Chinese hackers scanning, exploiting Cisco ASA firewalls used by governments worldwide
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。用户已经提供了文章内容,看起来是关于中国黑客攻击思科防火墙的事件。 首先,我要通读整篇文章,抓住主要信息。文章提到中国黑客组织Storm-1849正在扫描和利用思科ASA防火墙的漏洞,这些设备被美国、欧洲和亚洲的政府使用。Palo Alto Networks的Unit 42团队跟踪了这一活动,并指出攻击在10月期间针对美国金融机构、国防承包商和军事组织,以及其他国家的政府机构。CISA发布了紧急指令要求修复漏洞,但黑客似乎没有被阻止。 接下来,我需要将这些信息浓缩到100字以内。要确保涵盖关键点:中国黑客、思科防火墙漏洞、攻击目标(政府机构)、CISA的行动以及持续的威胁。 可能会遗漏一些细节,比如攻击的时间段或具体的漏洞编号,但这些不是最关键的信息。重点在于事件本身及其影响。 最后,组织语言,确保简洁明了。避免使用复杂的术语,让总结易于理解。 </think> 中国黑客组织针对思科防火墙漏洞展开攻击活动,目标包括美欧亚多国政府及金融机构。 2025-10-31 17:46:26 Author: therecord.media(查看原文) 阅读量:18 收藏

China-based hackers are scanning for and exploiting a popular line of Cisco firewalls used by governments in the U.S., Europe and Asia. 

Incident responders from Palo Alto Networks’ Unit 42 have been tracking the targeting of Cisco Adaptive Security Appliances (ASA) — popular devices used by governments and large businesses to consolidate several different security tasks into a single appliance. In addition to acting as firewalls, the appliances also prevent some intrusions, handle spam, conduct antivirus checks and more.

In a report shared with Recorded Future News, Unit 42 attributed the targeting of Cisco ASA devices to Storm-1849 — a China-based threat group that Cisco previously said has been attacking the tools since 2024.   

Unit 42 researchers said they saw continued Chinese targeting of Cisco ASA devices at U.S. financial institutions, defense contractors and military organizations throughout October. They noted that Storm-1849, also referred to as UAT4356, is known to target government, defense industry and financial institutions.

They noted that there was a lull in activity between October 1 to October 8 — likely due to China’s Golden Week. 

Pete Renals, director of National Security Programs for Unit 42, said that throughout October, Storm-1849 “persisted in targeting vulnerable government edge devices.” 

Unit 42 saw scanning and exploitation activity targeting 12 IP addresses used by federal agencies in the U.S. They saw 11 other local and state government IP addresses targeted in October. 

In addition to U.S. agencies, federal government IP addresses in India, Nigeria, Japan, Norway, France, the U.K., the Netherlands, Spain, Australia, Poland, Austria, UAE, Azerbaijan and Bhutan were targeted.

One month ago, the Cybersecurity and Infrastructure Security Agency (CISA) released an emergency directive ordering all federal civilian agencies to patch CVE-2025-30333 and CVE-2025-20362 — two vulnerabilities impacting Cisco ASA devices. 

Hackers have been seen chaining the two bugs together during attacks, according to CISA, which added that the hackers are sophisticated and have found ways to gain access to ASAs before manipulating devices so that their access persists through reboots and system upgrades.

Agencies were given just one day to apply the patches and CISA officials stressed that threat actors were exploiting the bugs with “alarming ease.” Cisco said in its report on the campaign that it worked with multiple government agencies in May 2025 to investigate attacks targeting the ASA 5500-X Series devices running Cisco Secure Firewall ASA Software with VPN web services.

“Despite cybersecurity advisories and emergency directives last month highlighting the critical need for patching, the actor has continued their campaigns seemingly undeterred,” Renals said. 

“While groups like Salt and Volt Typhoon remain an active threat, newer groups like Storm-1849… are quickly expanding their operations and gaining global prominence."

CISA did not attribute the exploitation of the bugs but tied it to the same nation-state hackers behind the ArcaneDoor campaign discovered last year

CISA and Cisco declined to formally attribute the 2025 campaign to Chinese actors but cybersecurity research firm Censys investigated actor-controlled IPs tied to the 2024 ArcaneDoor campaign and found data “suggesting the potential involvement of an actor based in China, including links to multiple major Chinese networks and the presence of Chinese-developed anti-censorship software.”

CISA and Cisco did not respond to requests for comment.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Martin Matishak

Martin Matishak

is the senior cybersecurity reporter for The Record. Prior to joining Recorded Future News in 2021, he spent more than five years at Politico, where he covered digital and national security developments across Capitol Hill, the Pentagon and the U.S. intelligence community. He previously was a reporter at The Hill, National Journal Group and Inside Washington Publishers.

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.


文章来源: https://therecord.media/chinese-hackers-scan-exploit-firewalls-government
如有侵权请联系:admin#unsafe.sh