HomeCyber BalkansIvanti zero-day exploited by APT group known for targeting Connect Secure appliances

Ivanti zero-day exploited by APT group known for targeting Connect Secure appliances

Published on

spot_img

Researchers from Google’s Mandiant division have uncovered a critical remote code execution vulnerability that was recently patched by software vendor Ivanti. According to Mandiant, this vulnerability has been exploited by a Chinese cyberespionage group since mid-December. The same group has a history of exploiting zero-day vulnerabilities in Ivanti Connect Secure appliances dating back to January 2024.

The attacks exploiting the newly patched CVE-2025-0282 flaw involved the deployment of multiple malware components from a toolkit known as SPAWN. Mandiant has linked this toolkit to a cluster of activity known as UNC5337, which they suspect is related to another group tracked as UNC5221. UNC5221, a suspected China-based espionage actor, has previously exploited vulnerabilities in Ivanti Connect Secure VPN appliances as early as December 2023. Mandiant has also observed UNC5221 using a compromised network of Cyberoam appliances to facilitate intrusion operations.

The SPAWN toolkit includes various custom malware tools designed to interact with Connect Secure features and code. Some of the tools include the SPAWNANT installer, SPAWNMOLE tunneler, SPAWNSNAIL SSH backdoor, and the SPAWNSLOTH log tampering utility. In addition to these known tools, the recent attacks also featured new components such as a credential harvester named DRYHOOK and a malware dropper called PHASEJAM.

Ivanti has issued a security advisory instructing customers to perform a factory reset on their appliances before deploying the patched 22.7R2.5 version. The reason for this reset, according to Mandiant’s analysis, is due to the PHASEJAM dropper which modifies legitimate Connect Secure components to block and simulate upgrades in a visually convincing manner. The dropper even displays a fake new version number at the end of the simulated upgrade process to deceive users.

The ongoing exploitation of vulnerabilities in Ivanti appliances by this Chinese cyberespionage group highlights the persistent threat posed by sophisticated threat actors. It also underscores the importance of timely patching and proactive security measures to protect against such attacks. Organizations using Ivanti products are urged to follow Ivanti’s security advisory and update their systems to mitigate the risk of falling victim to these attacks.

In conclusion, the evolving nature of cyber threats requires constant vigilance and collaboration between security researchers, vendors, and organizations to defend against malicious actors seeking to exploit vulnerabilities for their gain. By staying informed and taking proactive steps to secure their systems, enterprises can better protect themselves from the growing cyber threat landscape.

Source link

Latest articles

Trojanized Android App Sparks New Surge in NFC Fraud

A New Variant of NGate Malware Emerges, Targeting NFC Payment Systems In a concerning development...

Bridewell Among the First to Attain Level 2 Defence Cyber Certification

Bridewell Becomes a Pioneer in Defence Cyber Certification: A Step Towards Enhanced Cyber Security...

Azure SRE Agent Vulnerability Enables Silent Eavesdropping on Enterprise Cloud Operations

Security Flaw Discovered in Azure SRE Agent Gateway SignalR Hub Recent investigations have brought to...

Cyber Briefing – April 21, 2026 – CyberMaterial

Cybersecurity Briefing: Emerging Threats and Corporate Developments In the ever-evolving landscape of cybersecurity, recent reports...

More like this

Trojanized Android App Sparks New Surge in NFC Fraud

A New Variant of NGate Malware Emerges, Targeting NFC Payment Systems In a concerning development...

Bridewell Among the First to Attain Level 2 Defence Cyber Certification

Bridewell Becomes a Pioneer in Defence Cyber Certification: A Step Towards Enhanced Cyber Security...

Azure SRE Agent Vulnerability Enables Silent Eavesdropping on Enterprise Cloud Operations

Security Flaw Discovered in Azure SRE Agent Gateway SignalR Hub Recent investigations have brought to...