NSA Warns of Hackers Attacking VPN Service Applications

Robinson+Cole Data Privacy + Security Insider

The National Security Agency issued an advisory last week to warn companies and users that nation-state actors are actively exploiting vulnerabilities in several virtual private network (VPN) service applications to obtain access to users’ devices. The hackers are leveraging vulnerabilities in older versions of VPN applications, and if successful, the attackers can then remotely execute and download files and intercept encrypted network traffic.

The purpose of a VPN is to allow remote users to use their computer to obtain access to company systems via extremely secure connections to the local network. But apparently some companies and users have not patched the VPN application and older vulnerabilities are being targeted by attackers.

The advisory urges companies and users to update their VPN services with patches that have been issued by the service providers. The advisory illustrates the importance of staying current with patching of all applications, and this one is vitally important.

[View source.]

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Robinson+Cole Data Privacy + Security Insider | Attorney Advertising

Written by:

Robinson+Cole Data Privacy + Security Insider

Robinson+Cole Data Privacy + Security Insider on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide

This website uses cookies to improve user experience, track anonymous site usage, store authorization tokens and permit sharing on social media networks. By continuing to browse this website you accept the use of cookies. Click here to read more about how we use cookies.