{"id":10299,"date":"2020-04-20T01:52:58","date_gmt":"2020-04-20T01:52:58","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=10299"},"modified":"2026-04-17T18:07:49","modified_gmt":"2026-04-17T18:07:49","slug":"overseas-apt-organization-exploits-vulnerabilities-to-breach-sangfor-ssl-vpns-and-deliver-malicious-code-threat-alert","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/overseas-apt-organization-exploits-vulnerabilities-to-breach-sangfor-ssl-vpns-and-deliver-malicious-code-threat-alert\/","title":{"rendered":"Overseas APT Organization Exploits Vulnerabilities to Breach Sangfor SSL VPNs and Deliver Malicious Code Threat Alert"},"content":{"rendered":"<p><!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\"><br \/>\n<html><body><\/p>\n<h2><strong>Overview<\/strong><\/h2>\n<p>On April 6, Sangfor released an advisory, announcing that an overseas APT organization illegally took control of some of their SSL VPN devices and sent malicious files to clients by exploiting a client upgrade vulnerability. NSFOCUS has kept a close eye on this issue and conducted overall analysis. We advise related users to take precautions as soon as possible.<\/p>\n<p>The vulnerability exists due to the defect of the upgrade module signature authentication mechanism of the Windows client of SSL VPN devices. The prerequisite for exploitation is that attackers must take control of SSL VPN privileges. According to Sangfor&#8217;s analysis, this vulnerability is difficult to exploit. Therefore, Sangfor estimates that there are only a limited number of affected VPN devices. According to the NSFOCUS security team, not many VPN devices have been compromised by the APT organization, but the affected versions are widely used in enterprises in China.<\/p>\n<p><!--more--><\/p>\n<p><strong>Reference link:<\/strong><\/p>\n<p>https:\/\/mp.weixin.qq.com\/s\/lKp_3kPNEycXqfCnVPxoDw<\/p>\n<h2><strong>Scope of Impact<\/strong><\/h2>\n<p>As confirmed by Sangfor, the following versions of SSL VPN are affected:<\/p>\n<ul>\n<li>M6.3R1<\/li>\n<li>M6.1<\/li>\n<\/ul>\n<h2><strong>Mitigations<\/strong><\/h2>\n<ul>\n<li>\n<h3><strong>Protection with Security Products<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p>Indicators of Compromise (IoCs) of the vulnerability are as follows:<\/p>\n<ol>\n<li>C&amp;C: 103.216.221.19<\/li>\n<li>File name: SangforUD.EXE, MD5: a32e1202257a2945bf0f878c58490af8,<\/li>\n<li>File name: SangforUD.EXE, MD5: 967fcf185634def5177f74b0f703bdc0<\/li>\n<li>File name: SangforUD.EXE, MD5: c5d5cb99291fa4b2a68b5ea3ff9d9f9a<\/li>\n<li>File name: e58b8de07372b9913ca2fbd3b103bb8f.virus, MD5: e58b8de07372b9913ca2fbd3b103bb8f<\/li>\n<li>File name: m.exe, MD5: 429be60f0e444f4d9ba1255e88093721<\/li>\n<li>File name: 93e9383ae8ad2371d457fc4c1035157d887a84bbfe66fbbb3769c5637de59c75, MD5: 18427cdcb5729a194954f0a6b5c0835a<\/li>\n<li>File name: SANARISOR.EXE, MD5: a93ece16bf430431f9cae0125701f527<\/li>\n<\/ol>\n<p><strong>&Acirc;&nbsp;TAC Protection<\/strong><\/p>\n<p>NSFOCUS Threat Analysis Center (TAC) can detect malicious samples involved in the attack event. Therefore, users who have deployed NSFOCUS TAC are advised to pay attention to related alerts and configure blocking policies.<\/p>\n<p><strong>NTI<\/strong><\/p>\n<p>NSFOCUS Threat Intelligence (NTI) can detect IoCs involved in the attack event by precisely identifying malicious IP addresses and files. Therefore, related users are advised to pay attention to alert messages related to the malicious IP address 103.216.221.19. As of the day when this alert is released, the C&amp;C server has been disabled. Users can use the IoCs released by NTI for detection and then use a dedicated tool to remove trojan files.<\/p>\n<h3><strong>Other Protection Suggestions<\/strong><\/h3>\n<ol>\n<li>Check whether administrative accounts are abnormally logged in and whether %USERPROFILE%\\AppData\\Roaming\\Sangfor\\SSL\\SangforUPD.exe is replaced by querying VPN server logs.<\/li>\n<li>Restrict access to the console management port 4430 of the VPN server from an external network or an untrusted IP address, so as to prevent hackers from launching attacks against the console management interface of VPN server.<\/li>\n<li>Enhance account protection by using a more complex password, preventing brute-force cracking of administrative passwords.<\/li>\n<li>Install security software on both the VPN server and client so as to kill malicious programs timely and enable real-time protection.<\/li>\n<li>Keep a close eye on Sangfor&#8217;s solutions and fix the vulnerability as soon as possible.<\/li>\n<\/ol>\n<h2><strong>Appendix A Sample Analysis<\/strong><\/h2>\n<p>By checking the digital signature embedded in the sample, we found that the company name &#8220;Sangfor Technologies Inc.&#8221; is changed to &#8220;Sangfor Technologies Co.,Ltd&#8221;, which can hardly identify by common users.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-1.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-10300\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"553\" height=\"167\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-1.jpg 553w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-1-300x91.jpg 300w\" sizes=\"(max-width: 553px) 100vw, 553px\" \/><\/a><\/p>\n<p>Create a directory: %USERPROFILE%\\AppData\\Roaming\\Sangfor\\SSL\\.