CISA Warns of Ivanti Zero-Day Exploits

CISA Warns of Ivanti Zero-Day Exploits

Urgent Mitigation Measures Mandated by CISA for Federal Agencies

In a significant development, the Cybersecurity and Infrastructure Security Agency (CISA) has issued the first emergency directive of the year, mandating Federal Civilian Executive Branch (FCEB) agencies to urgently address two zero-day vulnerabilities affecting Ivanti Connect Secure and Ivanti Policy Secure. The vulnerabilities, identified as CVE-2023-46805 and CVE-2024-21887, have been actively exploited by multiple threat actors since December, raising widespread concerns about the security of federal systems.

Exploits Enable Lateral Movement and Persistent Access

The exploits, when combined, enable threat actors to navigate laterally within a targeted network, exfiltrate sensitive data, and establish persistent access through the deployment of backdoors. With Ivanti yet to release security patches to rectify these vulnerabilities, CISA has deemed the situation to pose an unacceptable risk to FCEB agencies, prompting the issuance of emergency directive ED 24-01.

Mitigation Measures Outlined in the CISA Directive

As outlined in the directive, federal agencies are now obligated to promptly implement Ivanti’s publicly disclosed mitigation measures to thwart ongoing attack attempts. In addition to these measures, agencies must leverage Ivanti’s External Integrity Checker Tool and adhere to a set of comprehensive actions outlined in the directive.

Immediate Reporting and Removal of Compromised Products

First and foremost, agencies are required to report any indications of compromise promptly to CISA through the designated communication channel at [email protected]. Subsequently, agencies are instructed to remove compromised Ivanti products from their networks and initiate a thorough incident analysis. This includes preserving data from compromised devices through the creation of forensic hard drive images while actively searching for indications of further compromise.

Restoration Steps and Security Measures

To bring a compromised product back into service, agencies are directed to reset the device with the affected Ivanti solution software to factory default settings and remove the attack vector by applying Ivanti’s provided mitigations. The directive also outlines a series of additional steps to fully restore impacted appliances, including the revocation and reissuance of stored certificates, resetting of administrative enable passwords, resetting of stored API keys, and the resetting of passwords for any local users defined on the gateway.

Timely Application of Updates and Reporting Requirements

Furthermore, agencies are mandated to apply updates addressing the two vulnerabilities referenced in the directive as soon as they become available, with a strict deadline of no later than 48 hours following their release by Ivanti. One week after the issuance of the directive, agencies are required to report to CISA, using the provided template, a complete inventory of all instances of Ivanti Connect Secure and Ivanti Policy Secure products on agency networks. This report must include details on the actions taken and results achieved in response to the CISA directive.

Monitoring Efforts Highlight Severity of the Situation

The severity of the situation is underscored by the monitoring efforts of threat intelligence entities. Shadowserver, a threat monitoring service, currently tracks over 16,200 ICS VPN appliances exposed online, with more than 4,700 located in the United States. Notably, these exposed Ivanti ICS devices have become the target of active exploitation, with over 420 hacked devices spotted on January 18 alone.

Advanced Exploitation Tactics and Identified Threat Actors

One of the threat actors involved in the attacks, suspected to be a Chinese state-backed group tracked as UTA0178 and UNC5221, has already backdoored over 2,100 Ivanti appliances using a GIFTEDVISITOR webshell variant, according to reports from threat intelligence company Volexity. Mandiant, during its investigation into these attacks, discovered the deployment of five custom malware strains on breached customers’ systems. These strains have been designed to steal credentials, deploy webshells, and introduce additional malicious payloads.

Broad Spectrum of Victims and Varied Industry Sectors

The threat actor behind these attacks has been actively harvesting and stealing account and session data, posing a significant risk to the compromised networks. Victims identified so far include government and military departments worldwide, national telecom companies, defense contractors, technology companies, banking and finance organizations, worldwide consulting outfits, and aerospace, aviation, and engineering firms. The targeted entities vary widely in size, ranging from small businesses to some of the largest organizations globally, including multiple Fortune 500 companies spanning various industry sectors.

Cryptocurrency Mining and Malicious Payloads

Volexity and GreyNoise, in their monitoring efforts, have observed attackers deploying XMRig cryptocurrency miners and Rust-based malware payloads. The dynamics of the situation highlight the critical need for agencies to adhere promptly and comprehensively to the directives outlined in ED 24-01 to mitigate the risks posed by these zero-day vulnerabilities.

Collaborative Approach Emphasized

In conclusion, the emergency directive issued by CISA in response to the zero-day vulnerabilities affecting Ivanti appliances reflects the seriousness of the situation and the urgency required in mitigating the risks posed by active exploitation. The comprehensive set of actions outlined in the directive aims to guide federal agencies in promptly addressing the vulnerabilities, securing their networks, and preventing further compromise. The ongoing monitoring efforts by threat intelligence entities emphasize the evolving nature of the threat landscape, underscoring the importance of a proactive and collaborative approach to cybersecurity at both the national and organizational levels.

Stay Informed and Stay Secure with the Latest Hacker News: Your Daily Source for Cutting-Edge Cybersecurity Updates!

WhatsApp Mods Infected with CanesSpy Spyware: A Serious Privacy Breach

WhatsApp Mods Infected with CanesSpy Spyware: A Serious Privacy Breach

In a concerning development, cybersecurity researchers have recently uncovered modified versions of WhatsApp for Android, equipped with a spyware module named CanesSpy. These modified WhatsApp applications are being distributed through dubious websites advertising these modded versions and via Telegram channels predominantly used by Arabic and Azerbaijani speakers, one of which boasts a user base of two million individuals. This article explores the discovery, functionality, and potential implications of CanesSpy, emphasizing the risks to user privacy and device security.

