CISA warns chemical facilities that its Chemical Security Assessment Tool (CSAT) environment was breached<\/strong><\/a> in January.<\/p>\n\n\n\n
In March, the Recorded Future News first reported<\/a> that the US Cybersecurity and Infrastructure Security Agency (CISA) agency was hacked in February. In response to the security breach, the agency had to shut down two crucial systems, as reported by a CISA spokesperson and US officials with knowledge of the incident, according to CNN<\/a>.<\/p>\n\n\n\n
\u201cThe impact was limited to two systems, which we immediately took offline. We continue to upgrade and modernize our systems, and there is no operational impact at this time,\u201d the spokesperson said<\/a>.<\/em><\/p>\n\n\n\n
Ironically, CISA warned US organizations about attacks exploiting vulnerabilities<\/a> in Ivanti software. On February 1st, for the first time since its establishment, CISA ordered federal agencies to disconnect all instances of Ivanti Connect Secure and Ivanti Policy Secure products within 48 hours.<\/p>\n\n\n\n
On February 29, CISA warned<\/strong><\/a> organizations again that threat actors are exploiting multiple vulnerabilities (CVE-2023-46805<\/a>, CVE-2024-21887<\/a>, and CVE-2024-21893<\/a>) in Ivanti Connect Secure and Policy Secure Gateways.<\/p>\n\n\n\n
“On January 26, CISA identified potentially malicious activity affecting the CSAT Ivanti Connect Secure appliance. During the investigation, we identified that a malicious actor installed an advanced webshell on the Ivanti device. This type of webshell can be used to execute malicious commands or write files to the underlying system.” reads the advisory<\/strong><\/a> published by CISA. “Our analysis further identified that a malicious actor accessed the webshell several times over a two-day period. Importantly, our investigation did not identify adversarial access beyond the Ivanti device nor data exfiltration from the CSAT environment.”<\/em>
The Cybersecurity and Infrastructure Security Agency’s Chemical Security Assessment Tool (CSAT)<\/a> was hacked by a threat actor from January 23-26, 2024. This intrusion may have resulted in the potential unauthorized access of Top-Screen surveys<\/a>, Security Vulnerability Assessments<\/a>, Site Security Plans<\/a>, Personnel Surety Program (PSP) submissions<\/a>, and CSAT user accounts.<\/p>\n\n\n\n
“Even without evidence of data exfiltration, the number of potential individuals and organizations whose data was potentially at risk met the threshold of a major incident under the Federal Information Security Modernization Act (FISMA)<\/a>.” concludes the advisory.<\/em>
Pierluigi Paganini<\/strong><\/a><\/p>\n\n\n\n
Follow me on Twitter: @securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/a><\/p>\n\n\n\n
(<\/strong>SecurityAffairs<\/strong><\/a> \u2013<\/strong> hacking, CISA)<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"