Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 22, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 22, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 22, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 22, 2025

      Sam Altman says ChatGPT’s viral Ghibli effect “forced OpenAI to do a lot of unnatural things”

      May 22, 2025

      How to get started with Microsoft Copilot on Windows 11

      May 22, 2025

      Microsoft blocks employees from sending emails that mention “Palestine” or “Gaza”

      May 22, 2025

      I missed out on the Clair Obscur: Expedition 33 Collector’s Edition but thankfully, the developers are launching something special

      May 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Perficient is Shaping the Future of Salesforce Innovation

      May 22, 2025
      Recent

      Perficient is Shaping the Future of Salesforce Innovation

      May 22, 2025

      Opal – Optimizely’s AI-Powered Marketing Assistant

      May 22, 2025

      Content Compliance Without the Chaos: How Optimizely CMP Empowers Financial Services Marketers

      May 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Sam Altman says ChatGPT’s viral Ghibli effect “forced OpenAI to do a lot of unnatural things”

      May 22, 2025
      Recent

      Sam Altman says ChatGPT’s viral Ghibli effect “forced OpenAI to do a lot of unnatural things”

      May 22, 2025

      How to get started with Microsoft Copilot on Windows 11

      May 22, 2025

      Microsoft blocks employees from sending emails that mention “Palestine” or “Gaza”

      May 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Zyxel Firewalls Targeted by Helldown Ransomware: CVE-2024-11667 Exploited

    Zyxel Firewalls Targeted by Helldown Ransomware: CVE-2024-11667 Exploited

    November 29, 2024

    Zyxel Firewalls

    Zyxel Firewalls have become a key target in recent cyberattacks, with attackers exploiting a critical vulnerability to deploy the dangerous Helldown ransomware. The German CERT (CERT-Bund) has issued a warning alongside Zyxel detailing the extent of these attacks and outlining immediate steps that organizations must take to protect their network devices. 

     The attacks are tied to a vulnerability, CVE-2024-11667, within the Zyxel ZLD firmware that affects the Zyxel ATP and USG FLEX firewall series. Five German entities are believed to have been targeted by these attacks, stressing the growing risks of leaving such vulnerabilities unpatched. 

    CVE-2024-11667 Vulnerability in Zyxel Firewalls 

    Zyxel Firewalls vulnerability
    CERT-Bund Notifies About CVE-2024-11667 Vulnerability (Source: CERT-Bund)

    The core issue is CVE-2024-11667, a directory traversal vulnerability in the Zyxel ZLD firmware (versions 4.32 to 5.38). This flaw allows attackers to bypass security measures and upload or download files via specially crafted URLs. By exploiting this vulnerability, cybercriminals can gain unauthorized access to the system, steal credentials, and create backdoor VPN connections, often without the knowledge of network administrators. 

    The devices that are most at risk are those running ZLD firmware versions between 4.32 and 5.38, with remote management or SSL VPN enabled. Importantly, devices managed through the Nebula cloud management system are not affected by this vulnerability. 

    The Rise of Helldown Ransomware 

    Helldown ransomware, first observed in August 2024, has quickly evolved into a malicious threat, leveraging CVE-2024-11667 to target vulnerable Zyxel firewalls. Helldown, which is derived from the infamous LockBit ransomware builder, uses advanced techniques to infiltrate networks and move laterally, often with the intent to encrypt valuable data and disrupt operations. 

    As of now, Helldown’s leak site has listed 32 victims worldwide, including five organizations in Germany, according to CERT-Bund. The ransomware’s ability to exploit this vulnerability is concerning, as even systems that have been patched may remain vulnerable if attackers can gain access using unchanged administrator credentials. 

    How the Attack Unfolds 

    The primary attack vector is the exploitation of the CVE-2024-11667 vulnerability to gain initial access to the targeted systems. Once inside, attackers often employ sophisticated post-exploitation tactics, including the creation of unauthorized user accounts such as “SUPPORT87” and “SUPPOR817.”  

    These accounts are used to facilitate lateral movement within the network, establishing persistent backdoors that allow for continued access even after the initial breach. The impact of these attacks is significant: organizations have reported data exfiltration, encryption of critical files, and operational disruptions, often with the goal of demanding a ransom for the decryption of files. 

    Identifying Compromise: Key Indicators 

    Organizations using Zyxel firewalls should be alert for signs that their systems have been compromised. Some of the key indicators include: 

    • Logs showing unusual VPN connections from unknown accounts such as “SUPPORT87” or “VPN” are a red flag. Attackers may also use VPN services to mask their IP addresses. 
    • Changes to firewall rules, such as unrestricted access between WAN, LAN, and SSL VPN zones, can indicate a breach. Similarly, attackers may alter NAT rules to allow unauthorized access from the WAN to the LAN. 
    • Unexplained logins or the creation of unauthorized admin accounts could suggest malicious activity. Security logs may show unusual administrative actions, especially those from unfamiliar IP addresses. 
    • Attackers may use stolen credentials to access Active Directory (AD) servers, potentially leading to the encryption of files stored within these systems. 

    Conclusion  

    Organizations using Zyxel firewalls should act quickly to detect and fix potential compromises by reviewing VPN logs, inspecting SecuReporter for suspicious activity, and checking firewall rules. Remediation involves upgrading to ZLD 5.39, changing passwords, removing unauthorized accounts, and tightening security policies. 

    Zyxel advises disabling unnecessary remote access, changing default ports, enabling two-factor authentication (2FA), and using Geo-IP filtering. Regular backups, encryption, and continuous monitoring are essential for securing systems. The rise of Helldown ransomware highlights the need for better security measures, including timely firmware updates and strong access controls. 

    Source: Read More

    Hostinger
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleMicrosoft Fixes AI, Cloud, and ERP Security Flaws; One Exploited in Active Attacks
    Next Article Cyberattack Disrupts Major UK Healthcare Provider, Delays Patient Services

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 23, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-2394 – Ecovacs Home Android and iOS Mobile Apps Stored XSS Vulnerability

    May 23, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Make $1M+ per Year With 0 Employees using AI Tech! Become a Highly-Rated Solopreneur

    Artificial Intelligence

    Picocrypt – small and secure encryption tool

    Linux

    There’s no such thing as UI-less anything.

    Web Development

    CISA Warns of Exploited GitHub Action CVE-2025-30066 – Users Urged to Patch

    Development

    Highlights

    CVE-2025-3884 – Cloudera Hue Ace Editor Directory Traversal Information Disclosure

    May 22, 2025

    CVE ID : CVE-2025-3884

    Published : May 22, 2025, 1:15 a.m. | 1 hour, 35 minutes ago

    Description : Cloudera Hue Ace Editor Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Cloudera Hue. Authentication is not required to exploit this vulnerability.

    The specific flaw exists within the Ace Editor web application. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of the service account. Was ZDI-CAN-24332.

    Severity: 7.5 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    KillSec Unveils Feature-Rich RaaS Platform with Encryption, DDoS Tools, and Data Stealer

    June 26, 2024

    Can AI detectors save us from ChatGPT? I tried 6 online tools to find out

    June 21, 2024

    Google I/O 2025: How to watch and what the event schedule tells us

    April 24, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.