Chinese APT Actors Compromising PulseSecure VPN Devices
released on 2021-05-27 @ 07:34:39 PM
Mandiant continues to gather evidence and respond to intrusions involving compromises of Pulse Secure VPN appliances at organizations across the defense, government, high tech, transportation, and financial sectors in the U.S. and Europe (Figure 1).
Reverse engineers on the FLARE team have identified four additional code families specifically designed to manipulate Pulse Secure devices.
We now assess that espionage activity by UNC2630 and UNC2717 supports key Chinese government priorities. Many compromised organizations operate in verticals and industries aligned with Beijing’s strategic objectives outlined in China’s recent 14th Five Year Plan.