{"id":6605,"date":"2023-03-06T20:17:28","date_gmt":"2023-03-06T20:17:28","guid":{"rendered":"https:\/\/sajinshivdas.com\/security\/target\/popular-ibm-file-transfer-tool-vulnerable-to-cyberattacks-cisa-says\/"},"modified":"2023-03-28T06:46:52","modified_gmt":"2023-03-28T06:46:52","slug":"cisa-warns-that-cybercriminals-may-exploit-a-popular-ibm-file-transfer-program","status":"publish","type":"post","link":"https:\/\/sajinshivdas.com\/cybersecurity\/cisa-warns-that-cybercriminals-may-exploit-a-popular-ibm-file-transfer-program\/","title":{"rendered":"CISA has issued a warning that Hackers may target a well-known IBM File Transfer Application."},"content":{"rendered":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]According to the Cybersecurity and Infrastructure Security Agency, a critical flaw is being actively exploited by hackers in the widely-used IBM Aspera Faspex file transfer application. (CISA).<\/p>\n<p>This vulnerability, tracked as CVE-2022-47986, was one of three flaws in the Mitel corporate telephony system that were added to CISA&#8217;s database of exploitable flaws this week.<\/p>\n<p>There are &#8220;significant risks to the federal enterprise,&#8221; according to the agency, because of the IBM flaw. While CISA&#8217;s notifications are intended for the federal government, many of the same precautions should be taken in the private sector.<\/p>\n<p>This news comes after researchers in the field of security issued multiple warnings over the course of the previous month. The <a href=\"https:\/\/www.ibm.com\/docs\/en\/aspera-faspex\/4.4?topic=notes-release-aspera-faspex-442\">18th of January<\/a> was the day IBM released a fix.<\/p>\n<p>The <a href=\"https:\/\/exchange.xforce.ibmcloud.com\/vulnerabilities\/243512?_ga=2.144386998.242592355.1677167633-318618400.1677167633\">CVSS score<\/a> of this vulnerability is 9.8, and federal civilian agencies have until March 14 to implement a fix.<\/p>\n<p>According to Bud Broomhead, CEO of cybersecurity firm Viakoo, Aspera is so popular that it was awarded an Emmy in 2014 for facilitating speedier media production workflows by allowing businesses to rapidly transfer huge video files.<\/p>\n<p>According to Broomhead, Aspera has been the go-to option for many years for businesses in industries such as genomics and biomedical research, media production, military signals intelligence, and financial services that need to move massive datasets.<\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/therecord.media\/wp-content\/uploads\/2023\/02\/Screen-Shot-2023-02-23-at-3.38.24-PM.png\" sizes=\"(max-width: 305px) 100vw, 305px\" srcset=\"https:\/\/therecord.media\/wp-content\/uploads\/2023\/02\/Screen-Shot-2023-02-23-at-3.38.24-PM.png 546w, https:\/\/therecord.media\/wp-content\/uploads\/2023\/02\/Screen-Shot-2023-02-23-at-3.38.24-PM-201x300.png 201w, https:\/\/therecord.media\/wp-content\/uploads\/2023\/02\/Screen-Shot-2023-02-23-at-3.38.24-PM-36x53.png 36w, https:\/\/therecord.media\/wp-content\/uploads\/2023\/02\/Screen-Shot-2023-02-23-at-3.38.24-PM-168x250.png 168w, https:\/\/therecord.media\/wp-content\/uploads\/2023\/02\/Screen-Shot-2023-02-23-at-3.38.24-PM-124x185.png 124w, https:\/\/therecord.media\/wp-content\/uploads\/2023\/02\/Screen-Shot-2023-02-23-at-3.38.24-PM-156x233.png 156w, https:\/\/therecord.media\/wp-content\/uploads\/2023\/02\/Screen-Shot-2023-02-23-at-3.38.24-PM-103x153.png 103w, https:\/\/therecord.media\/wp-content\/uploads\/2023\/02\/Screen-Shot-2023-02-23-at-3.38.24-PM-254x378.png 254w\" alt=\"\" \/><\/p>\n<p>Broomhead further noted that the vulnerability is straightforward to exploit and would allow a remote attacker to perform actions on a device without first bypassing network authentication procedures.<\/p>\n<p>After conducting a search on the internet scanning engine Shodan, we found that 138 instances of Aspera Faspex were available to the public. Following IBM&#8217;s publication of the fix, cybersecurity firm <a href=\"https:\/\/twitter.com\/Shadowserver\/status\/1625031735460208642\">ShadowServer<\/a> also stated it had witnessed attempts to exploit the vulnerability.<\/p>\n<p><a href=\"https:\/\/blog.assetnote.io\/2023\/02\/02\/pre-auth-rce-aspera-faspex\/\">AssetNote<\/a>, a security firm, reported the flaw to IBM on October 6 and said it waited a week after the patch was released before publishing the exploit code on its blog.<\/p>\n<p>According to Ryan Cribelar of Nucleus Security, the solution is utilized by major corporations for the swift and secure transmission of massive files or data sets over great distances.