Hackers Attacking Network Edge Devices to Compromise SMB Organizations

Sophos researchers noted in their recent Annual Threat Report that ransomware attacks remain the primary existential cyber threat to small and midsized organizations, with ransomware cases accounting for 70 percent of incident response engagements for small business customers in 2024. Security experts recommend prioritizing patching of edge devices, implementing multifactor authentication for all remote access, replacing end-of-life equipment, and considering external help to audit and monitor external attack surfaces regularly to prevent exploitation by opportunistic attackers scanning for vulnerable targets. “Whether simply misconfigured, using weak credential policies, or running on vulnerable software or firmware, systems on the network edge are the initial point of compromise for over a third of all incidents involving intrusion into smaller organizations,” the report states. The largest percentage of initial access vectors specifically observed in ransomware and data exfiltration attacks against SMBs, highlighting the critical importance of securing these devices. These critical devices—including firewalls, virtual private network appliances, and other remote access systems—have become the initial point of compromise in over a quarter of confirmed business breaches, with the actual number likely much higher. Cybercriminals are exploiting these network perimeter vulnerabilities to gain unauthorized access, deploy malware, and launch devastating ransomware attacks. For example, when backup software provider Veeam released a security bulletin on CVE-2024-40711 in September 2024, cybercriminals developed an exploit within a month, pairing it with VPN-based initial access techniques. This phenomenon, referred to as “digital detritus” by Sophos CEO Joe Levy, emphasizes how obsolete and unpatched hardware and software constitute an ever-growing source of security vulnerabilities. The exploitation of network edge devices follows a consistent pattern where published vulnerabilities are rapidly weaponized by cybercriminals. In one case documented by Sophos MDR, a Citrix Netscaler gateway was used to establish initial access by exploiting sessions that weren’t reset after the “Citrix Bleed” patch deployment. The exploitation represents a concerning shift in tactics, where attackers specifically scan for and target inadequately secured infrastructure components that operate at the boundary between an organization’s internal network and the outside world. Analysis of incident data reveals that documented vulnerabilities that remained unpatched—some over a year old—played a role in nearly 15 percent of malicious intrusions tracked in 2024. In most cases, these vulnerabilities had been reported weeks or months before exploitation, often in connection with ransomware attacks.

This Cyber News was published on cybersecuritynews.com. Publication date: Tue, 22 Apr 2025 13:25:08 +0000


Cyber News related to Hackers Attacking Network Edge Devices to Compromise SMB Organizations

