understand the difference between “privacy” VPNs pitched by influencers and corporate remote access VPN.
This is the latter. Ivanti bought Pulse a few years back. Pulse, iirc, spun out of Juniper and Netscreen.
Ivanti is a huge name in enterprise management. They make LANdesk which has been one of the most widely deployed enterprise endpoint management tools.
Juniper is one of the biggest names in enterprise and service-provider networks.
I pay for ProtonVPN, and I still run my traffic through OpenVPN.
Hate to victim blame, but unless you’re going to audit every line of code yourself, don’t use obscure software.
To be fair you should be using wire guard then. Because multiple of the largest and most well-known security auditing firms in the world have said that openvpn is impossible to truly audit. It’s too large, you can audit individual parts of it, and you can audit individual interactions between parts. But it’s not possible to fully audit.
Meanwhile wireguard is quite small so it can be fairly easily audited by a small team and has been multiple times
As TonyTonyChopper this thread said, sometimes that obscure software is what you are required to use in your institution, or they don’t offer support for anything else.
Ivanti Connect Secure VPN
So its spreading via a closed source VPN software. Why should you even use that when there is great VPN software available on Linux which works reliable for decades?
Well of course you miss zero trust connections, multi-cloud readiness, award‑winning security and proven secure corporate access …