this post was submitted on 12 Mar 2024
398 points (96.5% liked)
Technology
59607 readers
3217 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Did I miss the bit where they said how it was delivered?
Seems it's exploiting vulnerabilities in some software called "Ivanti Connect Secure VPN", so unless you're running that, you're safe I guess. Says in the past they used vulnerabilities in "Qlik Sense" and Adobe "Magento". Never heard of any of those, but I guess maybe some businesses use them?
So its spreading via a closed source VPN software. Why should you even use that when there is great VPN software available on Linux which works reliable for decades?
Well of course you miss zero trust connections, multi-cloud readiness, award‑winning security and proven secure corporate access ...
Because someone built an easy-to-use solution for organisations to charge money for. The same thing with Cisco VPN that every other software company seems to use.
My university has us use Ivanti to connect to our network from offsite...
These vpns seem to be quite a good target since at least the one my university uses is run as a setuid executable, so if there is a vulnerability in there, you can execute code as root that wasn't intended to be executed as root.
Hmmm... Nice, nice, that's nice,
Which university??
"Linux isn't more secure than Windows! It has vulnerabilities"
The Linux vulnerability: ^
I pay for ProtonVPN, and I still run my traffic through OpenVPN.
Hate to victim blame, but unless you're going to audit every line of code yourself, don't use obscure software.
As TonyTonyChopper this thread said, sometimes that obscure software is what you are required to use in your institution, or they don't offer support for anything else.
Yeah it sucks. Of course there are outlying situations where people are obliged to use shit software.
But for those with a choice, just don't use shit software.
Are these tools implementing proprietary protocols or something? So far I have not found a VPN I couldn't make work with openvpn or wireguard.
To be fair you should be using wire guard then. Because multiple of the largest and most well-known security auditing firms in the world have said that openvpn is impossible to truly audit. It's too large, you can audit individual parts of it, and you can audit individual interactions between parts. But it's not possible to fully audit.
Meanwhile wireguard is quite small so it can be fairly easily audited by a small team and has been multiple times
But it could be banned by DPI. Russia does it, China also obviously
You can wrap it into https with nginx if you wanna get super fancy so it just looks like web traffic even with dpi. Takes a latency and speed hit but it works
Magento is the e-commerce platform. Adobe acquired it in 2018. Quite a few businesses use it.
ITT people who don’t understand the difference between “privacy” VPNs pitched by influencers and corporate remote access VPN.
This is the latter. Ivanti bought Pulse a few years back. Pulse, iirc, spun out of Juniper and Netscreen.
Ivanti is a huge name in enterprise management. They make LANdesk which has been one of the most widely deployed enterprise endpoint management tools.
Juniper is one of the biggest names in enterprise and service-provider networks.