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-2.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-10301\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-2.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"531\" height=\"632\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-2.jpg 531w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-2-252x300.jpg 252w\" sizes=\"(max-width: 531px) 100vw, 531px\" \/><\/a><\/p>\n<p>After the directory is created, copy it to %USERPROFILE%\\AppData\\Roaming\\Sangfor\\SSL\\SangforUPD.exe.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-3.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-10302\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-3.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"453\" height=\"477\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-3.jpg 453w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-3-285x300.jpg 285w\" sizes=\"(max-width: 453px) 100vw, 453px\" \/><\/a><\/p>\n<p>Traverse the local directory and obtain all file names.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-4.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-10303\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-4.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"531\" height=\"408\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-4.jpg 531w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-4-300x231.jpg 300w\" sizes=\"(max-width: 531px) 100vw, 531px\" \/><\/a><\/p>\n<p>Connect to the target server port 80 and return obtained data via HTTP POST.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-5.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-10304\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-5.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"531\" height=\"359\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-5.jpg 531w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-5-300x203.jpg 300w\" sizes=\"(max-width: 531px) 100vw, 531px\" \/><\/a><\/p>\n<p>Create a system task using the COM library to maintain privileges.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-6.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-10305\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-6.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"556\" height=\"196\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-6.jpg 556w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-6-300x106.jpg 300w\" sizes=\"(max-width: 556px) 100vw, 556px\" \/><\/a><\/p>\n<p>Run the following system commands to obtain information of the target system.<\/p>\n<table width=\"0\">\n<tbody>\n<tr>\n<td width=\"568\"><code>systeminfo.exe<\/code><\/p>\n<p><code>ipconfig.exe \/all<\/code><\/p>\n<p><code>cmd.exe \/c set<\/code><\/p>\n<p><code>net.exe user<\/code><\/p>\n<p><code>HOSTNAME.EXE<\/code><\/p>\n<p><code>net.exe user \/domain<\/code><\/p>\n<p><code>net.exe group \/domain<\/code><\/p>\n<p><code>tasklist.exe \/V<\/code><\/p>\n<p><code>whoami.exe \/all<\/code><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Snapshots of system command execution are as follows:<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-7.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-10306\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-7.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"531\" height=\"298\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-7.jpg 531w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-7-300x168.jpg 300w\" sizes=\"(max-width: 531px) 100vw, 531px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-8.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-10307\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-8.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"531\" height=\"760\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-8.jpg 531w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-8-210x300.jpg 210w\" sizes=\"(max-width: 531px) 100vw, 531px\" \/><\/a><\/p>\n<p>Establish a loop to obtain data from the server.<\/p>\n<p><strong>&Acirc;&nbsp;<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-10308\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-9.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"531\" height=\"393\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-9.jpg 531w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/04\/0420-9-300x222.jpg 300w\" sizes=\"(max-width: 531px) 100vw, 531px\" \/><\/strong><\/p>\n<h2><strong>Statement<\/strong><\/h2>\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n<h2><strong>About NSFOCUS<\/strong><\/h2>\n<p>NSFOCUS Technologies Group Co., Ltd., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. The company&#8217;s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide multi-layered, unified and dynamic protection against advanced cyber attacks.<\/p>\n<p>NSFOCUS works with Fortune Global 500 companies, including four of the world&#8217;s five largest financial institutions, organizations in insurance, retail, healthcare, critical infrastructure industries as well as government agencies. NSFOCUS has technology and channel partners in more than 60 countries, is a member of both the Microsoft Active Protections Program (MAPP), and the Cloud Security Alliance (CSA).