<\/p>\n<p>It&#8217;s used by the government, the healthcare sector, and the financial sector, among others. Since it is an IBM product and has been around for quite some time, and since most businesses use numerous IBM products if they use any, it is safe to infer that there is a sizable user base for it.<\/p>\n<p>Cribelar said the flaw is appealing to attackers for two reasons.<\/p>\n<p>He explained that when internal vulnerability management programs evolve, &#8220;it might live on a device that doesn&#8217;t get as consistent scanning coverage as other devices,&#8221; and the responsibility for the device&#8217;s upkeep could be forgotten. The vulnerability may remain on the device for a longer period of time because of these two causes.<\/p>\n<p>With the addition of Cribelar&#8217;s observation that the susceptible software is often located on the network&#8217;s outer perimeter, it becomes a valuable portal for hackers to achieve persistence in a victim&#8217;s system without the risk of being caught quickly.<\/p>\n<p>After last week&#8217;s hack at one of the top healthcare providers in the United States, affecting <a href=\"https:\/\/therecord.media\/fortra-goanywhere-clop-attacks-response\/\">over 1 million people<\/a>, this is the latest file transfer mechanism to be attacked.<\/p>\n<p>More than 130 businesses were compromised by the <a href=\"https:\/\/therecord.media\/tag\/clop\/\">Clop ransomware group<\/a>, according to an announcement made to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/clop-ransomware-claims-it-breached-130-orgs-using-goanywhere-zero-day\/\">BleepingComputer<\/a>.<\/p>\n<p>In 2021, hackers exploited flaws in another file transmission service, Accellion, to <a href=\"https:\/\/www.zdnet.com\/article\/accellion-to-retire-product-at-the-heart-of-recent-hacks\/\">routinely<\/a> attack banks, government agencies, universities, and businesses.<\/p>\n[\/vc_column_text][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221;&#8230;<\/p>\n","protected":false},"author":1,"featured_media":7042,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,6],"tags":[35,74],"class_list":{"0":"post-6605","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-attack","8":"category-vulnerability-assessment","9":"tag-cyber-attack","10":"tag-vulnerability"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISA has issued a warning that Hackers may target a well-known IBM File Transfer Application. - Sajin Shivdas | Cybersecurity<\/title>\n<meta name=\"description\" content=\"According to the Cybersecurity and Infrastructure Security Agency, a critical flaw is being actively exploited by hackers in the widely-used IBM Aspera\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sajinshivdas.com\/cybersecurity\/cisa-warns-that-cybercriminals-may-exploit-a-popular-ibm-file-transfer-program\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISA has issued a warning that Hackers may target a well-known IBM File Transfer Application. - Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"According to the Cybersecurity and Infrastructure Security Agency, a critical flaw is being actively exploited by hackers in the widely-used IBM Aspera\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/cisa-warns-that-cybercriminals-may-exploit-a-popular-ibm-file-transfer-program\/\" \/>\n<meta property=\"og:site_name\" content=\"Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-06T20:17:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-28T06:46:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/03\/corporate-security-business-protection-locks-virtual-screen.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"750\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sajin Shivdas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sajin Shivdas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cisa-warns-that-cybercriminals-may-exploit-a-popular-ibm-file-transfer-program\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cisa-warns-that-cybercriminals-may-exploit-a-popular-ibm-file-transfer-program\\\/\"},\"author\":{\"name\":\"Sajin Shivdas\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"headline\":\"CISA has issued a warning that Hackers may target a well-known IBM File Transfer Application.