U.S. Charges Chinese Hacker for Exploiting Zero-Day in 81,000 Sophos Firewalls

U.S. Charges Chinese Hacker for Exploiting Zero-Day in 81,000 Sophos Firewalls

December 11, 2024 at 01:36AM

The U.S. government charged Chinese national Guan Tianfeng for hacking thousands of Sophos firewalls in 2020, exploiting a severe zero-day vulnerability. He allegedly conspired to access and exfiltrate data, targeting critical U.S. infrastructure. Sanctions were imposed against his company, Sichuan Silence, linked to Chinese intelligence agencies.

### Meeting Takeaways from December 11, 2024 – Vulnerability / Data Breach Discussion

1. **Charges Unsealed:**
– The U.S. government has charged Guan Tianfeng (alias gbigmao and gxiaomao), a Chinese national, with cyber crimes involving breaches of Sophos firewall devices globally in 2020.
– Guan is associated with Sichuan Silence Information Technology Company and is accused of conspiring to commit computer and wire fraud.

2. **Zero-Day Vulnerability:**
– The indictment centers around a critical vulnerability, CVE-2020-12271, which is an SQL injection flaw scoring 9.8 on the CVSS scale, allowing remote code execution on vulnerable Sophos firewalls.
– Approximately 81,000 firewalls were infiltrated as a result of this vulnerability.

3. **Incident Background:**
– Sophos received a suspicious bug bounty report in April 2020, one day before real-world exploitation began using the Asnarök trojan.
– Subsequent vulnerabilities, CVE-2022-1040 and CVE-2022-1292, were exploited in 2022. Both were of critical severity with a CVSS score of 9.8.

4. **Malware Development:**
– Guan and accomplices allegedly designed malware to steal information from firewalls and used deceptive domain names resembling those controlled by Sophos for their operations.

5. **Countermeasures and Sanctions:**
– The U.S. Department of Justice reported that these cyber activities included the use of ransomware to counteract removal attempts by victims.
– Concurrent sanctions were imposed by the U.S. Treasury against both Sichuan Silence and Guan for their roles in targeting U.S. critical infrastructure entities.

6. **Impact on U.S. Critical Infrastructure:**
– Over 23,000 affected firewalls were in the U.S., with 36 of them protecting critical infrastructure systems. The potential impact could have been severe if cybersecurity measures had not been implemented effectively.

7. **Federal Rewards and Statements:**
– The Department of State announced rewards of up to $10 million for information leading to the identification of cyber attackers linked to foreign governments.
– Sophos’ CISO emphasized the increasing threat from Chinese state-sponsored cyber adversaries and called for innovative collaborative efforts across the cybersecurity industry.

8. **Call to Action:**
– There is a need for increased transparency regarding vulnerabilities and a commitment to strengthening software defenses to outpace persistent cyber threats.

These points summarize the critical aspects of the discussion regarding the cybersecurity threat posed by foreign actors, particularly in relation to critical infrastructure in the United States.

Full Article