Zero-Day Exploits: Ivanti VPN Targeted by Nation-State Actors

1 min read
Source: BleepingComputer
Zero-Day Exploits: Ivanti VPN Targeted by Nation-State Actors
Photo: BleepingComputer
TL;DR Summary

Hackers have been exploiting two zero-day vulnerabilities in Ivanti Connect Secure to deploy custom malware for espionage since early December, targeting a small number of customers. The threat actor, UNC5221, uses a set of tools for post-compromise activities, including custom malware for webshell planting, command execution, and credential theft. The attackers used compromised Cyberoam VPN appliances as command and control servers and are suspected to be an advanced persistent threat (APT) targeting high-priority victims. While there is no attribution, system admins are advised to implement mitigations provided by Ivanti as there is currently no security update addressing the zero-days.

Share this article

Reading Insights

Total Reads

0

Unique Readers

0

Time Saved

2 min

vs 3 min read

Condensed

80%

50199 words

Want the full story? Read the original article

Read on BleepingComputer