Veeam flaw becomes malware target a year after patching
Briefly

Veeam vulnerability CVE-2023-27532 exploited by EstateRansomware gang despite being patched in versions 12/11a over a year ago.
EstateRansomware gains network access through FortiGate firewall SSL VPN brute force attacks, establishes RDP connections, and deploys backdoor for persistent access.
Criminal gang utilizes valid credentials from FortiGate VPN to obtain access to failover server, enabling deployment of malware and ensuring ongoing control over victim's system.
Read at Theregister
[
|
]