{"id":86781,"date":"2024-04-11T10:30:00","date_gmt":"2024-04-11T17:30:00","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/?p=86781"},"modified":"2024-04-11T13:31:18","modified_gmt":"2024-04-11T20:31:18","slug":"connectfun-new-exploit-campaign-in-the-wild-targets-media-company","status":"publish","type":"post","link":"https:\/\/www.forescout.com\/blog\/connectfun-new-exploit-campaign-in-the-wild-targets-media-company\/","title":{"rendered":"Connect:fun: New exploit campaign in the wild targets media company"},"content":{"rendered":"<p>In a new threat briefing, Forescout Research \u2013 Vedere Labs details an exploitation campaign targeting organizations running Fortinet\u2019s FortiClient EMS which is vulnerable to CVE-2023-48788. We are designating this campaign <strong>Connect:fun<\/strong> because of the use of ScreenConnect and Powerfun as post-exploitation tools \u2013 our first-ever named campaign.<\/p>\n<p>Here are details of an incident targeting a media company using CVE-2023-48788 with evidence pointing to a possible threat actor active since at least 2022 targeting Fortinet appliances and using Vietnamese and German languages in their infrastructure. We are closely tracking this infrastructure and will report on this actor again in the future. <a href=\"\/resources\/connectfun-threat-briefing\/\" target=\"new\" rel=\"noopener\">Access our full report<\/a> to read more details of the observed incident, including log collection data and threat hunting opportunities.<\/p>\n<p>On March 12, 2024 Fortinet published an <a href=\"https:\/\/fortiguard.fortinet.com\/psirt\/FG-IR-24-007\" target=\"_blank\" rel=\"noopener\">advisory<\/a> about CVE-2023-48788, a SQL injection vulnerability in the FortiClient EMS security management solution. On March 21, researchers released a <a href=\"https:\/\/github.com\/horizon3ai\/CVE-2023-48788\/blob\/main\/CVE-2023-48788.py\" target=\"_blank\" rel=\"noopener\">proof of concept (PoC) exploit<\/a> for the vulnerability and since then there have been reports of exploits in the wild leading CISA to add the CVE to its list of <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog?search_api_fulltext=forticlient&amp;field_date_added_wrapper=all&amp;sort_by=field_date_added&amp;items_per_page=20\" target=\"_blank\" rel=\"noopener\">Known Exploited Vulnerabilities (KEV)<\/a> on March 25.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-86786\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-ConnectFun-Flowchart-1.png\" alt=\"\" width=\"1080\" height=\"auto\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-ConnectFun-Flowchart-1.png 1080w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-ConnectFun-Flowchart-1-300x148.png 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-ConnectFun-Flowchart-1-1024x505.png 1024w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-ConnectFun-Flowchart-1-768x379.png 768w\" sizes=\"(max-width: 1080px) 100vw, 1080px\" \/><\/p>\n<h2><a name=\"_Toc163114307\"><\/a>Exploit details of CVE-2023-48788<\/h2>\n<p>Since the PoC for CVE-2023-48788 was made available on March 21, we have observed exploitation attempts similar to the PoC. Here we discuss one specific incident that targeted a media company whose FortiClient EMS was vulnerable and exposed to the internet.<\/p>\n<p><center><a href=\"\/resources\/connectfun-threat-briefing\/\"  title=\"Access The Full Report\" class=\"c-btn c-btn--primary icon-position-right\" target=\"new\"><span class=\"cta-button-text\">Access The Full Report<\/span><\/a><\/center>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-86785\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-ConnectFun-Flowchart-2.png\" alt=\"\" width=\"1080\" height=\"auto\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-ConnectFun-Flowchart-2.png 1080w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-ConnectFun-Flowchart-2-300x189.png 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-ConnectFun-Flowchart-2-1024x647.png 1024w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-ConnectFun-Flowchart-2-768x485.png 768w\" sizes=\"(max-width: 1080px) 100vw, 1080px\" \/><\/p>\n<p>On March 21, server logs show that the threat actor tried to achieve command execution via a sequence of commands to enable advanced configuration options and the xp_cmdshell stored procedure in SQL Server. Right after the changes, the threat actor used the <a href=\"https:\/\/lolbas-project.github.io\/lolbas\/Binaries\/Finger\/\">LOLBAS<\/a> finger.exe to download a malicious payload from 185[.]56[.]83[.]82 but was unsuccessful because of using the incorrect syntax.