The CanesSpy Spyware:

The CanesSpy spyware, concealed within these rogue WhatsApp mods, is designed to activate when the infected phone is powered on or connected to a charger. Once activated, it initiates contact with a command-and-control (C2) server, transmitting vital information about the compromised device. This includes details like the IMEI, phone number, mobile country code, and mobile network code. CanesSpy goes further by sending information about the victim’s contacts and accounts every five minutes and awaiting further instructions from the C2 server every minute. Importantly, this spyware module is highly configurable, allowing for actions like sending files from external storage, recording sound from the microphone, altering C2 server settings, and more.

Language Clues:

An intriguing aspect of this discovery is that all the communication between CanesSpy and the C2 server is conducted in Arabic. This linguistic clue suggests that the mastermind behind this operation is likely an Arabic speaker.

Duration and Targets:

Cybersecurity researchers have determined that CanesSpy has been active since mid-August 2023. The spyware campaign has predominantly targeted users in countries such as Azerbaijan, Saudi Arabia, Yemen, Turkey, and Egypt. This highlights the geographical focus of the espionage campaign.

WhatsApp’s Stance:

WhatsApp has been unequivocal about unofficial and third-party versions of its app, cautioning users that they are treated as unofficial and fake. The company emphasizes that it cannot validate the security practices of these versions and warns that using them may expose users to the risk of malware compromising their privacy and security.

A Continuing Threat:

This discovery underscores the persistent abuse of modified messaging apps like WhatsApp and Telegram to distribute malware to unsuspecting users. Notably, last year, WhatsApp, owned by Meta, filed a lawsuit against three developers in China and Taiwan for distributing unofficial WhatsApp apps, including HeyMods, which resulted in the compromise of over one million user accounts.

Read Article: Cisco ASA Firewall Vulnerability Exploited to Deploy Malicious Backdoor

The Need for Caution:

It’s crucial for users to exercise caution and prioritize their privacy and security. WhatsApp mods are primarily distributed through third-party Android app stores that often lack rigorous screening and may not promptly remove malware. While some of these resources, such as third-party app stores and Telegram channels, are popular, popularity does not guarantee safety. Users should be aware of the risks associated with using unofficial and modified versions of messaging apps.


The discovery of CanesSpy spyware hidden within modified WhatsApp versions serves as a stark reminder of the ongoing threats to user privacy and digital security. To stay protected, users are strongly advised to use only official versions of messaging apps, exercise caution when downloading from unofficial sources, and prioritize security practices that shield their digital lives from potential threats.

Operation Chakra-II: India’s Fight Against Online Scams and Frauds

Operation Chakra-II: India's Fight Against Online Scams and Frauds

In a big move against online crooks, India’s Central Bureau of Investigation (CBI) recently took down cybercrime operations. They called it “Operation Chakra-II.” This operation was a joint effort with other countries and tech giants like Microsoft and Amazon. Its goal was to stop cybercriminals involved in tech support scams and cryptocurrency fraud. They searched 76 places all over India, including states like Tamil Nadu, Punjab, Bihar, Delhi, and West Bengal.

What Happened During the Operation?

The raids in Operation Chakra-II led to the seizure of a lot of evidence. They found 32 mobile phones, 48 laptops, hard drives, and 33 SIM cards. The Indian authorities also froze many bank accounts and took emails connected to 15 accounts. This provided crucial information about the scam operations.

Tech Support Scam Exposed

During Operation Chakra-II, they uncovered two big tech support scams. These scams pretended to be customer support for two famous multinational companies. Amy Hogan-Burney, from Microsoft, said these illegal call centers acted like they were Microsoft and Amazon support. They targeted over 2,000 customers, mostly in the U.S., but also in Canada, Germany, Australia, Spain, and the UK.

Microsoft and Amazon supported this operation because the same crooks targeted their customers. The scammers used different ways to move money they got from people in the U.S., U.K., and Germany. They tricked victims with fake computer problem messages, got them to call a toll-free number, and then scammed them for money.

Cryptocurrency Fraud Uncovered

Apart from tech support scams, the CBI found a cryptocurrency fraud operation linked to a fake crypto-mining scheme. This scheme targeted Indian people and caused losses of at least Rs. 100 crore (around $12 million). Indian authorities found 150 accounts related to this fraud, including those from shell companies and individual accounts. The scammers made up a fake cryptocurrency token, promising big profits. They even created a website to fool investors into thinking they were buying mining machines.

A Worldwide Response

Law enforcement agencies worldwide are now working together to stop these scams and frauds. Microsoft and Amazon are determined to fight tech support fraud and protect customers. They’ve taken down many fake websites and phone numbers used in these scams, leading to arrests and raids on scam operations.

Read Article: Cisco ASA Firewall Vulnerability Exploited to Deploy Malicious Backdoor

In Conclusion

The success of Operation Chakra-II highlights the ongoing efforts to combat cybercrime and protect consumers from tech support scams and cryptocurrency fraud on a global scale. This operation not only exposed the depth of these criminal networks but also demonstrated the commitment of international tech companies to work alongside law enforcement agencies to ensure a safer online environment for all.


1. What is “Operation Chakra-II”?
Operation Chakra-II is a big operation in India to stop online scams and frauds, like tech support scams and cryptocurrency tricks.

2. What did they find during the operation?
They found lots of evidence, including phones, laptops, and bank accounts linked to the scams.

3. How did the tech support scams work?
The crooks pretended to be from famous companies and tricked people into paying them for fake computer problems.

4. How much money was lost in the cryptocurrency fraud?
The fraud made Indian people lose at least Rs. 100 crore, which is about $12 million.

5. What’s being done worldwide to fight these crimes?
Countries are working together to stop these scams, and companies like Microsoft and Amazon are helping by taking down fake websites and phone numbers used by scammers.

Cisco ASA Firewall Vulnerability Exploited to Deploy Malicious Backdoor


A zero-day vulnerability in Cisco’s Adaptive Security Appliance (ASA) firewall has been exploited to implant a malicious Lua backdoor on thousands of devices worldwide. The vulnerability, tracked as CVE-2023-20273, allows for privilege escalation through the Web UI. It has been used alongside another vulnerability, CVE-2023-20198, in an exploit chain to deploy a malicious implant. Cisco has released a patch for the vulnerability, and users are urged to apply it as soon as possible.

What is a zero-day vulnerability?

A zero-day vulnerability is a security flaw that is unknown to the software vendor and has not yet been patched. Zero-day vulnerabilities are particularly dangerous because attackers can exploit them before the vendor has a chance to release a fix.

What is CVE-2023-20273?

CVE-2023-20273 is a privilege escalation vulnerability in the Cisco ASA firewall. It allows an attacker to gain elevated privileges on the device, which could then be used to install malware or steal data.

What is CVE-2023-20198?

CVE-2023-20198 is a remote code execution vulnerability in the Cisco ASA firewall. It allows an attacker to execute arbitrary code on the device remotely.

How are CVE-2023-20273 and CVE-2023-20198 being exploited?

Attackers are exploiting CVE-2023-20273 and CVE-2023-20198 in an exploit chain to deploy a malicious Lua backdoor on Cisco ASA firewalls. The backdoor can then be used to remotely control the device and execute arbitrary commands.

Also READ: How to Safeguard Your Festive Online Shopping from Cyber Threats

Exploitation and Implications

Malicious actors are exploiting these two vulnerabilities in tandem, creating an exploit chain that results in the implantation of a malicious Lua backdoor within Cisco ASA firewalls. This backdoor provides unauthorized access to the compromised device, giving attackers control over the firewall and the ability to execute arbitrary commands. The consequences of this exploitation include:

  1. Remote Control: Attackers can take over Cisco ASA firewalls, potentially causing network disruptions and unauthorized access to sensitive data.
  2. Malware Deployment: The compromised firewalls can be used as a platform to launch further attacks, including the installation of malware on connected systems.
  3. Data Theft: Sensitive information stored on the compromised firewalls may be pilfered, leading to data breaches and potential legal and financial ramifications.
  4. Operational Disruption: Disrupting the operations of Cisco ASA firewalls could result in significant downtime for affected organizations, impacting their productivity and reputation.

Protecting Yourself and Your Network

In the face of this emerging threat, taking proactive measures to protect your systems and networks is essential. Here are some recommended steps:

  1. Apply Security Patches: Cisco has released patches for CVE-2023-20273 and CVE-2023-20198. Promptly apply these patches to your ASA firewalls to close the security vulnerabilities.
  2. Keep Software Updated: Regularly update all software and hardware systems. Updates often include security patches that address known vulnerabilities.
  3. Strengthen Passwords: Utilize strong, unique passwords and enable two-factor authentication (2FA) wherever possible. This adds an extra layer of security to your accounts.
  4. Exercise Caution: Be vigilant when dealing with emails and attachments. Avoid clicking on suspicious links and refrain from opening email attachments from unknown sources.
  5. Stay Informed: Keep yourself informed about the latest cybersecurity threats and best practices by reading cybersecurity news and following security experts on social media.


The exploitation of zero-day vulnerabilities in Cisco ASA firewalls is a clear reminder of the ever-evolving landscape of cybersecurity threats. Promptly applying patches and adhering to best practices are fundamental steps in safeguarding your systems and networks from potential attacks. In a world where cyberattacks are becoming increasingly sophisticated, constant vigilance and preparedness are key to minimizing risk and mitigating potential damage.

How to Safeguard Your Festive Online Shopping from Cyber Threats

How to Safeguard Your Festive Online Shopping from Cyber Threats

The festive season is upon us, and with it comes the joy of online shopping for many. E-commerce companies are running sales, offering attractive discounts on everything from clothing to electronics. However, it’s essential to remain vigilant during this season, as the rise of cybercrime poses a significant threat to unsuspecting online shoppers. The festive season is a time for joy and celebration, and for many, that includes shopping for gifts, decorations, and holiday essentials. In recent years, the internet has become the go-to destination for shoppers, offering convenience and a wide array of choices. However, as the world embraces online shopping, so do cybercriminals. This article will shed light on the cyber threats that lurk amidst the festive season’s online shopping frenzy and offer tips on how to protect yourself.

Cybercriminals are increasingly active during the festive season, preying on shoppers who may be enticed by the promise of big discounts and enticing offers. They use various tactics to deceive individuals and empty their bank accounts. It’s crucial to exercise caution and be aware of the potential risks that come with online shopping.

One of the most common methods cybercriminals employ is the use of fake links. These links may appear on social media platforms or arrive in your email inbox, masquerading as legitimate offers from well-known companies. However, clicking on these links can have dire consequences, including unauthorized access to your personal information and financial accounts.

Understanding Cyber Threats

Cyber threats encompass a range of malicious activities carried out by individuals or groups to compromise your online security. These threats can result in financial loss, identity theft, or the compromise of sensitive personal information.

Cyber Threats During Festive Season

The festive season is a prime time for cybercriminals, as they know that more people are shopping online. The increased volume of online transactions creates more opportunities for these criminals to strike.

Common Cyber Threats

Phishing Attacks

Phishing attacks involve tricking individuals into revealing personal or financial information through deceptive emails or websites that appear legitimate. Cybercriminals may send emails that imitate popular retailers, enticing you to click on malicious links.

Phishing Attack Example:

Urgent Action Required – Verify Your Festive Season Order

Hello [Your Name],

We hope you're enjoying the festive season preparations. Our records indicate that you have an outstanding order that needs to be verified. Please click the link below to confirm your order details and complete the payment process.

[Malicious Link]

Thank you for choosing [Fake Retailer Name].

Best Regards,
Customer Support Team

This phishing email appears to be from a well-known retailer, but the link actually leads to a fake website designed to steal your personal and financial information.

Malware and Ransomware

Malware and ransomware are malicious software programs that can infect your device and either steal your data or hold it hostage until a ransom is paid. These threats can often be spread through seemingly harmless downloads or attachments.

Malware and Ransomware Example:

Important Festive Season Gift – Unwrap Now!

Hi there,

We've sent you a special festive season gift. Download and open the attached file to reveal your surprise!

[Attachment: festive_gift.exe]

Enjoy your holidays!

Best Regards,
[Malicious Sender]

The email contains a malicious attachment that, once opened, can infect your device with malware or ransomware, potentially leading to data loss or extortion.

Identity Theft

Identity theft is a growing concern, especially during the festive season. Cybercriminals can use stolen information to commit fraud, open fraudulent accounts, or make unauthorized purchases.

Identity Theft Example:

Festive Season Prize Winner Confirmation

Dear [Your Name],

Congratulations! You are the lucky winner of our festive season grand prize. To claim your award, please provide us with the following information:

- Full Name
- Home Address
- Social Security Number
- Credit Card Details

Reply to this email with your information, and we'll process your winnings.

Warm Regards,
[Scammer's Name]

This email is attempting to steal your personal and financial information for identity theft and fraudulent activities.

Fake Online Stores

Beware of fake online stores that mimic legitimate retailers. These sites can steal your payment information and deliver subpar or counterfeit products.

Fake Online Store Example:

Unbeatable Discounts on Festive Gifts!

Hello Shopper,

Discover the best festive season deals at [Fake Online Store]. We're offering jaw-dropping discounts on a wide range of products. Hurry and place your order today!

Visit our website: [Fake Online Store URL]

Happy Shopping!

Best Regards,
[Fake Store Name]

This message promotes a fake online store, which may take your payment information but never deliver the promised goods, or worse, compromise your financial security.

Remember, always exercise caution when you receive messages or emails, and verify the authenticity of the source before taking any action.

Staying Safe While Shopping Online

To ensure a safe online shopping experience, follow these guidelines:

Use Strong Passwords

Create unique, strong passwords for your online shopping accounts. Avoid using easily guessable information like birthdates or names.

Enable Two-Factor Authentication

Whenever possible, enable two-factor authentication for your online shopping accounts. This adds an extra layer of security.

Shop from Trusted Websites

Stick to well-known, trusted websites for your online shopping. Read reviews and check for secure payment options.

Be Cautious of Email Links

Don’t click on email links claiming to be from retailers, especially if they ask for personal information or prompt you to download files.

To protect yourself from falling victim to such cyber threats during the festive season, follow these essential tips:
  1. Verify the Source: Before clicking on any links or responding to offers, ensure that they are from legitimate sources. Check the website’s URL and sender’s email address for authenticity.
  2. Use Secure Payment Methods: Stick to trusted payment methods and avoid sharing sensitive financial information unless you are sure about the legitimacy of the transaction.
  3. Be Cautious with Personal Information: Be careful about sharing personal information, especially your banking details, and never respond to unsolicited requests for such data.
  4. Stay Informed: Keep up with the latest cybersecurity news and reports to stay informed about potential threats and scams.
  5. Enable Multi-Factor Authentication: Whenever possible, enable multi-factor authentication on your online accounts for an extra layer of security.

This festive season, while enjoying the convenience of online shopping and the excitement of discounts, also remember to stay vigilant and exercise caution to protect your personal and financial information from cybercriminals. A few extra steps to verify the authenticity of offers can go a long way in safeguarding your digital well-being.

Also READ: Access Inspect: A New Tool for Organizations to Manage Data Access

The Importance of Software Updates

Keep your operating system, browser, and antivirus software up to date. These updates often include security patches that protect your device from the latest threats.

Safe Payment Methods

Opt for secure payment methods like credit cards or payment gateways. They offer better protection against fraudulent transactions.

Recognizing Red Flags

Be alert for signs of suspicious activity, such as misspelled website addresses, unsecured payment pages, and deals that seem too good to be true.

Reporting Cyber Threats

If you encounter a cyber threat or suspicious activity while shopping online, report it to the respective authorities or the retailer immediately.


The festive season is a time of giving, but it’s also a time when cybercriminals are on the prowl. By understanding the common cyber threats and following the safety guidelines provided in this article, you can enjoy the convenience of online shopping without falling victim to malicious activities.


  1. How do cybercriminals target online shoppers during the festive season?
    Cybercriminals target online shoppers by using phishing emails, fake websites, and malware to steal personal and financial information.
  2. What should I do if I receive a suspicious email while shopping online?
    If you receive a suspicious email, do not click on any links or provide personal information. Instead, report it to the retailer and delete the email.
  3. Can using a VPN enhance online shopping security?
    Yes, using a VPN (Virtual Private Network) can add an extra layer of security by encrypting your online activities and masking your IP address.
  4. How can I verify the legitimacy of an online store?
    Look for reviews, check if the website uses secure payment methods, and confirm that the web address starts with “https://” and has a padlock icon in the browser’s address bar.
  5. Are mobile apps safer than websites for festive season shopping?
    Mobile apps can be safe if downloaded from official app stores, but you should still exercise caution and follow security best practices when using them for online shopping.

23andMe Data Breach: What You Need to Know

23andMe Data Breach: What You Need to Know

In a shocking turn of events, on October 10, 2023, a hacker claimed to have accessed millions of users’ information from the popular DNA testing company, 23andMe. This breach has raised concerns about the safety of our genetic data, which is highly personal and sensitive. While 23andMe initially denied any breach, they later confirmed that some user data was indeed exposed. What exactly was compromised and what can you do to protect yourself?

What Happened?

The hacker boasted about exploiting a vulnerability in 23andMe’s website to steal data. Initially, the company denied the breach, but later admitted that names, email addresses, dates of birth, and gender information had been exposed. Importantly, the hacker did not gain access to the genetic data of users, which is the most sensitive part of DNA testing.

Possible Impact of data breach

The breach is concerning because this information can be used for various purposes:

  1. Identity Theft: Hackers might try to steal your identity or commit fraud using this stolen data.
  2. Discrimination: Employers or insurance companies could misuse the data to discriminate against you. For example, you might be denied a job due to a genetic predisposition to a specific illness.
  3. Targeted Attacks: Criminals could exploit the data for blackmail or other malicious actions, threatening to reveal your genetic information to your employer or family.
Also READ: Report: Over 40,000 Admin Portal Accounts Use ‘admin’ as a Password
What Can You Do?

If you are a 23andMe user, there are steps you can take to protect yourself:

  1. Change Password and Enable Two-Factor Authentication: Make sure your account is secure by changing your password and using two-factor authentication.
  2. Monitor Your Finances: Keep a close eye on your credit reports and bank statements for any suspicious activities or transactions.
  3. Guard Your Personal Information: Be cautious about sharing personal information online, and be selective about what you disclose.
  4. Genetic Counseling: Consider contacting a genetic counselor who can provide information about the risks and benefits of genetic testing.


The 23andMe data breach serves as a stark reminder of the significance of safeguarding your genetic data. DNA information is exceptionally sensitive and can have various uses, both positive and negative. Before entrusting your genetic data to any company, it’s vital to be aware of the potential risks and benefits of genetic testing. Your data is precious, so take steps to protect it from falling into the wrong hands.

Report: Over 40,000 Admin Portal Accounts Use ‘admin’ as a Password

Report: Over 40,000 Admin Portal Accounts Use 'admin' as a Password

A recent report by cybersecurity company Outpost24 has unearthed a disturbing security risk that continues to plague the online world. Brace yourself for a shocking revelation: over 40,000 admin portal accounts still use the default password “admin.” This alarming discovery underscores the urgent need for stronger password security measures and increased awareness among IT administrators. In this article, we delve into the disturbing findings, the consequences of weak admin portal passwords, and how to protect your admin portal effectively.

The Disturbing Findings

The study conducted by Outpost24 was an eye-opener. They analyzed more than 1.8 million administrator credentials collected from information-stealing malware, which typically targets applications that store usernames and passwords. The most shocking discovery was the widespread use of the default password “admin,” found in over 40,000 instances. This revelation is a major red flag, as it leaves countless systems and sensitive data vulnerable to attackers.

But “admin” is not the only weak link in the security chain. The report also identified other commonly used weak passwords such as “password,” “123456,” and “qwerty.” These simple passwords can be easily guessed by malicious actors or even exploited through brute-force attacks and phishing tactics.

The Consequences of Weak Admin Portal Passwords

The consequences of weak admin portal passwords are severe. Once attackers gain access to such accounts, they can wreak havoc on an organization’s systems and data. This could lead to data theft, the installation of malware, or the launching of attacks against other systems, potentially causing widespread damage and loss.

Protecting Admin Portal Accounts

In light of these findings, IT administrators are urged to take immediate action to enhance the security of their admin portal accounts. Here are some critical steps they can take:

1. Use Strong, Unique Passwords

IT administrators must ensure that all accounts are protected by strong, unique passwords. A strong password should be at least 12 characters long and include a combination of upper and lowercase letters, numbers, and symbols. Avoid using easily guessable patterns or dictionary words.

2. Implement Multi-Factor Authentication (MFA)

MFA adds an extra layer of security by requiring users to enter a code from their mobile device in addition to their password when logging in. This greatly enhances the security of admin portal accounts.

3. Regularly Review and Update Password Policies

Password policies should be strong and up-to-date. These policies should be consistently enforced for all accounts, ensuring that all users follow best practices.

4. Use a Password Manager

IT administrators should consider using a password manager to generate and store strong, unique passwords for all accounts. A password manager simplifies the process of using strong passwords while keeping them safe and secure.

