"Ivanti VPN Vulnerabilities Spark Malware Attacks and Federal Agency Orders"

Mandiant has discovered new malware used by UNC5221 and other threat groups to exploit Ivanti Connect Secure VPN and Policy Secure devices, including custom web shells like BUSHWALK, CHAINLINE, and FRAMESTING, as well as a variant of LIGHTWIRE. The malware exploits vulnerabilities allowing arbitrary command execution and JavaScript-based credential stealing. The attacks involve open-source utilities for post-exploitation activities, and Ivanti has disclosed and released fixes for additional security flaws. UNC5221 targets various industries of strategic interest to China, with infrastructure and tooling overlapping with past intrusions linked to China-based espionage actors.
- Warning: New Malware Emerges in Attacks Exploiting Ivanti VPN Vulnerabilities The Hacker News
- Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation Mandiant
- CISA orders federal agencies to disconnect Ivanti VPN appliances by Saturday BleepingComputer
- After Delays, Ivanti Patches Zero-Days and Confirms New Exploit SecurityWeek
- More Ivanti VPN Zero-Days Fuel Attack Frenzy as Patches Finally Roll DARKReading
Reading Insights
0
0
2 min
vs 3 min read
77%
403 → 91 words
Want the full story? Read the original article
Read on The Hacker News