Edge Computing: Data and Connectivity - Edge computing is a distributed computing model that brings processing capabilities closer to the data source, be it IoT devices, sensors, or end-user devices, rather than relying on centralized data centers. By decentralizing data processing, edge ...
2 years ago Feeds.dzone.com
Windows 11 to let admins mandate SMB encryption for outbound connections - Windows 11 will let admins mandate SMB client encryption for all outbound connections, starting with today's Windows 11 Insider Preview Build 25982 rolling out to Insiders in the Canary Channel. SMB encryption provides data end-to-end encryption and ...
2 years ago Bleepingcomputer.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
2 years ago Esecurityplanet.com
Microsoft drops SMB1 firewall rules in new Windows 11 build - Windows 11 will no longer add SMB1 Windows Defender Firewall rules when creating new SMB shares starting with today's Canary Channel Insider Preview Build 25992 build. Before this change and since Windows XP SP2, creating SMB shares set up firewall ...
2 years ago Bleepingcomputer.com
Edge Computing: Enhancing Data Processing - Edge computing revolutionizes data processing by bringing computational power closer to where data is generated, enhancing efficiency and responsiveness. Discover how edge computing is reshaping technology and our interactions with it, unlocking a ...
1 year ago Securityzap.com
10 Best Security Service Edge Solutions - Security Service Edge is an idea in cybersecurity that shows how network security has changed over time. With a focus on customized solutions, Security Service Edge Solutions leverages its expertise in multiple programming languages, frameworks, and ...
1 year ago Cybersecuritynews.com
Optimizing Cybersecurity: How Hackers Use Golang Source Code Interpreter to Evade Detection - Hackers have been upping the stakes when it comes to executing cyberattacks, and an increasingly popular tool in their arsenal is the Golang source code interpreter. Reportedly, the interpreter is used to obfuscate code, thus making it harder for ...
2 years ago Bleepingcomputer.com
CVE-2024-54092 - A vulnerability has been identified in Industrial Edge Device Kit - arm64 V1.17 (All versions), Industrial Edge Device Kit - arm64 V1.18 (All versions), Industrial Edge Device Kit - arm64 V1.19 (All versions), Industrial Edge Device Kit - arm64 V1.20 ...
9 months ago
Network Protection: How to Secure a Network - Network security protects and monitors the links and the communications within the network using a combination of hardware, software, and enforced policies. Best practices for network security directly counter the major threats to the network with ...
1 year ago Esecurityplanet.com
15 Best Bandwidth Monitoring Tools in 2025 - By providing real-time data on network usage, bandwidth monitoring tools enable proactive management and quick resolution of issues that could impact network performance. It provides real-time monitoring of network performance, traffic analysis, and ...
5 months ago Cybersecuritynews.com
Hackers Attacking Network Edge Devices to Compromise SMB Organizations - Sophos researchers noted in their recent Annual Threat Report that ransomware attacks remain the primary existential cyber threat to small and midsized organizations, with ransomware cases accounting for 70 percent of incident response engagements ...
8 months ago Cybersecuritynews.com CVE-2024-40711
CVE-2021-41769 - A vulnerability has been identified in SIPROTEC 5 6MD85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 6MD86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 6MD89 devices (CPU variant CP300) (All versions < ...
3 years ago
20 Best Remote Monitoring Tools - 2025 - What is Good ?What Could Be Better ?Strong abilities to keep an eye on devices and systems.Some parts may take time to figure out.It gives you tools for remote control and troubleshooting.There could be more ways to change things.Lets you automate ...
9 months ago Cybersecuritynews.com
Locking down the edge The Register - Review and manage your consent Here's an overview of our use of cookies, similar technologies and how to manage them. The attack surface is expanding as more operational functions migrate out of centralized locations and into distributed sites and ...
2 years ago Go.theregister.com
Locking down the edge The Register - Review and manage your consent Here's an overview of our use of cookies, similar technologies and how to manage them. The attack surface is expanding as more operational functions migrate out of centralized locations and into distributed sites and ...
1 year ago Go.theregister.com
SUSE announces new enhancements to help users manage business-critical workloads - SUSE announced enhancements across its cloud native and Edge portfolio to enable customers to securely deploy and manage business-critical workloads anywhere. New capabilities in Rancher Prime 3.0, SUSE's commercial offering of Rancher and SUSE Edge ...
1 year ago Helpnetsecurity.com
Why Use a VLAN? Unveiling the Benefits of Virtual LANs in Network Security - Virtual Local Area Networks, or VLANs, serve as a critical computing technology designed for effective network traffic management. How VLANs function within a network environment revolves around effectively managing and directing network traffic. ...
2 years ago Securityboulevard.com
CVE-2016-9463 - Nextcloud Server before 9.0.54 and 10.0.1 & ownCloud Server before 9.1.2, 9.0.6, and 8.2.9 suffer from SMB User Authentication Bypass. Nextcloud/ownCloud include an optional and not by default enabled SMB authentication component that allows ...
6 years ago
Top 19 Network Security Threats + Defenses for Each - Network security threats are technological risks that weaken the defenses of an enterprise network, endangering proprietary data, critical applications, and the entire IT infrastructure. There are seven major categories of network security issues ...
1 year ago Esecurityplanet.com
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
6 months ago Cybersecuritynews.com
Integrated Industrial Edge Compute - The future of edge compute is more like a locomotive with a predictable future. In early 2023 Grand View Research identified that the edge compute market had grown from $1.9B in 2020 to $11.24B in 2022. These edge compute numbers may explain my ...
2 years ago Feedpress.me
CMDB: Device Visibility for Bank Security - Let us see how a device visibility and control software functions to automatically alert when a rogue or unauthorized device enters your network. Device visibility and control is a cybersecurity concept that refers to the ability to discover, ...
1 year ago Feeds.dzone.com
FBI disrupts Moobot botnet used by Russian military hackers - The FBI took down a botnet of small office/home office routers used by Russia's Main Intelligence Directorate of the General Staff in spearphishing and credential theft attacks targeting the United States and its allies. This network of hundreds of ...
1 year ago Bleepingcomputer.com Fancy Bear APT28 Turla Volt Typhoon
Unified Endpoint Management: What is it and What's New? - What began as Mobile Device Management has now transitioned through Mobile Application Management and Enterprise Mobility Management to culminate in UEM. This progression underscores the industry's response to the ever-growing challenges of modern IT ...
2 years ago Securityboulevard.com
The Future of Modern Networks Is Automated Threat Intelligence. - Every new device added to the network, be it an employee home laptop, an IoT sensor, a machine vision camera, or a cloud-based server, brings a new security threat to the company. All of these changes are making network security a critical defense ...
2 years ago Cyberdefensemagazine.com