HC3 Threat Briefing TLP White - Pulse Secure VPN Servers Leak: Incident Case Study

August 27, 2020

If your organization uses Pulse Secure VPN, ensure that you have patched this vulnerability by updating to

• Version 8.2R12.1 or later
• Version 8.3R7.1 or later
• Version 9.0R3.4 or later

Patches for this vulnerability were published in April 2019 and are available through the Pulse Secure Download Center at https://my.pulsesecure.net. There is no other mitigation for this vulnerability.

Once you have patched, change your organization’s passwords to avoid threat actors abusing already-leaked
credentials. Read more under key resources.

Related Resources

Special Bulletin
Member
Federal agencies this morning are providing new information on an imminent ransomware threat to U.S. hospitals.
Special Bulletin
Member
The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Health and Human Services (HHS)…
Issue Landing Page
The number of large-scale data breaches at American health care organization increased 65% from 2010 to 2016. As a result, federal agencies are increasing…
Guides/Reports
Trusted insiders, both witting and unwitting, can cause grave harm to your organizations facilities, resources, information, and personnel. Insider incidents…
Standards/Guidelines
Public
Agent Tesla is an established Remote Access Trojan (RAT) written in .Net. A successful deployment of Agent Tesla provides attackers with full computer or…
Webinar Recordings
Public
This guide provides participants with instructions and helpful tips for the Health Sector Cybersecurity Coordination Center (HC3) Cybersecurity Threat Briefing…