<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p><span>On August 23rd, the FBI issued a flash warning about a zero-day vulnerability (CVE-2023-2868) in the Barracuda Network's Email Security Gateway (ESG).&nbsp; </span><span>The vulnerability in Barracuda Network's ESG (Email Security Gateway) allows unauthorized execution of system commands with administrator privileges through a remote command injection exploit, triggered when maliciously formatted TAR file attachments are sent to an email address connected to a domain with an ESG appliance. The scanning process is then exploited, leading to malicious command execution within the ESG.</span></p> <p><span><!--more--></span><span>Your network gateway, whether it be your firewall or router, is the common network element for all internet traffic. Most security tools, including those running on the gateway, focus on protecting the assets behind the gateway, but not the gateway itself. This leaves the gateway as a very juicy target, since it sees all traffic from and to the Internet (and often between different trust zones internally).&nbsp;</span></p> <p>Earlier this year, Ars Technica released an <a href="https://arstechnica.com/information-technology/2023/03/threat-actors-are-using-advanced-malware-to-backdoor-business-grade-routers/" rel="noopener" target="_blank">article</a> highlighting the growing threat malware attacks on business-grade routers, another network gateway device. Advanced malware that targets these devices allows threat actors to gain unauthorized access to a network gateway, which give them visibility into all traffic in and out of the network, and can be used to compromise the devices behind it. The malware is capable of:</p> <ul style="line-height: 1.5;"> <li><span>Passively capturing traffic, including IMAP, SMTP, and POP email </span></li> <li><span>Backdooring routers with a remote access Trojan</span></li> <li><span>Downloading files and r</span><span>unning various commands of their choice (including packet capture commands, which are usually available for&nbsp;troubleshooting on routers and firewalls)</span></li> <li><span>Funneling data from other servers through the gateway</span></li> </ul> <p><span>The consequences of such breaches range from compromised sensitive data and loss of intellectual property to financial losses and reputational damage. </span></p> <p>This serves as a stark reminder of the importance of protecting your network gateway against cyber threats. Routers and firewalls are the first line of defense against inbound attacks, and the last gatekeeper for data exfiltration. ThreatSTOP IP Defense filters all traffic to and from the interfaces it is activated on, protecting not just the network behind the gateway, but the gateway itself.</p> <p style="font-weight: bold;">Not a ThreatSTOP customer yet? Want to see ThreatSTOP instantly eliminate attacks on your network while protecting your gateway, or how it can effectively grow your MSP services?</p> <p><span style="background-color: transparent; font-size: 1em;"> </span></p> <p><span style="background-color: transparent; font-size: 1em;"><br></span></p></span>