\",\"datePublished\":\"2023-03-06T20:17:28+00:00\",\"dateModified\":\"2023-03-28T06:46:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cisa-warns-that-cybercriminals-may-exploit-a-popular-ibm-file-transfer-program\\\/\"},\"wordCount\":751,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cisa-warns-that-cybercriminals-may-exploit-a-popular-ibm-file-transfer-program\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/corporate-security-business-protection-locks-virtual-screen.jpg\",\"keywords\":[\"Cyber Attack\",\"Vulnerability\"],\"articleSection\":[\"Cyber Attack\",\"Vulnerability\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cisa-warns-that-cybercriminals-may-exploit-a-popular-ibm-file-transfer-program\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cisa-warns-that-cybercriminals-may-exploit-a-popular-ibm-file-transfer-program\\\/\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cisa-warns-that-cybercriminals-may-exploit-a-popular-ibm-file-transfer-program\\\/\",\"name\":\"CISA has issued a warning that Hackers may target a well-known IBM File Transfer Application. - Sajin Shivdas | Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cisa-warns-that-cybercriminals-may-exploit-a-popular-ibm-file-transfer-program\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cisa-warns-that-cybercriminals-may-exploit-a-popular-ibm-file-transfer-program\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/corporate-security-business-protection-locks-virtual-screen.jpg\",\"datePublished\":\"2023-03-06T20:17:28+00:00\",\"dateModified\":\"2023-03-28T06:46:52+00:00\",\"description\":\"According to the Cybersecurity and Infrastructure Security Agency, a critical flaw is being actively exploited by hackers in the widely-used IBM Aspera\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cisa-warns-that-cybercriminals-may-exploit-a-popular-ibm-file-transfer-program\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cisa-warns-that-cybercriminals-may-exploit-a-popular-ibm-file-transfer-program\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cisa-warns-that-cybercriminals-may-exploit-a-popular-ibm-file-transfer-program\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/corporate-security-business-protection-locks-virtual-screen.jpg\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/corporate-security-business-protection-locks-virtual-screen.jpg\",\"width\":1500,\"height\":750},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cisa-warns-that-cybercriminals-may-exploit-a-popular-ibm-file-transfer-program\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISA has issued a warning that Hackers may target a well-known IBM File Transfer Application.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\",\"name\":\"sajinshivdas.com\",\"description\":\"Cybersecurity - Information security Resources, Articles and Latest News\",\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"alternateName\":\"Sajin Shivdas\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\",\"name\":\"Sajin Shivdas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"width\":1000,\"height\":500,\"caption\":\"Sajin Shivdas\"},\"logo\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\"},\"sameAs\":[\"http:\\\/\\\/sajinshivdas.com\\\/security\",\"www.linkedin.com\\\/in\\\/sajin-shivdas\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CISA has issued a warning that Hackers may target a well-known IBM File Transfer Application. - Sajin Shivdas | Cybersecurity","description":"According to the Cybersecurity and Infrastructure Security Agency, a critical flaw is being actively exploited by hackers in the widely-used IBM Aspera","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sajinshivdas.com\/cybersecurity\/cisa-warns-that-cybercriminals-may-exploit-a-popular-ibm-file-transfer-program\/","og_locale":"en_US","og_type":"article","og_title":"CISA has issued a warning that Hackers may target a well-known IBM File Transfer Application. - Sajin Shivdas | Cybersecurity","og_description":"According to the Cybersecurity and Infrastructure Security Agency, a critical flaw is being actively exploited by hackers in the widely-used IBM Aspera","og_url":"https:\/\/sajinshivdas.com\/cybersecurity\/cisa-warns-that-cybercriminals-may-exploit-a-popular-ibm-file-transfer-program\/","og_site_name":"Sajin Shivdas | Cybersecurity","article_published_time":"2023-03-06T20:17:28+00:00","article_modified_time":"2023-03-28T06:46:52+00:00","og_image":[{"width":1500,"height":750,"url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/03\/corporate-security-business-protection-locks-virtual-screen.jpg","type":"image\/jpeg"}],"author":"Sajin Shivdas","twitter_misc":{"Written by":"Sajin Shivdas","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cisa-warns-that-cybercriminals-may-exploit-a-popular-ibm-file-transfer-program\/#article","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cisa-warns-that-cybercriminals-may-exploit-a-popular-ibm-file-transfer-program\/"},"author":{"name":"Sajin