Canada Urges Cyber Defenders to Strengthen Edge Device Security

Critical Infrastructure Security,
Geo Focus: Canada,
Geo-Specific

Canadian Cyber Agency Raises Alarm Over Increasing Chinese Cyber Threats

Canada Warns Cyberdefenders to Buttress Edge Devices
Image: Shutterstock

The Canadian Centre for Cybersecurity has issued a critical advisory for cyberdefenders to enhance their security measures in light of escalating Chinese cyberattacks, particularly targeting inadequately configured and unpatched edge devices. In its recent statement, the agency documented an uptick in malicious online activity associated with China-linked groups, notably the Salt Typhoon hacking collective, which has been successful in breaching telecommunications networks in the United States and other nations by exploiting known vulnerabilities.

The advisory emphasizes that threat actors are increasingly focusing on network edge routers, prompting the Cyber Center to urge the Canadian cybersecurity sector to remain vigilant and proactive in safeguarding their infrastructures. Specific details on the exact vulnerabilities being targeted were not disclosed, but the agency cautioned that exposed edge devices are significantly susceptible to identification and exploitation through mass scanning techniques employed by adversaries.

Among the objectives of these cyber threats are sensitive operational services such as management protocols, which are often prime targets for adversaries aiming to access and exploit edge routers. Salt Typhoon, linked to the Chinese state, is emblematic of a broader strategy to infiltrate and compromise critical Western infrastructure, specifically within the telecommunications domain.

Notably, edge devices including virtual private networks are frequently left online for extended periods without maintenance, allowing cybercriminals to infiltrate networks undetected. Recent breaches have highlighted the vulnerabilities in high-profile organizations such as Sophos, Cisco, and Versa Networks, revealing that threat actors often exploit devices with default security settings, including unpatched systems and unsecured ports or protocols.

Once an edge device is compromised, attackers have been observed modifying configuration files to facilitate traffic redirection and creating unauthorized administrative accounts. They also engage in the theft of configuration data to uncover additional vulnerabilities, extract outdated password types, and consolidate further access to the network.

The Canadian agency outlined several strategies for organizations to mitigate risks associated with these cyber threats. Essential measures include disabling unsecure management protocols, implementing stringent access controls, and utilizing strong encryption standards. Companies are advised against relying on weak password practices, such as default vendor credentials, and are encouraged to maintain unique passwords across their systems.

As a precaution, businesses should regard these developments as significant indicators of the evolving tactics used by adversaries, which align with tactics identified in the MITRE ATT&CK framework. Relevant tactics include initial access through exploitation, persistence via compromised configurations, and privilege escalation associated with unauthorized account creation. Cyberdefenders must therefore elevate their security posture to guard against the increasing sophistication of these state-sponsored cyber threats.

Source link