<\/p>\n<p>A wholly owned subsidiary of NSFOCUS Technologies Group Co., Ltd., the company has operations in the Americas, Europe, the Middle East and Asia Pacific.<\/body><\/html><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview On April 6, Sangfor released an advisory, announcing that an overseas APT organization illegally took control of some of their SSL VPN devices and sent malicious files to clients by exploiting a client upgrade vulnerability. NSFOCUS has kept a close eye on this issue and conducted overall analysis. We advise related users to take [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":9738,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[6],"tags":[93],"class_list":["post-10299","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-emergency-response","tag-apt"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Overseas APT Organization Exploits Vulnerabilities to Breach Sangfor SSL VPNs and Deliver Malicious Code Threat Alert - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Overseas APT Organization Exploits Vulnerabilities to Breach Sangfor SSL VPNs and Deliver Malicious Code Threat Alert - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Overview On April 6, Sangfor released an advisory, announcing that an overseas APT organization illegally took control of some of their SSL VPN devices\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/overseas-apt-organization-exploits-vulnerabilities-to-breach-sangfor-ssl-vpns-and-deliver-malicious-code-threat-alert\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-20T01:52:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1209-9.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Overseas APT Organization Exploits Vulnerabilities to Breach Sangfor SSL VPNs and Deliver Malicious Code Threat Alert - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Overview On April 6, Sangfor released an advisory, announcing that an overseas APT organization illegally took control of some of their SSL VPN devices\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1209-9.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/overseas-apt-organization-exploits-vulnerabilities-to-breach-sangfor-ssl-vpns-and-deliver-malicious-code-threat-alert\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/overseas-apt-organization-exploits-vulnerabilities-to-breach-sangfor-ssl-vpns-and-deliver-malicious-code-threat-alert\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Overseas APT Organization Exploits Vulnerabilities to Breach Sangfor SSL VPNs and Deliver Malicious Code Threat Alert\",\"datePublished\":\"2020-04-20T01:52:58+00:00\",\"dateModified\":\"2026-04-17T18:07:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/overseas-apt-organization-exploits-vulnerabilities-to-breach-sangfor-ssl-vpns-and-deliver-malicious-code-threat-alert\\\/\"},\"wordCount\":897,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/overseas-apt-organization-exploits-vulnerabilities-to-breach-sangfor-ssl-vpns-and-deliver-malicious-code-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/1209-9.jpg\",\"keywords\":[\"APT\"],\"articleSection\":[\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/overseas-apt-organization-exploits-vulnerabilities-to-breach-sangfor-ssl-vpns-and-deliver-malicious-code-threat-alert\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/overseas-apt-organization-exploits-vulnerabilities-to-breach-sangfor-ssl-vpns-and-deliver-malicious-code-threat-alert\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/overseas-apt-organization-exploits-vulnerabilities-to-breach-sangfor-ssl-vpns-and-deliver-malicious-code-threat-alert\\\/\",\"name\":\"Overseas APT Organization Exploits Vulnerabilities to Breach Sangfor SSL VPNs and Deliver Malicious Code Threat Alert - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/overseas-apt-organization-exploits-vulnerabilities-to-breach-sangfor-ssl-vpns-and-deliver-malicious-code-threat-alert\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/overseas-apt-organization-exploits-vulnerabilities-to-breach-sangfor-ssl-vpns-and-deliver-malicious-code-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/1209-9.jpg\",\"datePublished\":\"2020-04-20T01:52:58+00:00\",\"dateModified\":\"2026-04-17T18:07:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/overseas-apt-organization-exploits-vulnerabilities-to-breach-sangfor-ssl-vpns-and-deliver-malicious-code-threat-alert\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/overseas-apt-organization-exploits-vulnerabilities-to-breach-sangfor-ssl-vpns-and-deliver-malicious-code-threat-alert\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/overseas-apt-organization-exploits-vulnerabilities-to-breach-sangfor-ssl-vpns-and-deliver-malicious-code-threat-alert\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/1209-9.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/1209-9.jpg\",\"width\":515,\"height\":219,\"caption\":\"Cityscape with digital padlock and circuit design.