{"id":37629,"date":"2020-10-12T23:26:06","date_gmt":"2020-10-12T23:26:06","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open\/"},"modified":"2020-10-12T23:26:06","modified_gmt":"2020-10-12T23:26:06","slug":"the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open\/","title":{"rendered":"The seven deadly sins letting hackers hijack America&#8217;s govt networks: These unpatched bugs leave systems open"},"content":{"rendered":"<p>If you&#8217;re wondering which bugs in particular miscreants are exploiting to break into, or attempt to break into, US government networks, wonder no more. And then make sure you&#8217;ve patched them.<\/p>\n<p>Uncle Sam&#8217;s Dept of Homeland Security has <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa20-283a\">this month<\/a> identified at least six possible routes into the nation&#8217;s computer systems, and the method used to gain total control over the machines once inside. Those six vulnerabilities are&#8230;<\/p>\n<ol>\n<li><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/support.citrix.com\/article\/CTX267027\">CVE-2019-19781<\/a> in Citrix NetScaler<\/li>\n<li><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.mobileiron.com\/en\/blog\/mobileiron-security-updates-available\">CVE-2020-15505<\/a> in MobileIron<\/li>\n<li><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/kb.pulsesecure.net\/articles\/Pulse_Security_Advisories\/SA44101\">CVE-2019-11510<\/a> in Pulse Secure<\/li>\n<li><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/security.paloaltonetworks.com\/CVE-2020-2021\">CVE-2020-2021<\/a> in Palo Alto Networks<\/li>\n<li><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/support.f5.com\/csp\/article\/K52145254\">CVE-2020-5902<\/a> in F5 BIG-IP<\/li>\n<li><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-18-384\">CVE-2018-13379<\/a> in Fortinet FortiOS SSL VPN.<\/li>\n<\/ol>\n<p>&#8230;plus CVE-2020-1472, aka <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2020\/09\/24\/microsoft_zerologon_in_wild\/\" rel=\"noopener noreferrer\">ZeroLogon<\/a>, in Microsoft Windows, which is exploited to escalate one&#8217;s privileges, via the Netlogon protocol, to domain-level administrator access, granting total control.<\/p>\n<p>So, for instance, we&#8217;re told, miscreants can use, and have used, the Fortinet bug to obtain the usernames and plain-text passwords of SSL VPN users from the gateway&#8217;s memory, log in as them, and then use ZeroLogon to infiltrate the network&#8217;s central nervous system: Active Directory.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2017\/07\/25\/houseonfire.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"roof fire\"><\/p>\n<h2 title=\"Hacker had set up shop on network using stolen Office 365 accounts\">Big US election coming up, security is vital and, oh look&#8230; a federal agency just got completely pwned for real<\/h2>\n<p><a href=\"https:\/\/www.theregister.com\/2020\/09\/25\/cisa_agency_hacked\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>&#8220;CISA is aware of multiple cases where the Fortinet FortiOS SSL VPN vulnerability CVE-2018-13379 has been exploited to gain access to networks,&#8221; explained Homeland Security&#8217;s Cybersecurity and Infrastructure Security Agency (CISA) in its advisory.<\/p>\n<p>&#8220;To a lesser extent, CISA has also observed threat actors exploiting the MobileIron vulnerability CVE-2020-15505. While these exploits have been observed recently, this activity is ongoing and still unfolding. After gaining initial access, the actors exploit CVE-2020-1472 to compromise all Active Directory (AD) identity services.&#8221;<\/p>\n<p>The agency said systems run by government organizations, great and small, have been targeted as well as private networks: &#8220;This recent malicious activity has often, but not exclusively, been directed at federal and state, local, tribal, and territorial (SLTT) government networks.&#8221;<\/p>\n<p>It added that some of those computers are linked to the November elections in the United States, though they do not appear to be specifically targeted \u2013 and in any case, voting records and counts have not been affected:<\/p>\n<p>We note the FBI said similar in 2016, <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.pbs.org\/newshour\/politics\/fbi-warns-possible-state-election-system-hacks\">urging<\/a> [<a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/s.yimg.com\/dh\/ap\/politics\/images\/boe_flash_aug_2016_final.pdf\">PDF<\/a>] Uncle Sam&#8217;s IT staff to shore up their defenses by patching systems.<\/p>\n<p>The advice today is to address the above seven flaws \u2013 the fixes have been available for a long while \u2013 assume you&#8217;ve already been compromised and work from there, reset account credentials if ZeroLogon has been exploited, and more.<\/p>\n<p>&#8220;Organizations with externally facing infrastructure devices that have the vulnerabilities listed in this joint cybersecurity advisory, or other vulnerabilities, should move forward with an &#8216;assume breach&#8217; mentality,&#8221; CISA noted.<\/p>\n<p>&#8220;As initial exploitation and escalation may be the only observable exploitation activity, most mitigations will need to focus on more traditional network hygiene and user management activities.<\/p>\n<p>&#8220;Patch systems and equipment promptly and diligently.&#8221; \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2020\/10\/12\/cisa_fbi_warning\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8216;Unauthorized access to elections support systems&#8217; detected tho &#8216;no evidence to date that integrity of elections data has been compromised&#8217; If you&#8217;re wondering which bugs in particular miscreants are exploiting to break into, or attempt to break into, US government networks, wonder no more. And then make sure you&#8217;ve patched them.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":37630,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-37629","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The seven deadly sins letting hackers hijack America&#039;s govt networks: These unpatched bugs leave systems open 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The seven deadly sins letting hackers hijack America&#039;s govt networks: These unpatched bugs leave systems open 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-12T23:26:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"The seven deadly sins letting hackers hijack America&#8217;s govt networks: These unpatched bugs leave systems open\",\"datePublished\":\"2020-10-12T23:26:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open\\\/\"},\"wordCount\":508,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open\\\/\",\"name\":\"The seven deadly sins letting hackers hijack America's govt networks: These unpatched bugs leave systems open 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open.jpg\",\"datePublished\":\"2020-10-12T23:26:06+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The seven deadly sins letting hackers hijack America&#8217;s govt networks: These unpatched bugs leave systems open\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The seven deadly sins letting hackers hijack America's govt networks: These unpatched bugs leave systems open 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open\/","og_locale":"en_US","og_type":"article","og_title":"The seven deadly sins letting hackers hijack America's govt networks: These unpatched bugs leave systems open 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-10-12T23:26:06+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"The seven deadly sins letting hackers hijack America&#8217;s govt networks: These unpatched bugs leave systems open","datePublished":"2020-10-12T23:26:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open\/"},"wordCount":508,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open\/","url":"https:\/\/www.threatshub.org\/blog\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open\/","name":"The seven deadly sins letting hackers hijack America's govt networks: These unpatched bugs leave systems open 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open.jpg","datePublished":"2020-10-12T23:26:06+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/10\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/the-seven-deadly-sins-letting-hackers-hijack-americas-govt-networks-these-unpatched-bugs-leave-systems-open\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"The seven deadly sins letting hackers hijack America&#8217;s govt networks: These unpatched bugs leave systems open"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37629","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=37629"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37629\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/37630"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=37629"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=37629"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=37629"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}