U.S. Charges Chinese Hacker for Exploiting Zero-Day in 81,000 Sophos Firewalls

Share:

The U.S. government on Tuesday unsealed charges against a Chinese national for allegedly breaking into thousands of Sophos firewall devices globally in 2020.

Guan Tianfeng (aka gbigmao and gxiaomao), who is said to have worked at Sichuan Silence Information Technology Company, Limited, has been charged with conspiracy to commit computer fraud and conspiracy to commit wire fraud. Guan has been accused of developing and testing a zero-day security vulnerability used to conduct the attacks against Sophos firewalls.

“Guan Tianfeng is wanted for his alleged role in conspiring to access Sophos firewalls without authorization, cause damage to them, and retrieve and exfiltrate data from both the firewalls themselves and the computers behind these firewalls,” the U.S. Federal Bureau of Investigation (FBI) said. “The exploit was used to infiltrate approximately 81,000 firewalls.”

The then-zero-day vulnerability in question is CVE-2020-12271 (CVSS score: 9.8), a severe SQL injection flaw that could be exploited by a malicious actor to achieve remote code execution on susceptible Sophos firewalls.

In a series of reports published in late October 2024 under the name Pacific Rim, Sophos revealed that it had received a “simultaneously highly helpful yet suspicious” bug bounty report about the flaw in April 2020 from researchers associated with Sichuan Silence’s Double Helix Research Institute, one day after which it was exploited in real-world attacks to steal sensitive data using the Asnarök trojan, including usernames and passwords.

It happened a second time in March 2022 when the company received yet another report from an anonymous China-based researcher detailing two separate flaws: CVE-2022-1040 (CVSS score: 9.8), a critical authentication bypass issue in Sophos firewalls that allows a remote attacker to execute arbitrary code, and CVE-2022-1292 (CVSS score: 9.8), a command injection bug in OpenSSL The in-the-wild exploitation of CVE-2022-1040 has been tied to two different activity clusters tracked as Personal Panda and TStark.

Sophos told The Hacker News that exactly who the researcher is and their attribution to a specific entity is unknown at this stage. It’s also worth pointing out that both Personal Panda and TStark (which overlaps with Evil Eye), despite exhibiting different tradecraft and indicators of compromise (IoCs), targeted the same Tibetan-related organization 18 months apart.

“Guan and his co-conspirators designed the malware to steal information from firewalls,” the U.S. Department of Justice (DoJ) said. “To better hide their activity, Guan and his co-conspirators registered and used domains designed to look like they were controlled by Sophos, such as sophosfirewallupdate[.]com.”

The threat actors then moved to modify their malware as Sophos began to enact countermeasures, deploying a Ragnarok ransomware variant in the event victims attempted to remove the artifacts from infected Windows systems. These efforts were unsuccessful, the DoJ said.

Concurrent with the indictment, the U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) has imposed sanctions against Sichuan Silence and Guan, stating many of the victims were U.S. critical infrastructure companies.

Sichuan Silence has been assessed to be a Chengdu-based cybersecurity government contractor that offers its services to Chinese intelligence agencies, equipping them with capabilities to conduct network exploitation, email monitoring, brute-force password cracking, and public sentiment suppression. It’s also said to provide clients with equipment designed to probe and exploit target network routers.

In December 2021, Meta said it removed 524 Facebook accounts, 20 Pages, four Groups, and 86 accounts on Instagram associated with Sichuan Silence that targeted English- and Chinese-speaking audiences with COVID-19 related disinformation.

“More than 23,000 of the compromised firewalls were in the United States. Of these firewalls, 36 were protecting U.S. critical infrastructure companies’ systems,” the Treasury said. “If any of these victims had failed to patch their systems to mitigate the exploit, or cybersecurity measures had not identified and quickly remedied the intrusion, the potential impact of the Ragnarok ransomware attack could have resulted in serious injury or the loss of human life.”

Separately, the Department of State has announced rewards of up to $10 million for information about Sichuan Silence, Guan, or other individuals who may be participating in cyber attacks against U.S. critical infrastructure entities under the direction of a foreign government.

“The scale and persistence of Chinese nation-state adversaries poses a significant threat to critical infrastructure, as well as unsuspecting, everyday businesses,” Ross McKerchar, chief information security officer at Sophos, said in a statement shared with The Hacker News.

“Their relentless determination redefines what it means to be an Advanced Persistent Threat; disrupting this shift demands individual and collective action across the industry, including with law enforcement. We can’t expect these groups to slow down, if we don’t put the time and effort into out-innovating them, and this includes early transparency about vulnerabilities and a commitment to develop stronger software.”

Source

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
4:18 pm, Mar 27, 2025
weather icon 14°C
L: 14° | H: 14°
clear sky
Humidity: 71 %
Pressure: 1018 mb
Wind: 11 mph W
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 9%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 5:46 am
Sunset: 6:24 pm
DailyHourly
Daily ForecastHourly Forecast
Today 9:00 pm
weather icon
10° | 14°°C 0 mm 0% 7 mph 80 % 1017 mb 0 mm/h
Tomorrow 9:00 pm
weather icon
8° | 12°°C 1 mm 100% 14 mph 89 % 1016 mb 0 mm/h
Sat Mar 29 9:00 pm
weather icon
4° | 13°°C 0 mm 0% 8 mph 78 % 1023 mb 0 mm/h
Sun Mar 30 9:00 pm
weather icon
7° | 18°°C 0 mm 0% 10 mph 88 % 1025 mb 0 mm/h
Mon Mar 31 9:00 pm
weather icon
8° | 15°°C 0 mm 0% 8 mph 82 % 1028 mb 0 mm/h
Today 6:00 pm
weather icon
14° | 14°°C 0 mm 0% 7 mph 65 % 1017 mb 0 mm/h
Today 9:00 pm
weather icon
10° | 10°°C 0 mm 0% 7 mph 80 % 1017 mb 0 mm/h
Tomorrow 12:00 am
weather icon
10° | 10°°C 0 mm 0% 7 mph 81 % 1015 mb 0 mm/h
Tomorrow 3:00 am
weather icon
9° | 9°°C 0 mm 0% 8 mph 83 % 1013 mb 0 mm/h
Tomorrow 6:00 am
weather icon
9° | 9°°C 0 mm 0% 9 mph 87 % 1012 mb 0 mm/h
Tomorrow 9:00 am
weather icon
10° | 10°°C 0.99 mm 99% 9 mph 89 % 1011 mb 0 mm/h
Tomorrow 12:00 pm
weather icon
12° | 12°°C 1 mm 100% 12 mph 57 % 1012 mb 0 mm/h
Tomorrow 3:00 pm
weather icon
12° | 12°°C 0 mm 0% 14 mph 39 % 1012 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€80,924.77
0.52%
Ethereum(ETH)
€1,866.68
-0.15%
Tether(USDT)
€0.93
-0.03%
XRP(XRP)
€2.18
-2.64%
Solana(SOL)
€128.45
-0.81%
USDC(USDC)
€0.93
0.00%
Dogecoin(DOGE)
€0.178911
-1.81%
Shiba Inu(SHIB)
€0.000013
-2.46%
Pepe(PEPE)
€0.000008
-2.09%
Peanut the Squirrel(PNUT)
€0.213778
7.85%
Scroll to Top