"Ivanti VPN Zero-Day Exploits Unleash 5 Malware Families"

Suspected nation-state actors have been exploiting two zero-day vulnerabilities in Ivanti Connect Secure (ICS) VPN appliances since December 2023, deploying five malware families to gain backdoor access and compromise high-priority targets. The attacks, attributed to a suspected Chinese espionage actor, involve exploiting an authentication bypass flaw and a code injection vulnerability to gain initial access, deploy webshells, and capture credentials. Ivanti has indicated that less than 10 customers were impacted, and patches for the vulnerabilities are expected to be available soon. The threat actor, UNC5221, has been using custom malware families, web shells, and backdoors to maintain persistent remote access, indicating a highly-targeted and advanced persistent threat (APT) campaign.
- Nation-State Actors Weaponize Ivanti VPN Zero-Days, Deploying 5 Malware Families The Hacker News
- Ivanti Connect Secure zero-days exploited to deploy custom malware BleepingComputer
- Cutting Edge: Suspected APT Targets Ivanti Connect Secure VPN in New Zero-Day Exploitation Mandiant
- Ivanti calls for immediate action on two critical zero-day vulnerabilities SDxCentral
- Ivanti Researchers Report Two Critical Zero-Day Vulnerabilities - Ivanti Researchers Report Two Critical Zero-Day Vulnerabilities DARKReading
Reading Insights
1
3
2 min
vs 3 min read
76%
462 → 109 words
Want the full story? Read the original article
Read on The Hacker News