Draft:ArcaneDoor
Submission declined on 1 May 2024 by PARAKANYAA (talk). This submission appears to be a news report of a single event and may not be notable enough for an article in Wikipedia. Please see Wikipedia:What Wikipedia is not#NEWS and Wikipedia:Notability (people)#People notable for only one event for more information.
Where to get help
How to improve a draft
You can also browse Wikipedia:Featured articles and Wikipedia:Good articles to find examples of Wikipedia's best writing on topics similar to your proposed article. Improving your odds of a speedy review To improve your odds of a faster review, tag your draft with relevant WikiProject tags using the button below. This will let reviewers know a new draft has been submitted in their area of interest. For instance, if you wrote about a female astronomer, you would want to add the Biography, Astronomy, and Women scientists tags. Editor resources
|
Submission declined on 28 April 2024 by Umakant Bhalerao (talk). This submission is not adequately supported by reliable sources. Reliable sources are required so that information can be verified. If you need help with referencing, please see Referencing for beginners and Citing sources. Declined by Umakant Bhalerao 5 months ago. |
This is a draft article. It is a work in progress open to editing by anyone. Please ensure core content policies are met before publishing it as a live Wikipedia article. Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL Last edited by PARAKANYAA (talk | contribs) 5 months ago. (Update)
Finished drafting? or |
ArcaneDoor is a cybercrime/cyberwarfare campaign involving state actors that targets network edge devices.[1][2][3][4][5] It has exploited a number of zero-day vulnerabilities in Cisco devices, including CVE-2024-2035 and CVE-2024-20359.[6]
It implants two malware tippers, Line Runner and Line Dancer, that target Cisco Adaptive Security Appliances and Firepower Threat Defense devices.[6][7][8][9]
References
[edit]- ^ Greenberg, Andy. "Cyberspies Hacked Cisco Firewalls to Access Government Networks". Wired. ISSN 1059-1028. Retrieved 2024-04-29.
- ^ Kundaliya, Dev (2024-04-26). "Global government networks breached in 'ArcaneDoor' espionage campaign". www.computing.co.uk. Retrieved 2024-04-29.
- ^ Lyons, Jessica. "'Sophisticated' nation-state crew exploiting Cisco firewalls". www.theregister.com. Retrieved 2024-04-29.
- ^ "ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices". Cisco Talos Blog. 2024-04-24. Retrieved 2024-04-28.
- ^ Coker, James (2024-04-25). "State-Sponsored Espionage Campaign Exploits Cisco Vulnerabilities". Infosecurity Magazine. Retrieved 2024-04-29.
- ^ a b "ArcaneDoor hackers exploit Cisco zero-days to breach govt networks". BleepingComputer. Retrieved 2024-04-28.
- ^ "Malware Tipper: Line Runner" (PDF). National Cyber Security Centre. 24 April 2024. Retrieved 2024-04-28.
- ^ "Malware Tipper: Line Dancer" (PDF). National Cyber Security Centre. 24 April 2024. Retrieved 2024-04-28.
- ^ Culafi, Alexander. "Cisco zero-day flaws in ASA, FTD software under attack". TechTarget. Retrieved 2024-04-28.