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/overseas-apt-organization-exploits-vulnerabilities-to-breach-sangfor-ssl-vpns-and-deliver-malicious-code-threat-alert\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Overseas APT Organization Exploits Vulnerabilities to Breach Sangfor SSL VPNs and Deliver Malicious Code Threat Alert\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Overseas APT Organization Exploits Vulnerabilities to Breach Sangfor SSL VPNs and Deliver Malicious Code Threat Alert - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Overseas APT Organization Exploits Vulnerabilities to Breach Sangfor SSL VPNs and Deliver Malicious Code Threat Alert - NSFOCUS","og_description":"Overview On April 6, Sangfor released an advisory, announcing that an overseas APT organization illegally took control of some of their SSL VPN devices","og_url":"https:\/\/nsfocusglobal.com\/overseas-apt-organization-exploits-vulnerabilities-to-breach-sangfor-ssl-vpns-and-deliver-malicious-code-threat-alert\/","og_site_name":"NSFOCUS","article_published_time":"2020-04-20T01:52:58+00:00","article_modified_time":"2026-04-17T18:07:49+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1209-9.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Overseas APT Organization Exploits Vulnerabilities to Breach Sangfor SSL VPNs and Deliver Malicious Code Threat Alert - NSFOCUS","twitter_description":"Overview On April 6, Sangfor released an advisory, announcing that an overseas APT organization illegally took control of some of their SSL VPN devices","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1209-9.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/overseas-apt-organization-exploits-vulnerabilities-to-breach-sangfor-ssl-vpns-and-deliver-malicious-code-threat-alert\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/overseas-apt-organization-exploits-vulnerabilities-to-breach-sangfor-ssl-vpns-and-deliver-malicious-code-threat-alert\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Overseas APT Organization Exploits Vulnerabilities to Breach Sangfor SSL VPNs and Deliver Malicious Code Threat Alert","datePublished":"2020-04-20T01:52:58+00:00","dateModified":"2026-04-17T18:07:49+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/overseas-apt-organization-exploits-vulnerabilities-to-breach-sangfor-ssl-vpns-and-deliver-malicious-code-threat-alert\/"},"wordCount":897,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/overseas-apt-organization-exploits-vulnerabilities-to-breach-sangfor-ssl-vpns-and-deliver-malicious-code-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1209-9.jpg","keywords":["APT"],"articleSection":["Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/overseas-apt-organization-exploits-vulnerabilities-to-breach-sangfor-ssl-vpns-and-deliver-malicious-code-threat-alert\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/overseas-apt-organization-exploits-vulnerabilities-to-breach-sangfor-ssl-vpns-and-deliver-malicious-code-threat-alert\/","url":"https:\/\/nsfocusglobal.com\/overseas-apt-organization-exploits-vulnerabilities-to-breach-sangfor-ssl-vpns-and-deliver-malicious-code-threat-alert\/","name":"Overseas APT Organization Exploits Vulnerabilities to Breach Sangfor SSL VPNs and Deliver Malicious Code Threat Alert - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/overseas-apt-organization-exploits-vulnerabilities-to-breach-sangfor-ssl-vpns-and-deliver-malicious-code-threat-alert\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/overseas-apt-organization-exploits-vulnerabilities-to-breach-sangfor-ssl-vpns-and-deliver-malicious-code-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1209-9.jpg","datePublished":"2020-04-20T01:52:58+00:00","dateModified":"2026-04-17T18:07:49+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/overseas-apt-organization-exploits-vulnerabilities-to-breach-sangfor-ssl-vpns-and-deliver-malicious-code-threat-alert\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/overseas-apt-organization-exploits-vulnerabilities-to-breach-sangfor-ssl-vpns-and-deliver-malicious-code-threat-alert\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/overseas-apt-organization-exploits-vulnerabilities-to-breach-sangfor-ssl-vpns-and-deliver-malicious-code-threat-alert\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1209-9.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/12\/1209-9.jpg","width":515,"height":219,"caption":"Cityscape with digital padlock and circuit design."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/overseas-apt-organization-exploits-vulnerabilities-to-breach-sangfor-ssl-vpns-and-deliver-malicious-code-threat-alert\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Overseas APT Organization Exploits Vulnerabilities to Breach Sangfor SSL VPNs and Deliver Malicious Code Threat Alert"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/10299","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=10299"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/10299\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/9738"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=10299"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=10299"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=10299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}