November 26, 2020

Volume X, Number 331

Advertisement

November 25, 2020

Subscribe to Latest Legal News and Analysis

November 24, 2020

Subscribe to Latest Legal News and Analysis

November 23, 2020

Subscribe to Latest Legal News and Analysis

NSA Issues List of Vulnerabilities Used by Chinese Backed Hackers

The National Security Agency (NSA) issued a Cybersecurity Advisory on October 20, 2020, entitled “Chinese State-Sponsored Actors Exploit Publicly Known Vulnerabilities,” alerting IT professionals to 25 vulnerabilities that Chinese state-sponsored hackers are using against U.S. businesses that “can be exploited to gain initial access to victim networks using products that are directly accessible from the internet and act as gateways to internal networks.” The Advisory is designed to share information with security professionals to urge them to update systems to protect against the attacks.

According to the notice, “[W]e hope that by highlighting the vulnerabilities that China is actively using to compromise systems, cybersecurity professionals will gain actionable information to prioritize efforts and secure their systems.”

The 25 vulnerabilities can be accessed here:

The Advisory further provides general mitigation steps that companies can employ:

  • “Keep systems and products updated and patched as soon as possible after patches are released.
  • Expect that data stolen or modified (including credentials, accounts, and software) before the device was patched will not be alleviated by patching, making password changes and reviews of accounts a good practice.

  • Disable external management capabilities and set up an out-of-band management network.

  • Block obsolete or unused protocols at the network edge and disable them in device configurations.

  • Isolate Internet-facing services in a network Demilitarized Zone (DMZ) to reduce the exposure of the internal network.

  • Enable robust logging of Internet-facing services and monitor the logs for signs of compromise.”

The vulnerabilities are listed in detail in the Advisory and companies may wish to confirm that all of the vulnerabilities listed have been patched on their systems.

Copyright © 2020 Robinson & Cole LLP. All rights reserved.National Law Review, Volume X, Number 296
Advertisement

TRENDING LEGAL ANALYSIS

Advertisement
Advertisement

About this Author

Linn F. Freedman, Robinson Cole Law Firm, Cybersecurity and Litigation Law Attorney, Providence
Partner

Linn Freedman practices in data privacy and security law, cybersecurity, and complex litigation. She provides guidance on data privacy and cybersecurity compliance to a full range of public and private clients across all industries, such as construction, education, health care, insurance, manufacturing, real estate, utilities and critical infrastructure, marine, and charitable organizations. Linn is a member of the firm's Business Litigation Group and chairs its Data Privacy + Cybersecurity Team. She is also a member of the Financial Services Cyber-Compliance Team (CyFi ...

401-709-3353
Advertisement
Advertisement