Shivdas","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"headline":"CISA has issued a warning that Hackers may target a well-known IBM File Transfer Application.","datePublished":"2023-03-06T20:17:28+00:00","dateModified":"2023-03-28T06:46:52+00:00","mainEntityOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cisa-warns-that-cybercriminals-may-exploit-a-popular-ibm-file-transfer-program\/"},"wordCount":751,"commentCount":0,"publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cisa-warns-that-cybercriminals-may-exploit-a-popular-ibm-file-transfer-program\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/03\/corporate-security-business-protection-locks-virtual-screen.jpg","keywords":["Cyber Attack","Vulnerability"],"articleSection":["Cyber Attack","Vulnerability"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sajinshivdas.com\/cybersecurity\/cisa-warns-that-cybercriminals-may-exploit-a-popular-ibm-file-transfer-program\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cisa-warns-that-cybercriminals-may-exploit-a-popular-ibm-file-transfer-program\/","url":"https:\/\/sajinshivdas.com\/cybersecurity\/cisa-warns-that-cybercriminals-may-exploit-a-popular-ibm-file-transfer-program\/","name":"CISA has issued a warning that Hackers may target a well-known IBM File Transfer Application. - Sajin Shivdas | Cybersecurity","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cisa-warns-that-cybercriminals-may-exploit-a-popular-ibm-file-transfer-program\/#primaryimage"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cisa-warns-that-cybercriminals-may-exploit-a-popular-ibm-file-transfer-program\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/03\/corporate-security-business-protection-locks-virtual-screen.jpg","datePublished":"2023-03-06T20:17:28+00:00","dateModified":"2023-03-28T06:46:52+00:00","description":"According to the Cybersecurity and Infrastructure Security Agency, a critical flaw is being actively exploited by hackers in the widely-used IBM Aspera","breadcrumb":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cisa-warns-that-cybercriminals-may-exploit-a-popular-ibm-file-transfer-program\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sajinshivdas.com\/cybersecurity\/cisa-warns-that-cybercriminals-may-exploit-a-popular-ibm-file-transfer-program\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cisa-warns-that-cybercriminals-may-exploit-a-popular-ibm-file-transfer-program\/#primaryimage","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/03\/corporate-security-business-protection-locks-virtual-screen.jpg","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/03\/corporate-security-business-protection-locks-virtual-screen.jpg","width":1500,"height":750},{"@type":"BreadcrumbList","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cisa-warns-that-cybercriminals-may-exploit-a-popular-ibm-file-transfer-program\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sajinshivdas.com\/cybersecurity\/"},{"@type":"ListItem","position":2,"name":"CISA has issued a warning that Hackers may target a well-known IBM File Transfer Application."}]},{"@type":"WebSite","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website","url":"https:\/\/sajinshivdas.com\/cybersecurity\/","name":"sajinshivdas.com","description":"Cybersecurity - Information security Resources, Articles and Latest News","publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"alternateName":"Sajin Shivdas","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sajinshivdas.com\/cybersecurity\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6","name":"Sajin Shivdas","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","width":1000,"height":500,"caption":"Sajin Shivdas"},"logo":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png"},"sameAs":["http:\/\/sajinshivdas.com\/security","www.linkedin.com\/in\/sajin-shivdas"]}]}},"_links":{"self":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/6605","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/comments?post=6605"}],"version-history":[{"count":0,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/6605\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media\/7042"}],"wp:attachment":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media?parent=6605"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/categories?post=6605"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/tags?post=6605"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}