5. Educate Users

IT administrators should educate all users on password security best practices. This includes teaching them how to create strong passwords and avoid common password mistakes.

Also READ: Access Inspect: A New Tool for Organizations to Manage Data Access
ALSO READ: India Gears Up for Cyber War with Specialized ‘Cyber Commando’ Unit


The prevalence of admin portal accounts using “admin” as a password is a major security risk that organizations cannot afford to ignore. Strengthening password security and enhancing awareness among IT administrators and users are crucial steps in safeguarding against potential security breaches. By following these recommendations and taking proactive measures, IT administrators can fortify their admin portal accounts, reduce the risk of unauthorized access, and significantly lower the chances of security breaches. In an era where cybersecurity is paramount, these actions are vital for the protection of sensitive data and the integrity of organizational systems.


1. Why are weak passwords such a significant security risk?

Weak passwords are easy for malicious actors to guess or crack, giving them access to sensitive systems and data. This can lead to data breaches and other security incidents.

2. What makes a password strong and secure?

A strong password is typically at least 12 characters long and includes a mix of uppercase and lowercase letters, numbers, and special symbols.

3. How does Multi-Factor Authentication (MFA) enhance security?

MFA requires users to provide an additional verification step, usually a code from their mobile device, along with their password, making it much harder for unauthorized access.

4. What are some common mistakes people make with passwords?

Common password mistakes include using easily guessable passwords, reusing passwords across multiple accounts, and not regularly updating passwords.

5. Is using a password manager safe?

Yes, using a reputable password manager is a safe and secure way to generate, store, and manage strong and unique passwords for various accounts.

Be updated related to Cyber News and Hacker News with us to safeguard yourself in this digital world!!

India Gears Up for Cyber War with Specialized ‘Cyber Commando’ Unit


As India prepares to confront the growing sophistication of cyber threats, the central government is taking proactive steps to establish a dedicated unit of ‘cyber commandos’ sourced from police forces across states, Union Territories, and central police organizations. The Ministry of Home Affairs (MHA) has recently issued a directive to all states and Union Territories, urging them to identify ten suitable candidates for this specialized unit.

In the face of the ever-growing sophistication of cyber threats, the Indian central government is taking proactive measures to establish a dedicated unit of ‘cyber commandos.’ These elite professionals will be drawn from police forces across states, Union Territories, and central police organizations. The Ministry of Home Affairs (MHA) has recently issued a directive to all states and Union Territories, urging them to identify ten suitable candidates for this specialized unit.

Prime Minister’s Vision for Enhanced Cybersecurity

The concept of a ‘cyber commando’ wing was first introduced earlier this year during the DGPs/IGPs Conference, with Prime Minister Narendra Modi passionately advocating for its creation. The vision behind this initiative is to strengthen cyber defense capabilities, protect information technology networks, and conduct thorough investigations in cyberspace.

Strengthening the Nation’s Cyber Defense

The recent communication from the MHA underscores the crucial role of the proposed specialized wing. It emphasizes that the cyber commando wing will be instrumental in countering cyber threats, safeguarding IT networks, and conducting cyber investigations. The selected commandos will be chosen based on their proficiency and aptitude in IT security and digital forensics.

A Comprehensive Training Program

The envisioned cyber commando wing will become an integral part of police organizations, consisting of skilled and well-equipped personnel from various states, Union Territories, and central police organizations. The MHA letter indicates that these ‘cyber commandos’ will undergo specialized residential training, ensuring they are equipped to respond effectively to cyber threats and incidents. The training will be conducted in collaboration with top institutions and the Indian Cyber Crime Coordination Centre (14C), MHA.

Empowering the Cyber Commandos

The selected commandos will receive extensive training and the necessary tools to effectively combat and counter cyber threats. They will also be entrusted with the critical responsibility of safeguarding the nation’s cyber infrastructure. While these ‘cyber commandos’ will primarily serve their parent organizations, they may be requisitioned for national duties during urgent situations.

Identifying the Future Cyber Commandos

In light of this initiative, the MHA has called upon all police organizations to identify at least ten candidates possessing basic knowledge of computer networks and operating systems. The objective is to form a pool of adept individuals who can contribute effectively to the cyber commando wing.

India’s Commitment to Cybersecurity

This strategic move underscores India’s commitment to fortifying its cybersecurity measures, aligning with the evolving cyber landscape. Stay tuned for further updates on the development and deployment of the cyber commando wing, which is poised to significantly bolster the nation’s cybersecurity posture.

Also READ: Access Inspect: A New Tool for Organizations to Manage Data Access


In conclusion, as India confronts the growing sophistication of cyber threats, the establishment of a specialized unit of cyber commandos is a significant step towards enhancing the nation’s cybersecurity. These elite professionals, drawn from police forces across the country, will play a crucial role in safeguarding IT networks, investigating cybercrimes, and countering emerging cyber threats. This strategic move underscores India’s commitment to securing its digital infrastructure and aligning with the changing cybersecurity landscape. Stay tuned for further updates on the development and deployment of the cyber commando wing, which is poised to significantly bolster the nation’s cybersecurity posture.