<\/p>\n<p>Two days later on March 23, the same actor executed \u201cFINGER ADMIN@185.56.83.82\u201d along with \u201cWAITFOR DELAY &#8217;00:00:10&#8242; &#8211;&#8221; to check if the command was executed and to see if the vulnerability still existed. Though the command was not successful, the DELAY might have hinted to them that the host was still vulnerable.<\/p>\n<p>After the actor confirmed the host was still vulnerable, they executed several SQL injections with obfuscated commands to download the ScreenConnect remote management tool and a malicious script based on the open-source Powerfun which includes functionality for bind and reverse shells, as well as execution of arbitrary commands from (Command and Control).<\/p>\n<p>After a couple of days, we saw multiple SQL statements trying to download ScreenConnect using a domain ursketz[.]com. The file names earlier downloads seen from IP address 95[.]179[.]241[.]10.<\/p>\n<p>The actor used certutil.exe to download ScreenConnect and install it using msiexec.exe. The attempt to download and install was successful. This is also confirmed by the firewall logs, where we observed traffic to the domain used to download ScreenConnect hosted at 141[.]136[.]43[.]188.<\/p>\n<p>Connections from ScreenConnect were destined to 144[.]202[.]21[.]16 but we were not able to retrieve the ScreenConnect logs to identify further actions.<\/p>\n<h2>Analysis: Campaign and threat actor details<\/h2>\n<p>This incident was not isolated. We observed scanning activity from the same IP address 185[.]56[.]83[.]82 for FortiClient EMS in other customer networks beginning March 21 which continued on March 22nd, March 25th and March 28th. The timeframe is consistent with exploitation attempts shown above \u2014 and was observed in customers who do not use FortiClient EMS in their environment but use other VPN appliances. However, we do not see indiscriminate automated exploitation attempts on honeypots as we have seen in the past with <a href=\"\/blog\/analysis-of-energy-sector-cyberattacks-in-denmark-and-ukraine\/\">other vulnerabilities on edge devices<\/a>. The activity clearly has a manual component evidenced by all the failed attempts to download and install tools, as well as the relatively long time taken between attempts.<\/p>\n<p>This is evidence the activity is part of a specific campaign rather than an exploit included in automated cybercriminal botnets. From our observations, it appears that the actors behind this campaign are not mass scanning but choosing target environments that have VPN appliances.<\/p>\n<p>Other cybersecurity companies <a href=\"https:\/\/github.com\/PaloAltoNetworks\/Unit42-timely-threat-intel\/blob\/main\/2024-03-24-thru-26-IOCs-for-Fortnet-EMS-exploit-activity.txt\" target=\"_blank\" rel=\"noopener\">[1]<\/a> <a href=\"https:\/\/www.blumira.com\/cve-2023-48788-forticlientems-pervasive-sql-injection-in-das-component\/\" target=\"_blank\" rel=\"noopener\">[2]<\/a> have also seen similar incidents with the exploitation of CVE-2023-48788 to download RMM software, including ScreenConnect and Atera. All the reports we have seen are similar, including IP addresses and infrastructure that intersect with our observations and bear hallmarks of manual exploitation.<\/p>\n<p><strong>The IPs and domains involved in the incident we described above were also involved in previous cases:<\/strong><\/p>\n<ul>\n<li>185[.]56[.]83[.]82 tried to login to Fortinet SSLVPN appliances on March 14, a couple of days after the Fortinet advisory was released and before the public PoC for CVE-2023-48788. We also observed the same activity on March 25 and 27. This IP address was also <a href=\"https:\/\/twitter.com\/xBytezz\/status\/1503502448928952322\" target=\"_blank\" rel=\"noopener\">seen in 2022<\/a> trying to login to several Fortinet SSLVPN appliances and using similar techniques to download and execute malicious payloads.