Chinese hackers exploiting Dell zero-day flaw that has been around since mid-2024

Dell users will want to pay attention to the news that a suspected Chinese state-backed hacking group has been quietly exploiting a critical Dell security flaw in zero-day attacks that started in mid-2024.

Martin Jartelius, AI Product Director at Outpost24has provided the following commentary: 

“‘Speak friend and enter’ as Tolkien wrote in 1954, where Gandalf is amused by the ancient riddle, reflecting a level of security from a more trusting time. Hardcoded credentials have accounted for roughly 0.4% of all vulnerabilities indexed, following the trend of an increasing number of reported vulnerabilities, and only just above 1% of those make it onto the CISA KEVs list. This vulnerability is not a unicorn, but it is massively hard to detect in logs and monitoring, which contributes to the extremely low reporting frequency, given it is a published set of master keys to any of those systems. Patching must be urgently prioritized.”

If you use Dell gear in your organization, I’d strongly suggest having a look at this and taking action if required. Given how long that it has been around, there’s a possibility that the threat actors behind this have set up shop in a lot of places.

Leave a Reply

Discover more from The IT Nerd

Subscribe now to keep reading and get access to the full archive.

Continue reading