  1. What is the role of a cyber commando?
    A cyber commando’s role is to protect IT networks, investigate cybercrimes, and counter cyber threats effectively.
  2. Who can become a cyber commando?
    Police personnel with proficiency in IT security and digital forensics can become cyber commandos.
  3. Where will the cyber commandos receive their training?
    Cyber commandos will undergo specialized training in collaboration with top institutions and the Indian Cyber Crime Coordination Centre.
  4. What is the objective of forming a pool of candidates with basic IT knowledge?
    The objective is to have a group of individuals ready to join the cyber commando wing and contribute to national cybersecurity.
  5. Why is India investing in cybersecurity measures?
    India is investing in cybersecurity measures to fortify its defenses in the face of evolving cyber threats, ensuring the nation’s digital infrastructure remains secure.

Access Inspect: A New Tool for Organizations to Manage Data Access

Access Inspect: A New Tool for Organizations to Manage Data Access

In our increasingly interconnected world, data stands as a valuable asset for organizations. Safeguarding sensitive information and adhering to data protection regulations have become top priorities. Enter Access Inspect, an advanced tool meticulously crafted to empower organizations in taking command of their data access, pinpoint security vulnerabilities, and align seamlessly with data security regulations. In this article, we will delve into the essential features, advantages, and practical applications of Access Inspect.

Access Inspect: An Overview

Access Inspect is a versatile data access tracking tool that excels in scanning various systems and devices, including Windows, Linux, macOS, and cloud platforms. Its primary function is to scrutinize permissions on files, folders, and applications within a system, subsequently generating detailed reports that provide insights into who has access to specific data items. What sets Access Inspect apart is its ability to offer flexible filtering options, making it an indispensable asset for organizations looking to manage data access effectively.

How Access Inspect Works

Access Inspect operates by thoroughly scanning the permissions associated with files, folders, and applications on a system, allowing organizations to gain deep insights into their data access landscape. Here’s a closer look at how this remarkable tool functions:

1. Active Directory Scanning: Access Inspect utilizes Active Directory to identify users and groups within the network. It delves into the permissions associated with these entities, providing a comprehensive view of who has access to what.

2. Local Security Accounts Examination: In addition to Active Directory, Access Inspect also scans local security accounts. This ensures that even users who may not be part of a centralized directory, such as guest accounts or local administrators, are accounted for. The tool assesses their permissions, leaving no stone unturned.

3. File System Permission Analysis: One of Access Inspect’s core functions is scanning the file system itself. It meticulously examines the permissions assigned to each file and folder, allowing organizations to identify any potential security gaps or areas where access control can be improved.

4. Cloud Platform Permissions Assessment: Access Inspect goes beyond traditional on-premises systems. It can scan cloud platforms like AWS and Azure, uncovering the permissions associated with files and folders stored in the cloud. This comprehensive approach ensures that no aspect of an organization’s data access goes unnoticed.

5. Report Generation and Customization: Once Access Inspect has completed its scans, it compiles all the collected data into a comprehensive report. This report is highly customizable, enabling organizations to focus on specific users, groups, or types of permissions based on their unique needs.

power organizations in taking command of their data access, pinpoint security vulnerabilities, and align seamlessly with data security regulations. In this article, we will delve into the essential features, advantages, and practical applications of Access Inspect.

How does Access Inspect Works.

Here is an example of how Access Inspect can be used:

Scenario: A company seeks to bolster the security of its customer data by identifying and controlling access to this sensitive information.

How Access Inspect Helps:

  1. Scanning for Insights: The company employs Access Inspect to scan its systems, including Active Directory, local security accounts, file system permissions, and cloud platforms. This in-depth examination ensures that all data access points are thoroughly assessed.
  2. Customized Reporting: Access Inspect generates a detailed report that pinpoints who has access to which files and folders, including customer data. This report can be tailored to display only the relevant information needed to address the specific security concern.
  3. Taking Action: Armed with the insights from the report, the company can now take proactive steps to enhance data security. This might involve revoking permissions from unauthorized users or groups and implementing additional security measures, such as multi-factor authentication
ALSO READ: CISA Warns of Active Exploits for JetBrains and Windows

Benefits of Access Inspect

  1. Improved Visibility into Data Access

One of the most significant advantages of Access Inspect is its ability to provide organizations with improved visibility into data access. It allows users to pinpoint who has access to specific data, thereby helping to identify potential security vulnerabilities and unauthorized access.

  1. Reduced Risk of Data Breaches

Data breaches can be catastrophic for any organization. Access Inspect plays a pivotal role in mitigating this risk by continuously monitoring and tracking data access. With this tool in place, organizations can promptly identify and rectify any instances of unauthorized access, significantly reducing the risk of data breaches.

  1. Enhanced Compliance

Regulatory compliance is a critical aspect of data management. Access Inspect simplifies the process by generating reports that aid organizations in adhering to data security regulations such as the General Data Protection Regulation (GDPR). This capability is invaluable for organizations operating in regions with strict data protection requirements.

Features of Access Inspect

  1. Comprehensive Scanning

Access Inspect is not limited by platform or system. It can comprehensively scan a wide range of systems and devices, ensuring that organizations can track data access across their entire infrastructure, regardless of the operating system or cloud platform in use.

  1. Detailed Reports

The tool’s ability to generate detailed reports is a standout feature. These reports provide granular insights into who has access to specific files, folders, and applications. This level of detail empowers organizations to make informed decisions about data access and security.

  1. Flexible Filtering

Access Inspect offers flexibility in reporting by allowing users to apply filters. Whether organizations want to focus on specific users or groups or need to analyze particular types of permissions, Access Inspect caters to their needs. This flexibility makes it a versatile tool that adapts to various use cases.