<br \/>\n&nbsp;\n<\/li>\n<li>144[.]202[.]21[.]16 is part of AS20473 and had ports 3389 and 5985 available with hostname \u201cvultr-guest\u201d at the time of the incident. This is the default hostname for endpoints hosted by <a href=\"https:\/\/www.vultr.com\/\" target=\"_blank\" rel=\"noopener\">Vultr<\/a>, which was known to host threat actor infrastructure for actors exploiting <a href=\"https:\/\/arista.my.site.com\/AristaCommunity\/s\/article\/Exploiting-CVE-2018-13379-A-Case-Study-of-Threat-Actors-Exploiting-Years-Old-CVEs\" target=\"_blank\" rel=\"noopener\">FortiGate appliance vulnerability CVE-2018-13379<\/a> in 2022. Another IP address mentioned in a similar FortiClient EMS incident observed by another company was 45[.]77[.]160[.]195, which is also hosted by the same provider.<br \/>\n&nbsp;\n<\/li>\n<li>95[.]179[.]241[.]10 has an associated domain name of ls[.]vfxtraining[.]shop and is also hosted on AS20473 by Vultr (with the same hostname \u201cvultr-guest\u201d). The host had open ports 22\/SSH, 2053\/HTTP, 2083\/HTTP, 2087\/HTTP, 2096\/HTTP, 8443\/HTTP and 8888\/HTTP on which we could see the certificate common name mci11[.]raow[.]fun. Pivoting off this name, we could obtain additional IP addresses spread over Germany, United Arab Emirates and United Kingdom. The site also has one open directory with files such as adduser, delete, kill.php, killusers.sh, online.php, syncdb.php and token.php.<br \/>\n&nbsp;\n<\/li>\n<li>ursketz[.]com was contacted by a suspicious PowerShell script named <a href=\"https:\/\/www.virustotal.com\/gui\/file\/d472ad9acd345731afd026f98ae3cda69ffde8df2b32529e7ecdad8e9eaca2d7\" target=\"_blank\" rel=\"noopener\">jpeg.lnk<\/a> on April 12, 2021. That script <a href=\"https:\/\/twitter.com\/cyber__sloth\/status\/1381530476150722569\/photo\/1\" target=\"_blank\" rel=\"noopener\">tries to download<\/a> files from a GitHub repository, now offline, that had a folder &#8220;Project Nhap mon an toan thong tin&#8221; (English translation: &#8220;Project Introductory Information Security&#8221;) and several suspicious DLL, EXE and SH files.<br \/>\n&nbsp;\n<\/li>\n<li>ursketz[.]com resolved to 2a02:4780:a:952:0:1e10:e79b:1 (IPv6) and 141[.]136[.]43[.]188 (IPv4) at least from 2022. A <a href=\"https:\/\/web.archive.org\/web\/20220721172336if_\/https:\/ursketz.com\/\">snapshot<\/a> of the website from July 21, 2022 shows the title &#8220;UrSketz &#8211; Digital Assets Investment Company&#8221; with content in German. The address on the page is an office building in Germany.<br \/>\n&nbsp;\n<\/li>\n<\/ul>\n<p>The evidence points to a possible, active threat actor since at least 2022 targeting Fortinet appliances using Vietnamese and German languages in their infrastructure. Initially perceived as a security team or research team in Vietnam based on the Github repository, they are actively exploiting and installing tools post-exploitation on real targets instead of only researching.<\/p>\n<h2>Mitigation recommendations, TTPs and IoCs<\/h2>\n<p>To mitigate against exploitation of CVE-2023-48788, follow these steps:<\/p>\n<ul>\n<li>Apply the <a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-24-007\" target=\"_blank\" rel=\"noopener\">patch provided by Fortinet<\/a>.<\/li>\n<li>Ensure that the traffic reaching FortiClient EMS is constantly monitored for signs of exploitation by using an intrusion detection systems (IDS).<\/li>\n<li>Consider using a web application firewall (WAF) to block potentially malicious requests.<\/li>\n<li>Use the IoCs and TTPs shared below for threat detection and hunting in your network.<\/li>\n<\/ul>\n<p><strong>The following IOCs come from the incident we described and others shared by the community.<\/strong><\/p>\n<div class=\"c-responsive-table td-min-width-0 padding-slim th-no-wrap\">\n<table>\n<tbody>\n<tr>\n<th><strong>Type<\/strong><\/th>\n<th><strong>Indicators<\/strong><\/th>\n<\/tr>\n<tr>\n<td>IP addresses<\/td>\n<td><strong>Seen in our incident:<\/strong>\n<p>141[.]136[.]43[.]188 (IPv4) \/ 2a02:4780:a:952:0:1e10:e79b:1 (IPv6)<\/p>\n<p>144[.]202[.]21[.]16<\/p>\n<p>185[.]56[.]83[.]82<\/p>\n<p>95[.]179[.]241[.]10<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Seen in other incidents:<\/strong><\/p>\n<p>45[.]77[.]160[.]195<\/p>\n<p>216[.]245[.]184[.]86<\/td>\n<\/tr>\n<tr>\n<td width=\"94\">URLs \/ Domains<\/td>\n<td width=\"577\"><strong>Seen in