{"id":37611,"date":"2020-10-12T05:00:03","date_gmt":"2020-10-12T05:00:03","guid":{"rendered":"http:\/\/55ba626b-6a48-45c9-a0b6-03187a2cda2e"},"modified":"2020-10-12T05:00:03","modified_gmt":"2020-10-12T05:00:03","slug":"hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks\/","title":{"rendered":"Hacker groups chain VPN and Windows bugs to attack US government networks"},"content":{"rendered":"<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2020\/10\/12\/66699bb0-ef02-4001-979e-a411f01d6831\/usa-government.png\" class alt=\"usa-government.png\"><\/span><figcaption><span class=\"caption\"><\/span><\/figcaption><\/figure>\n<p>Hackers have gained access to government networks by combining VPN and Windows bugs, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) said in a joint security alert published on Friday.<\/p>\n<p>Attacks have targeted federal and state, local, tribal, and territorial (SLTT) government networks. Attacks against non-government networks have also been detected, the two agencies said.<\/p>\n<p>&#8220;CISA is aware of some instances where this activity resulted in unauthorized access to elections support systems; however, CISA has no evidence to date that integrity of elections data has been compromised,&#8221; the security alert reads.<\/p>\n<p>&#8220;Although it does not appear these targets are being selected because of their proximity to elections information, there may be some risk to elections information housed on government networks,&#8221; officials also added.<\/p>\n<h3>Attacks chained Fortinet VPN and Windows Zerologon bugs<\/h3>\n<p>According to the joint alert, the observed attacks combined two security flaws known as&nbsp;<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-13379\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">CVE-2018-13379<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-1472\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">CVE-2020-1472<\/a>.<\/p>\n<p>CVE-2018-13379 is a vulnerability in the Fortinet FortiOS Secure Socket Layer (SSL) VPN, an on-premise VPN server designed to be used as a secure gateway to access enterprise networks from remote locations.<\/p>\n<p>The CVE-2018-13379,&nbsp;<a href=\"https:\/\/devco.re\/blog\/2019\/08\/09\/attacking-ssl-vpn-part-2-breaking-the-Fortigate-ssl-vpn\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">disclosed last year<\/a>, allows attackers to upload malicious files on unpatched systems and take over Fortinet VPN servers.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\"> <\/section>\n<p>CVE-2020-1472, also known as&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/zerologon-attack-lets-hackers-take-over-enterprise-networks\/\" target=\"_blank\" rel=\"noopener noreferrer\">Zerologon<\/a>, is a vulnerability in Netlogon, the protocol used by Windows workstations to authenticate against a Windows Server running as a domain controller.<\/p>\n<p>The vulnerability allows attackers to take over domain controllers, servers users to manage entire internal\/enterprise networks and usually contain the passwords for all connected workstations.<\/p>\n<p>CISA and the FBI say attackers are combining these two vulnerabilities to hijack Fortinet servers and then pivot and take over internal networks using Zerologon.<\/p>\n<p>&#8220;Actors have then been observed using legitimate remote access tools, such as VPN and Remote Desktop Protocol (RDP), to access the environment with the compromised credentials,&#8221; the two agencies also added.<\/p>\n<p>The joint alert didn&#8217;t provide details about the attackers except to describe them as &#8220;advanced persistent threat (APT) actors.&#8221;<\/p>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Advanced_persistent_threat\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">The term<\/a>&nbsp;is often used by cyber-security experts to describe state-sponsored hacking groups. Last week, Microsoft said it&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/microsoft-says-iranian-hackers-are-exploiting-the-zerologon-vulnerability\/\" target=\"_blank\" rel=\"noopener noreferrer\">observed Iranian APT Mercury (MuddyWatter) exploiting the Zerologon bug<\/a>&nbsp;in recent attacks, a threat actor&nbsp;<a href=\"https:\/\/securelist.com\/muddywater\/88059\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">known for targeting US government agencies in the past<\/a>.<\/p>\n<h3>Danger of hackers chaining different VPN bugs<\/h3>\n<p>Both CISA and the FBI recommended that entities in both the private and public US sector update systems to patch the two bugs, for which patches have been available for months.<\/p>\n<p>In addition, CISA and the FBI also warned that hackers could swap the Fortinet bug for any other vulnerability in VPN and gateway products that have been disclosed over the past few months and which provide similar access.<\/p>\n<p>This includes vulnerabilities in:<\/p>\n<ul>\n<li>Pulse Secure &#8220;Connect&#8221; enterprise VPNs (CVE-2019-11510)<\/li>\n<li>Palo Alto Networks &#8220;Global Protect&#8221; VPN servers (CVE-2019-1579)<\/li>\n<li>Citrix &#8220;ADC&#8221; servers and Citrix network gateways (CVE-2019-19781)<\/li>\n<li>MobileIron mobile device management servers (CVE-2020-15505)<\/li>\n<li>F5 BIG-IP network balancers (CVE-2020-5902)<\/li>\n<\/ul>\n<p>All the vulnerabilities listed above provide &#8220;initial access&#8221; to servers often used on the edge of enterprise and government networks. These vulnerabilities can also be easily chained with the Zerologon Windows bug for similar attacks as the Fortinet+Zerologon intrusions observed by CISA.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Some attacks were successful and intruders gained &#8220;unauthorized access to elections support systems.&#8221;<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":37612,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-37611","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hacker groups chain VPN and Windows bugs to attack US government networks 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacker groups chain VPN and Windows bugs to attack US government networks 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-12T05:00:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Hacker groups chain VPN and Windows bugs to attack US government networks\",\"datePublished\":\"2020-10-12T05:00:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks\\\/\"},\"wordCount\":567,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks.png\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks\\\/\",\"name\":\"Hacker groups chain VPN and Windows bugs to attack US government networks 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks.png\",\"datePublished\":\"2020-10-12T05:00:03+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks.png\",\"width\":1000,\"height\":425},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hacker groups chain VPN and Windows bugs to attack US government networks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacker groups chain VPN and Windows bugs to attack US government networks 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks\/","og_locale":"en_US","og_type":"article","og_title":"Hacker groups chain VPN and Windows bugs to attack US government networks 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-10-12T05:00:03+00:00","og_image":[{"width":1000,"height":425,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Hacker groups chain VPN and Windows bugs to attack US government networks","datePublished":"2020-10-12T05:00:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks\/"},"wordCount":567,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks.png","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks\/","url":"https:\/\/www.threatshub.org\/blog\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks\/","name":"Hacker groups chain VPN and Windows bugs to attack US government networks 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks.png","datePublished":"2020-10-12T05:00:03+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks.png","width":1000,"height":425},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Hacker groups chain VPN and Windows bugs to attack US government networks"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37611","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=37611"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37611\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/37612"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=37611"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=37611"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=37611"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}