Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124

Enterprise Cybercuity Equipment, such as routers, firewalls and VPNS, exist to protect against corporate networks from intruders and malicious hackers, it is something that is particularly important in today’s wide distant and hybrid work age.
However, the equipment that companies help to be safe from outside threats, these products have repeated software bugs that allow polluted hackers to compromise on networks that were designed to protect these products.
These bugs have been blamed For an explosion In Mass-hacking campaign In recent years, the hackers that are contaminated by the hackers of thousands of companies are often easily abused by this exploitation of the exploitation to enter the network of thousands of companies and steal sensitive company data.
We have placed a brief history of mass-hacks together and will update this article if more inevitably published.
One of the first mass-hacks of this decade A notorious Ransomwear Crews uses a weakness in Forter Goian Operated file transfer software, large files on the Internet and a product used by companies to share sensitive datasets. Extensive Klopp Ransomware Gang has applied the bug to compromise more than 5 companies and steal personal information of millions of people. The weakness was used as a zero-day, which means it was not time to fix it before Forter’s attack. Clop later revealed the stolen data from the victims who did not give the hackers ransom. Hitachi power, Protection Giant RoborrickAnd Florida-based health technology company Nationbefits- Which has stolen more than three million members’ data in this attack – which was seen – Report the intrusion obtained from the bogie software.
The Mockery Remains a The largest mass violation of all timeHackers abuse an error in another widely used file transfer software developed by Progress Software to steal several thousand companies’ data. According to the CyberSSCURITY Company, these attacks were again claimed by Klopp Ranswar Group, which used a movie to steal data on more than Million5 million people MCSOFTThe Hackers were the largest victim of a movie breach of contract giant Maximus after confirming that hackers had accessed health information About 11 million peopleThe
The mass-hacks continued in the second half of 2023, with Hackers are using a crude-day vulnerability in Cisco networking software To compromise with thousands of devices throughout October, depending on the software, such as enterprise switches, wireless controllers, access points and industrial routers. The bug has granted the attackers “complete control of compromised device”. Although Cisco has not confirmed how many customers were affected by the error, a search engine for senses, internet-connected devices and resources said that it observed about 42,000 compromised devices published on the Internet.

Citrics Netscale, which is used for the distribution of the application and the VPN connection to the big initiatives and governments, becomes it becomes The latest mass-hack target Just a month later in November 2023. The bug, known as the “Citrixblade”, allows Russia-connected Ransomware Gang Lockbith to collect sensitive information from the influenced netsel systems affected by the big companies. Aerospace Giant Boeing, Law Agency Allen & Owari and China’s industrial and commercial banks were claimed to be affected.
Evanti becomes a name synonym for mass-hackers after the Chinese state-backed hackers Start Two critical zero-day weaknesses in Evanti’s corporate connection protected VPN Appliance. Although Evanti said at the time that only a limited number of customers were affected, the cybercuity agency Volaxity has discovered that more than 1,75 exhaust applications worldwide were exploited, it influences space, banking, defense and telecom industry agencies. US government agencies including damaged ivanti system were ordered to handle immediately Take the systems out of serviceThe This has begun from exploitation of weakness Linked Known as China-backed spying group Salt -typhoonIt was recently reported that at least nine US telecommunications were hacked on networks.
February 2024, hackers Have taken the target In the connectweight screenschen, two “simple-mixplit” weakness, a popular remote access tool that helps and helps technical assistance to the technicians directly provide technical assistance to the customer system. The CyberSSCURITY Giant Mandient said that at that time, his researchers observed “Mass exploitation” of two errors, which were tortured by actors for the postponers of password steelrs, backdoor and in some cases ransom.
Evanty headlined again – February 2024 – when the attackers used one more vulnerability to its much -used Enterprise VPN Appliance To make mass-hack of customersThe Shadow Server Foundation, a non-profit agency that scan the Internet for exploitation and observes, told Techcunch that it tried to use server-sides defects over 630 unique IP addresses that allowed attackers to gain access to devices and systems that are clearly devices And the system is protected by the weak Evanti equipment to get access to the system.
Later in 2024, hackers compromised with a thousand agencies by absorbing Two-zero-day weakness CyberSSCURITY Giants Poo Alto Network has used software and customers around the world. Pan-OS weaknesses, operating systems that are driven to all the next generation firewalls of Palo Alto, allow the attackers to compromise sensitive data from corporate networks and to exfilate. Accordingly Researchers in the Labs of the Protection Agency Watchtower The person who revealed Palo Alto’s patch, as a result of basic mistakes in the process of development.
In December 2024, the Klopp Ransomware gang to launch a new wave of mass hacks aimed at a more popular file transfer technology. Now the gang Absorbed error To target a few dozen customers of the company to the equipment made by Cleo software, an Illinois based manufacturer of enterprise software. In early January 2025, Klopp is listed at about 60 Cleo agencies It is alleged that the US supply chain software giant Blue Yonder and the German -producing giant Covestro have compromised it. By the end of January, Klopop added 50 more complaints to Cleo Mass-hack victims to his Dark à§° web leakage site.

New Year began to be the victim of Evanti hackers – AgainThe The US software giant warned customers at the beginning of 2025 that hackers used a new zero-day weakness at its Enterprise VPN Appliance to violate its corporate customers’ networks. Evanti said that a “limited number” of customers was damaged, but how many refused to say. Shadewarver Foundation It says data show Hundreds of backdoor customer systems.
Just a few days after Evanti’s latest bug was released, Fortinate confirmed that hackers used a weakness in its firewalls to enter its corporate and enterprise customers’ networks. There was an error that affects the Fortigate Firewalls of the Cybercquirement Organization, Has been “mass-exploration” as Zero-Day bug since December 2024According to security research agencies. Fortinate has refused to say how many customers have been affected, but the attacks observe the infiltration by the investigating security research agencies affect the “decade” of the affected devices.
On January 2025 the Enterprise Protection Software remains a busy month for hackers using bugs. Sonikwal said in late January that non-unknown hackers used a newly discovered weakness in an enterprise product of its To enter the customer’s networkThe Sonalwal’s threat researchers invented the weakness that affect Sonalwal’s SMA 1000 Remote Access Appliance and according to Sonalwal “confirmed that the wild was actively exploited”. The company did not say how many customers were damaged or if the company had the technical capacity to confirm that it, including it More than 2,300 devices published on the InternetThis bug is likely to be the latest mass-hack of 2025.