our incident:<\/strong>\n<p>mci11[.]raow[.]fun<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Seen in other incidents:<\/strong><\/p>\n<p>hxxp[:]\/\/45.227.255[.]213:20201<\/p>\n<p>hxxp[:]\/\/68[.]178.202.116<\/p>\n<p>jxqmwbgxygkyftpxykdk8cfkq1hy371pz.oast[.]fun<\/td>\n<\/tr>\n<tr>\n<td width=\"94\">Hostnames<\/td>\n<td width=\"577\">&#8220;VULTR-GUEST&#8221;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div class=\"c-responsive-table td-min-width-0 padding-slim th-no-wrap\">\n<table>\n<tbody>\n<tr>\n<th><strong>ATT&amp;CK TTP<\/strong><\/th>\n<th><strong>Procedure examples<\/strong><\/th>\n<th><strong>Detection<\/strong><\/th>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1190\/\" target=\"_blank\" rel=\"noopener\">T1190 \u2013 Exploit Public-Facing Application<\/a><\/td>\n<td>SQL injection like statements in application specific folders<\/td>\n<td>Network<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1219\/\" target=\"_blank\" rel=\"noopener\">T1219 \u2013 Remote Access Software<\/a><\/td>\n<td>Common RMM IP\/domain connections<\/td>\n<td>Network<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1059\/003\/\" target=\"_blank\" rel=\"noopener\">T1059.003 \u2013 Windows Command Shell<\/a><\/td>\n<td>Certutil.exe running on command shell<\/td>\n<td>Endpoint<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1059\/001\/\" target=\"_blank\" rel=\"noopener\">T1059.001 \u2013 PowerShell<\/a><\/td>\n<td>Suspicious powershell.exe commands<\/td>\n<td>Endpoint<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1027\/\" target=\"_blank\" rel=\"noopener\">T1027 \u2013 Command Obfuscation<\/a><\/td>\n<td>Use of CHAR() on SQL injection payloads<\/td>\n<td>Endpoint<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1105\/\" target=\"_blank\" rel=\"noopener\">T1105 \u2013 Ingress tool transfer<\/a><\/td>\n<td>Certutil.exe downloading binaries<\/td>\n<td>Endpoint<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1133\/\" target=\"_blank\" rel=\"noopener\">T1133 \u2013 External remote services<\/a><\/td>\n<td>Connections to\/from VPN networks\n<p>Connections to new sites from appliance servers<\/td>\n<td>Network<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1218\/007\/\" target=\"_blank\" rel=\"noopener\">T1218.007 \u2013 Msiexec<\/a><\/td>\n<td>Msiexec.exe executing malicious payloads<\/td>\n<td>Endpoint<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>&nbsp;<\/p>\n<p><center><a href=\"\/resources\/connectfun-threat-briefing\/\"  title=\"Access The Full Report\" class=\"c-btn c-btn--primary icon-position-right\" target=\"new\"><span class=\"cta-button-text\">Access The Full Report<\/span><\/a><\/center>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a new threat briefing, Forescout Research \u2013 Vedere Labs details an exploitation campaign targeting organizations running Fortinet\u2019s FortiClient EMS which is vulnerable to CVE-2023-48788. We are designating this campaign Connect:fun because of the use of ScreenConnect and Powerfun as post-exploitation tools \u2013 our first-ever named campaign. Here are details of an incident targeting a [&hellip;]<\/p>\n","protected":false},"author":181,"featured_media":86791,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[562,540],"tags":[],"coauthors":[748],"class_list":["post-86781","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-views","category-research-and-cyber-alerts"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Connect:fun: New exploit campaign in the wild targets media company - Forescout<\/title>\n<meta name=\"description\" content=\"Forescout\u2019s Vedere Labs exposes the cybersecurity threat campaign exploit Connect:fun in vulnerability CVE-2023-48788 in Fortinet software.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/blog\/connectfun-new-exploit-campaign-in-the-wild-targets-media-company\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Connect:fun: New exploit campaign in the wild targets media company - Forescout\" \/>\n<meta property=\"og:description\" content=\"Forescout\u2019s Vedere Labs exposes the cybersecurity threat campaign exploit Connect:fun in vulnerability CVE-2023-48788 in Fortinet software.