Norway says Ivanti zero-day was used to hack govt IT systems

Teilen:

The Norwegian National Security Authority (NSM) has confirmed that attackers used a zero-day vulnerability in Ivanti’s Endpoint Manager Mobile (EPMM) solution to breach a software platform used by 12 ministries in the country.

The Norwegian Security and Service Organization (DSS) sagte on Monday that the cyberattack did not affect Norway’s Prime Minister’s Office, the Ministry of Defense, the Ministry of Justice, and the Ministry of Foreign Affairs.

The Norwegian Data Protection Authority (DPA) was also notified about the incident, indicating that the hackers might have gained access to and/or exfiltrated sensitive data from compromised systems, leading to a data breach.

“This vulnerability was unique, and was discovered for the very first time here in Norway. If we had released the information about the vulnerability too early, it could have contributed to it being misused elsewhere in Norway and in the rest of the world,” the NSM sagte.

“The update is now generally available and it is prudent to announce what kind of vulnerability it is, says Sofie Nystrøm, director of the National Security Agency.

The Norwegian National Cyber ​​Security Center (NCSC) also notified all known MobileIron Core customers in Norway about the existence of a security update to address this actively exploited zero-day bug (tracked as CVE-2023-35078).

As a recommendation, the NCSC urged these system owners to install security updates to block incoming attacks as soon as possible.

Actively exploited authentication bypass vulnerability

Die CVE-2023-35078 security bug is an authentication bypass vulnerability that impacts all supported versions of Ivanti’s Endpoint Manager Mobile (EPMM) mobile device management software (formerly MobileIron Core), as well as unsupported and end-of-life releases.

Successful exploitation allows remote threat actors to access specific API paths without requiring authentication.

“An attacker with access to these API paths can access personally identifiable information (PII) such as names, phone numbers, and other mobile device details for users on a vulnerable system,” the U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned in an advisory published on Monday.

“An attacker can also make other configuration changes, including creating an EPMM administrative account that can make further changes to a vulnerable system.”

The company has confirmed that the zero-day is being exploited in attacks and also warned customers that it’s critical to “immediately take action to ensure you are fully protected.

According to Shodan’s Internet exposure scanning platform, more than 2,900 MobileIron user portals are presently exposed online, out of which around three dozen are linked with U.S. local and state government agencies.

MobileIron user portals exposed on the Internet
MobileIron user portals exposed on the Internet (Shodan)

​Most of these exposed servers are in the United States, with other notable locations including Germany, the United Kingdom, and Hong Kong.

In light of this, it is crucial for all network administrators to promptly install the latest Ivanti Endpoint Manager Mobile (MobileIron) patches to protect their systems from attacks.

Norway has disclosed other cyberattacks in which Chinese and Russian state hackers targeted its government websites and the country’s parliament.

Last year, in June, the NSM said that Russian hacktivists took down multiple Norwegian government websites in DDoS attacks.

In March 2021, the Chinese state-sponsored Hafnium hacking group was linked to another incident in which they breached the systems of Norway’s parliament and stole data by exploiting ProxyLogon Microsoft Exchange vulnerabilities.

In another attack from August 2020, multiple Norwegian Parliament email accounts on August were brute-forced. This incident was linked by Norway’s Minister of Foreign Affairs in December 2020 to the Russian APT 28 state-sponsored hacking group.

 

(c) Sergiu Gatlan

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
7:57 am, Juni 1, 2025
Wetter-Symbol 15°C
L: 14° | H: 15°
overcast clouds
Luftfeuchtigkeit: 78 %
Druck: 1014 mb
Wind: 10 mph WNW
Windböe: 20 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 100%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:49 am
Sonnenuntergang: 9:07 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
14° | 15°°C 0 mm 0% 14 mph 71 % 1014 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
11° | 21°°C 0 mm 0% 12 mph 82 % 1019 mb 0 mm/h
Di. Juni 03 10:00 pm
Wetter-Symbol
11° | 19°°C 1 mm 100% 17 mph 89 % 1013 mb 0 mm/h
Mi. Juni 04 10:00 pm
Wetter-Symbol
9° | 17°°C 0.61 mm 61% 13 mph 79 % 1011 mb 0 mm/h
Do. Juni 05 10:00 pm
Wetter-Symbol
11° | 17°°C 1 mm 100% 15 mph 96 % 1010 mb 0 mm/h
Today 10:00 am
Wetter-Symbol
15° | 16°°C 0 mm 0% 10 mph 71 % 1014 mb 0 mm/h
Today 1:00 pm
Wetter-Symbol
16° | 17°°C 0 mm 0% 12 mph 52 % 1014 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
16° | 16°°C 0 mm 0% 14 mph 36 % 1013 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
15° | 15°°C 0 mm 0% 12 mph 51 % 1013 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
16° | 16°°C 0 mm 0% 9 mph 70 % 1014 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
13° | 13°°C 0 mm 0% 7 mph 82 % 1016 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
11° | 11°°C 0 mm 0% 6 mph 78 % 1017 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
12° | 12°°C 0 mm 0% 8 mph 71 % 1019 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€91,975.90
0.50%
Ethereum(ETH)
€2,217.58
-0.28%
Fesseln(USDT)
€0.88
0.00%
XRP(XRP)
€1.91
1.33%
Solana(SOL)
€136.71
-0.01%
USDC(USDC)
€0.88
0.00%
Dogecoin(DOGE)
€0.167734
0.16%
Shiba Inu(SHIB)
€0.000011
2.28%
Pepe(PEPE)
€0.000011
2.49%
Peanut das Eichhörnchen(PNUT)
€0.229814
3.10%
Nach oben scrollen