Zero-Day Exploits: Ivanti VPN Targeted by Nation-State Actors

Hackers have been exploiting two zero-day vulnerabilities in Ivanti Connect Secure to deploy custom malware for espionage since early December, targeting a small number of customers. The threat actor, UNC5221, uses a set of tools for post-compromise activities, including custom malware for webshell planting, command execution, and credential theft. The attackers used compromised Cyberoam VPN appliances as command and control servers and are suspected to be an advanced persistent threat (APT) targeting high-priority victims. While there is no attribution, system admins are advised to implement mitigations provided by Ivanti as there is currently no security update addressing the zero-days.
- Ivanti Connect Secure zero-days exploited to deploy custom malware BleepingComputer
- Nation-State Actors Weaponize Ivanti VPN Zero-Days, Deploying 5 Malware Families The Hacker News
- Ivanti calls for immediate action on two critical zero-day vulnerabilities SDxCentral
- Suspected China-backed hackers target Invanti VPN vulnerabilities Axios
- Cutting Edge: Suspected APT Targets Ivanti Connect Secure VPN in New Zero-Day Exploitation Mandiant
Reading Insights
0
0
2 min
vs 3 min read
80%
501 → 99 words
Want the full story? Read the original article
Read on BleepingComputer