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/blog\/connectfun-new-exploit-campaign-in-the-wild-targets-media-company\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-11T17:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-11T20:31:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-Connect-Fun-Nav-v1-1200x628-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sai Molige\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Forescout\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.forescout.com\/blog\/connectfun-new-exploit-campaign-in-the-wild-targets-media-company\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/connectfun-new-exploit-campaign-in-the-wild-targets-media-company\/\"},\"author\":{\"name\":\"Sai Molige\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/6f75072e0c8de02ffad63cd244f136d9\"},\"headline\":\"Connect:fun: New exploit campaign in the wild targets media company\",\"datePublished\":\"2024-04-11T17:30:00+00:00\",\"dateModified\":\"2024-04-11T20:31:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/connectfun-new-exploit-campaign-in-the-wild-targets-media-company\/\"},\"wordCount\":1348,\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/connectfun-new-exploit-campaign-in-the-wild-targets-media-company\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-Connect-Fun-Nav-v1-1200x628-1.png\",\"articleSection\":[\"News &amp; Views\",\"Research &amp; Cyber Alerts\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/blog\/connectfun-new-exploit-campaign-in-the-wild-targets-media-company\/\",\"url\":\"https:\/\/www.forescout.com\/blog\/connectfun-new-exploit-campaign-in-the-wild-targets-media-company\/\",\"name\":\"Connect:fun: New exploit campaign in the wild targets media company - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/connectfun-new-exploit-campaign-in-the-wild-targets-media-company\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/connectfun-new-exploit-campaign-in-the-wild-targets-media-company\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-Connect-Fun-Nav-v1-1200x628-1.png\",\"datePublished\":\"2024-04-11T17:30:00+00:00\",\"dateModified\":\"2024-04-11T20:31:18+00:00\",\"description\":\"Forescout\u2019s Vedere Labs exposes the cybersecurity threat campaign exploit Connect:fun in vulnerability CVE-2023-48788 in Fortinet software.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/connectfun-new-exploit-campaign-in-the-wild-targets-media-company\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/blog\/connectfun-new-exploit-campaign-in-the-wild-targets-media-company\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/blog\/connectfun-new-exploit-campaign-in-the-wild-targets-media-company\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-Connect-Fun-Nav-v1-1200x628-1.png\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-Connect-Fun-Nav-v1-1200x628-1.png\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/blog\/connectfun-new-exploit-campaign-in-the-wild-targets-media-company\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Connect:fun: New exploit campaign in the wild targets media company\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/6f75072e0c8de02ffad63cd244f136d9\",\"name\":\"Sai Molige\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/image\/969ddeee0c69c8cd3d20666775276a76\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fbe09c874db82828feb0fc6515364ce80d45b0999f559803c83c08ac01ce9097?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fbe09c874db82828feb0fc6515364ce80d45b0999f559803c83c08ac01ce9097?s=96&d=mm&r=g\",\"caption\":\"Sai Molige\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Connect:fun: New exploit campaign in the wild targets media company - Forescout","description":"Forescout\u2019s Vedere Labs exposes the cybersecurity threat campaign exploit Connect:fun in vulnerability CVE-2023-48788 in Fortinet software.