Networking device manufacturer Zyxel has issued an alert to warn customers of attacks targeting a subset of security appliances that have remote management or SSL VPN enabled.
In the letter sent to customers, a copy of which security researcher JAMESWT shared on Twitter, the company says that a sophisticated threat actor is targeting USG/ZyWALL, USG FLEX, ATP, and VPN series devices running on-premises ZLD firmware.
The company said that the threat actor attempts to access the target devices through WAN and, if they succeed, they then bypass authentication to establish SSL VPN channels.
To ensure their activity can continue unhindered, the adversary uses a series of user accounts that include “zyxel_silvpn,” “zyxel_ts,” or “zyxel_vpn_test,” which are used to manipulate the device’s configuration.
[ Related: Backdoors Found in Zyxel CloudCNM SecuManager Software ]
Zyxel says that the company has launched an investigation into the attacks and that it is working to resolve the issue.
“Based on our investigation so far, we believe maintaining a proper security policy for remote access is currently the most effective way to reduce the attack surface,” the company said.
The company did not say whether the attackers are targeting known or new vulnerabilities in the enterprise appliances.
In January, the company announced a patch for a hardcoded credentials vulnerability in these devices and other models, which threat actors started targeting almost immediately in attacks.
To stay protected in the work-from-home era, Zyxel recommends keeping connected to the Internet only those applications and services that are mandatory for remote access, as well as configuring the perimeter firewall based on the least privilege principle and keeping devices patched at all times.
Related: Many Backdoors Found in Zyxel CloudCNM SecuManager Software
Related: Over 20 Zyxel Firewalls Impacted by Recent Zero-Day Vulnerability
Related: Zyxel Patches Zero-Day Vulnerability in Network Storage Products

More from Ionut Arghire
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Atlassian Warns of Critical Jira Service Management Vulnerability
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- Google Shells Out $600,000 for OSS-Fuzz Project Integrations
- F5 BIG-IP Vulnerability Can Lead to DoS, Code Execution
- Flaw in Cisco Industrial Appliances Allows Malicious Code to Persist Across Reboots
- HeadCrab Botnet Ensnares 1,200 Redis Servers for Cryptomining
- Malicious NPM, PyPI Packages Stealing User Information
Latest News
- Big China Spy Balloon Moving East Over US, Pentagon Says
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Cyber Insights 2023: Venture Capital
- Atlassian Warns of Critical Jira Service Management Vulnerability
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- China Says It’s Looking Into Report of Spy Balloon Over US
- GoAnywhere MFT Users Warned of Zero-Day Exploit
