New research reveals that over 4 million systems on the internet, including VPN servers, home routers, and core network infrastructure, are vulnerable to attacks due to flaws in tunneling protocols. Conducted by Mathy Vanhoef, a KU Leuven professor, and PhD student Angelos Beitis, in collaboration with Top10VPN, the study highlights weaknesses in tunneling protocols like IPIP/IP6IP6, GRE/GRE6, and 4in6. These protocols, essential for transporting data between networks, often fail to authenticate sender identities, enabling attackers to exploit this lack of security. By sending specially crafted packets with a victim's IP address, malicious actors can cause vulnerable systems to forward these packets to the target, facilitating various types of attacks. These include DoS attacks, DNS spoofing, and even gaining access to internal networks or IoT devices. A scan conducted by the researchers identified 4.26 million vulnerable hosts, including over 1.8 million capable of spoofing attacks. These spoofing-capable systems can mask an attacker’s real IP address, making them harder to trace and secure, thereby increasing the risk of anonymous cyberattacks. The majority of vulnerable hosts were found in China and France. The vulnerabilities are tracked under CVE-2024-7595, CVE-2025-23018, CVE-2025-23019, and CVE-2024-7596. To mitigate risks, the researchers provide defense recommendations for individual hosts, ISPs, and network operators. For detailed technical insights and mitigation strategies, the researchers have published both an academic paper and a blog post.
A large-scale phishing campaign has been identified leveraging RFQ (Request for Quotation) themed emails to distribute credential-stealing malware. Attackers disguise malicious HTM...
Two critical vulnerabilities in Progress ShareFile have been identified that can be chained to achieve pre-authentication remote code execution (RCE). Discovered by watchTowr resea...
The FBI has issued a warning highlighting potential security and privacy risks associated with widely used mobile applications developed by Chinese companies. These applications, a...