Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 21, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 21, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 21, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 21, 2025

      Google DeepMind’s CEO says Gemini’s upgrades could lead to AGI — but he still thinks society isn’t “ready for it”

      May 21, 2025

      Windows 11 is getting AI Actions in File Explorer — here’s how to try them right now

      May 21, 2025

      Is The Alters on Game Pass?

      May 21, 2025

      I asked Copilot’s AI to predict the outcome of the Europa League final, and now I’m just sad

      May 21, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Celebrating GAAD by Committing to Universal Design: Equitable Use

      May 21, 2025
      Recent

      Celebrating GAAD by Committing to Universal Design: Equitable Use

      May 21, 2025

      GAAD and Universal Design in Healthcare – A Deeper Look

      May 21, 2025

      GAAD and Universal Design in Pharmacy – A Deeper Look

      May 21, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Google DeepMind’s CEO says Gemini’s upgrades could lead to AGI — but he still thinks society isn’t “ready for it”

      May 21, 2025
      Recent

      Google DeepMind’s CEO says Gemini’s upgrades could lead to AGI — but he still thinks society isn’t “ready for it”

      May 21, 2025

      Windows 11 is getting AI Actions in File Explorer — here’s how to try them right now

      May 21, 2025

      Is The Alters on Game Pass?

      May 21, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Zyxel Firewalls Targeted by Helldown Ransomware: CVE-2024-11667 Exploited

    Zyxel Firewalls Targeted by Helldown Ransomware: CVE-2024-11667 Exploited

    November 29, 2024

    Zyxel Firewalls

    Zyxel Firewalls have become a key target in recent cyberattacks, with attackers exploiting a critical vulnerability to deploy the dangerous Helldown ransomware. The German CERT (CERT-Bund) has issued a warning alongside Zyxel detailing the extent of these attacks and outlining immediate steps that organizations must take to protect their network devices. 

     The attacks are tied to a vulnerability, CVE-2024-11667, within the Zyxel ZLD firmware that affects the Zyxel ATP and USG FLEX firewall series. Five German entities are believed to have been targeted by these attacks, stressing the growing risks of leaving such vulnerabilities unpatched. 

    CVE-2024-11667 Vulnerability in Zyxel Firewalls 

    Zyxel Firewalls vulnerability
    CERT-Bund Notifies About CVE-2024-11667 Vulnerability (Source: CERT-Bund)

    The core issue is CVE-2024-11667, a directory traversal vulnerability in the Zyxel ZLD firmware (versions 4.32 to 5.38). This flaw allows attackers to bypass security measures and upload or download files via specially crafted URLs. By exploiting this vulnerability, cybercriminals can gain unauthorized access to the system, steal credentials, and create backdoor VPN connections, often without the knowledge of network administrators. 

    The devices that are most at risk are those running ZLD firmware versions between 4.32 and 5.38, with remote management or SSL VPN enabled. Importantly, devices managed through the Nebula cloud management system are not affected by this vulnerability. 

    The Rise of Helldown Ransomware 

    Helldown ransomware, first observed in August 2024, has quickly evolved into a malicious threat, leveraging CVE-2024-11667 to target vulnerable Zyxel firewalls. Helldown, which is derived from the infamous LockBit ransomware builder, uses advanced techniques to infiltrate networks and move laterally, often with the intent to encrypt valuable data and disrupt operations. 

    As of now, Helldown’s leak site has listed 32 victims worldwide, including five organizations in Germany, according to CERT-Bund. The ransomware’s ability to exploit this vulnerability is concerning, as even systems that have been patched may remain vulnerable if attackers can gain access using unchanged administrator credentials. 

    How the Attack Unfolds 

    The primary attack vector is the exploitation of the CVE-2024-11667 vulnerability to gain initial access to the targeted systems. Once inside, attackers often employ sophisticated post-exploitation tactics, including the creation of unauthorized user accounts such as “SUPPORT87” and “SUPPOR817.”  

    These accounts are used to facilitate lateral movement within the network, establishing persistent backdoors that allow for continued access even after the initial breach. The impact of these attacks is significant: organizations have reported data exfiltration, encryption of critical files, and operational disruptions, often with the goal of demanding a ransom for the decryption of files. 

    Identifying Compromise: Key Indicators 

    Organizations using Zyxel firewalls should be alert for signs that their systems have been compromised. Some of the key indicators include: 

    • Logs showing unusual VPN connections from unknown accounts such as “SUPPORT87” or “VPN” are a red flag. Attackers may also use VPN services to mask their IP addresses. 
    • Changes to firewall rules, such as unrestricted access between WAN, LAN, and SSL VPN zones, can indicate a breach. Similarly, attackers may alter NAT rules to allow unauthorized access from the WAN to the LAN. 
    • Unexplained logins or the creation of unauthorized admin accounts could suggest malicious activity. Security logs may show unusual administrative actions, especially those from unfamiliar IP addresses. 
    • Attackers may use stolen credentials to access Active Directory (AD) servers, potentially leading to the encryption of files stored within these systems. 

    Conclusion  

    Organizations using Zyxel firewalls should act quickly to detect and fix potential compromises by reviewing VPN logs, inspecting SecuReporter for suspicious activity, and checking firewall rules. Remediation involves upgrading to ZLD 5.39, changing passwords, removing unauthorized accounts, and tightening security policies. 

    Zyxel advises disabling unnecessary remote access, changing default ports, enabling two-factor authentication (2FA), and using Geo-IP filtering. Regular backups, encryption, and continuous monitoring are essential for securing systems. The rise of Helldown ransomware highlights the need for better security measures, including timely firmware updates and strong access controls. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleMicrosoft Fixes AI, Cloud, and ERP Security Flaws; One Exploited in Active Attacks
    Next Article Cyberattack Disrupts Major UK Healthcare Provider, Delays Patient Services

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 22, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2024-13953 – Raritan ASPECT Device Logger Credential Exposure Vulnerability

    May 22, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    CVE-2025-46189 – SourceCodester Client Database Management System SQL Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    How Formula 1® uses generative AI to accelerate race-day issue resolution

    Machine Learning

    HCL Commerce Containers Explained

    Development

    No.1 Solo Female Travel Blog – A Comprehensive Guide

    Development

    Highlights

    Microsoft confirms Outlook 0x80049dd3 sign-in error, access denied on Windows bug

    December 20, 2024

    It’s not just you: Outlook desktop app for Windows 11 and Windows 10 is broken…

    A UX Fairy Tale

    December 27, 2024

    Boost Productivity with Custom Command Shortcuts Using Linux Aliases

    March 20, 2025

    Thanks to Xbox’s price hike, the Series S is now more expensive than the PS5

    May 3, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.