  1. Compliance Reporting

For organizations grappling with complex data security regulations, Access Inspect simplifies compliance reporting. The tool can generate reports that specifically address the requirements of regulations like GDPR, easing the burden of compliance for organizations in highly regulated industries.

Real-World Applications

Access Inspect finds application across a spectrum of industries and use cases:

  1. Protecting Customer Data: Companies can leverage Access Inspect to identify which employees have access to sensitive customer data, ensuring that only authorized personnel can access this information.
  2. Financial Data Security: Financial services organizations can use Access Inspect to maintain strict control over who can access critical financial data, thereby reducing the risk of data breaches and compliance violations.
  3. Healthcare Compliance: Healthcare organizations can utilize Access Inspect to comply with the stringent Health Insurance Portability and Accountability Act (HIPAA) regulations, safeguarding patient data.
  4. Government Security: Government agencies can employ Access Inspect to ensure compliance with stringent security regulations, fortifying their data protection measures.
ALSO READ: MGM Resorts: Devastated by $100M Cyberattack


Access Inspect emerges as a powerful ally in the ongoing battle to secure sensitive data and maintain compliance with data protection regulations. Its comprehensive scanning capabilities, detailed reporting features, and flexible filtering options make it an indispensable tool for organizations of all sizes and across various industries. By investing in Access Inspect, organizations can bolster their data security posture, minimize the risk of data breaches, and navigate the complex landscape of data security regulations with confidence.


  1. What is Access Inspect, and how does it work?
    Access Inspect is a data access tracking tool that scans permissions on files, folders, and applications, generating reports to monitor and manage data access across different systems and devices.
  2. How does Access Inspect improve data security?
    Access Inspect enhances data security by identifying security risks, unauthorized access, and potential breaches, helping organizations take prompt action to strengthen their data security.
  3. Can Access Inspect assist with regulatory compliance?
    Yes, Access Inspect generates reports tailored to specific regulations, simplifying compliance efforts, such as GDPR, and helping organizations avoid penalties.
  4. What systems and devices can Access Inspect scan?
    Access Inspect can scan Windows, Linux, macOS, and various cloud platforms, providing comprehensive data access tracking capabilities.
  5. How does Access Inspect offer flexible reporting?
    Access Inspect allows users to filter reports by users, groups, or permissions, adapting to unique data access monitoring requirements for different use case

MGM Resorts: Devastated by $100M Cyberattack

MGM Resorts

MGM Attack and Its Aftermath

MGM Resorts International detected the cyberattack and promptly took action by shutting down its systems to contain the damage. While the exact nature and extent of the data breach were not disclosed, the company is working closely with law enforcement agencies and cybersecurity experts to thoroughly investigate the incident. In addition to the immediate impact, MGM also anticipates incurring a one-time cost of less than $10 million for the quarter that ended on September 30th.

The Wider Implications

The repercussions of this cyberattack are expected to reverberate through the organization. Firstly, the financial toll of $100 million is a significant setback for MGM Resorts International. However, this may just be the tip of the iceberg. The company could potentially face additional expenses in the form of legal fees and regulatory fines as the full scope of the breach is unraveled.

MGM Resorts Trust at Stake

Beyond the financial losses, MGM’s reputation and customer trust are also on the line. In a world where data security is paramount, customers need to have confidence that their personal information is safeguarded. If this trust is compromised, it could lead to a decline in visitors to MGM’s hotels and a decrease in patronage at their casinos.

The Broader Context

The MGM cyberattack is not an isolated incident. It joins a growing list of high-profile data breaches that have shaken major corporations in recent years. Equifax, Target, and Uber are just a few of the well-known companies that have fallen victim to cyberattacks, highlighting the pervasive and persistent threat of cybercrime.

The Imperative of Cybersecurity

This incident serves as a sobering reminder that businesses of all sizes must prioritize cybersecurity. It’s no longer a matter of if, but when a cyberattack will occur. To protect their data and maintain the trust of their customers, companies must invest in cutting-edge cybersecurity technology, ensure that their employees are well-versed in cybersecurity best practices, and have a well-defined plan in place to respond swiftly and effectively to any cyber threats that may arise.


In conclusion, MGM Resorts International’s $100 million cyberattack serves as a stark reminder of the pervasive threat of cybercrime. Beyond the financial hit, the breach puts MGM’s reputation and customer trust at risk. This incident underscores the urgent need for businesses to prioritize cybersecurity, invest in advanced protection measures, and proactively safeguard sensitive data to maintain customer confidence in an increasingly digital world.


1. How did MGM Resorts International respond to the cyberattack?

MGM Resorts International responded by promptly shutting down its systems to contain the damage and is working with law enforcement and cybersecurity experts to investigate the incident.

2. What is the financial impact of the cyberattack on MGM?

MGM expects a $100 million hit to its third-quarter results and an additional one-time cost of less than $10 million for the quarter ending on September 30th.

3. How can businesses protect themselves from cyberattacks?

Businesses can protect themselves by investing in cybersecurity technology, providing cybersecurity training to employees, and having a comprehensive plan in place to respond to cyber threats.

4. Are data breaches becoming more common among major corporations?

Yes, data breaches have become increasingly common among major corporations in recent years, with companies like Equifax, Target, and Uber falling victim to cyberattacks.

5. How can MGM Resorts International rebuild customer trust after the cyberattack?

To rebuild customer trust, MGM will need to implement robust cybersecurity measures, communicate transparently about its efforts to enhance security, and take steps to ensure the safety of customer data in the future.

For regular updates on hacker and cyber security news follow our website.