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/blog\/connectfun-new-exploit-campaign-in-the-wild-targets-media-company\/","og_locale":"en_US","og_type":"article","og_title":"Connect:fun: New exploit campaign in the wild targets media company - Forescout","og_description":"Forescout\u2019s Vedere Labs exposes the cybersecurity threat campaign exploit Connect:fun in vulnerability CVE-2023-48788 in Fortinet software.","og_url":"https:\/\/www.forescout.com\/blog\/connectfun-new-exploit-campaign-in-the-wild-targets-media-company\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_published_time":"2024-04-11T17:30:00+00:00","article_modified_time":"2024-04-11T20:31:18+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-Connect-Fun-Nav-v1-1200x628-1.png","type":"image\/png"}],"author":"Sai Molige","twitter_card":"summary_large_image","twitter_creator":"@Forescout","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.forescout.com\/blog\/connectfun-new-exploit-campaign-in-the-wild-targets-media-company\/#article","isPartOf":{"@id":"https:\/\/www.forescout.com\/blog\/connectfun-new-exploit-campaign-in-the-wild-targets-media-company\/"},"author":{"name":"Sai Molige","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/6f75072e0c8de02ffad63cd244f136d9"},"headline":"Connect:fun: New exploit campaign in the wild targets media company","datePublished":"2024-04-11T17:30:00+00:00","dateModified":"2024-04-11T20:31:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/connectfun-new-exploit-campaign-in-the-wild-targets-media-company\/"},"wordCount":1348,"publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/connectfun-new-exploit-campaign-in-the-wild-targets-media-company\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-Connect-Fun-Nav-v1-1200x628-1.png","articleSection":["News &amp; Views","Research &amp; Cyber Alerts"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/blog\/connectfun-new-exploit-campaign-in-the-wild-targets-media-company\/","url":"https:\/\/www.forescout.com\/blog\/connectfun-new-exploit-campaign-in-the-wild-targets-media-company\/","name":"Connect:fun: New exploit campaign in the wild targets media company - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/connectfun-new-exploit-campaign-in-the-wild-targets-media-company\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/connectfun-new-exploit-campaign-in-the-wild-targets-media-company\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-Connect-Fun-Nav-v1-1200x628-1.png","datePublished":"2024-04-11T17:30:00+00:00","dateModified":"2024-04-11T20:31:18+00:00","description":"Forescout\u2019s Vedere Labs exposes the cybersecurity threat campaign exploit Connect:fun in vulnerability CVE-2023-48788 in Fortinet software.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/blog\/connectfun-new-exploit-campaign-in-the-wild-targets-media-company\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/blog\/connectfun-new-exploit-campaign-in-the-wild-targets-media-company\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/blog\/connectfun-new-exploit-campaign-in-the-wild-targets-media-company\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-Connect-Fun-Nav-v1-1200x628-1.png","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-Connect-Fun-Nav-v1-1200x628-1.png","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/blog\/connectfun-new-exploit-campaign-in-the-wild-targets-media-company\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Connect:fun: New exploit campaign in the wild targets media company"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]},{"@type":"Person","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/6f75072e0c8de02ffad63cd244f136d9","name":"Sai Molige","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/image\/969ddeee0c69c8cd3d20666775276a76","url":"https:\/\/secure.gravatar.com\/avatar\/fbe09c874db82828feb0fc6515364ce80d45b0999f559803c83c08ac01ce9097?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fbe09c874db82828feb0fc6515364ce80d45b0999f559803c83c08ac01ce9097?s=96&d=mm&r=g","caption":"Sai Molige"}}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/FS-2024-VL-Connect-Fun-Nav-v1-1200x628-1.png","is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/86781","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/181"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=86781"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/86781\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/86791"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=86781"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/categories?post=86781"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/tags?post=86781"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=86781"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}