Mandiant accuses UNC4841 of exploiting Barracuda Email Security Gateway flaw

June 19, 2023

According to Mandiant, a group of hackers known as UNC4841, alleged to be acting on behalf of the Chinese government, has been targeting enterprises in at least 16 different countries by exploiting a flaw in Barracuda Networks’ Email Security Gateway devices.

The flaw allows hackers to distribute malware-laced attachments that may exploit susceptible devices and acquire network access. It allows the hackers steal data, send malicious emails to other targets, or install additional malware once inside an organization’s network.

According to Mandiant, the hackers have been targeting businesses in a range of industries, including government, trade, and academia, since at least October. In certain situations, hackers were able to keep access to target networks even after Barracuda patched the flaw. The hackers introduced used new strains of malware to adapt and maintain their presence in the victim’s network.

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an updated notice recommending firms to examine any indicators of penetration properly. Mandiant also advised that all impacted organizations replace infected devices and undertake rigorous network audits to uncover any residual hacker presence.

The sources for this piece include an article in Axios.

Top Stories

Related Articles

February 5, 2026 A security researcher at Koi named Oren Yomtov has uncovered a widespread malware operation embedded inside an more...

February 4, 2026 More than three million Fortinet devices have been exposed to a critical authentication-bypass vulnerability that is being more...

February 4, 2026 A now-patched security flaw in Docker’s built-in AI assistant exposed users to the risk of remote code more...

January 28, 2026 A suspected credit card skimming attack on the Canada Computers online store may have quietly exposed customer more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn