Friday, April 25, 2025

China-Linked Hackers Exploit Ivanti Vulnerability to Deploy New Malware

A suspected Chinese cyber-espionage group is exploiting a critical vulnerability in Ivanti’s security products, deploying two new malware strains on compromised systems. The flaw, initially considered low-risk, has now been deemed a severe threat as attackers weaponize it for remote code execution.

Ivanti Reassesses Risk as Exploitation Rises

When Ivanti first patched the buffer overflow vulnerability (CVE-2025-22457) in February, it gave customers little reason for alarm. At the time, the company said the flaw was unlikely to be exploited for remote code execution. That assessment changed this week after Ivanti and its security partners confirmed the bug is actively being used in cyberattacks.

“The vulnerability is a buffer overflow with characters limited to periods and numbers. It was evaluated and determined not to be exploitable for remote code execution or denial of service,” Ivanti said in an April 3 security advisory. “However, we have now learned it is exploitable through sophisticated means and have identified evidence of active exploitation in the wild.”

The flaw affects multiple Ivanti products, including:

  • Connect Secure (versions 22.7R2.5 and earlier)
  • Policy Secure and ZTA gateways
  • The now-unsupported Pulse Connect Secure 9.x

While there are no reports of exploitation in Policy Secure or ZTA, Ivanti still recommends immediate upgrades. Connect Secure users should transition to version 22.7R2.6, and organizations running Pulse Connect Secure should migrate to supported alternatives. A patch for Policy Secure is expected April 21, with an automatic ZTA fix arriving April 19.

Ivanti Connect Secure vulnerability cyber attack

Chinese-Linked Group UNC5221 Behind Attacks

Security researchers at Google’s Mandiant division have attributed the ongoing exploitation to UNC5221, a cyber-espionage group with suspected ties to China. The group has a history of targeting Ivanti products, previously leveraging two zero-day vulnerabilities in Ivanti’s VPNs earlier this year.

After exploiting CVE-2025-22457, UNC5221 deploys two new malware families:

  • Trailblaze: A memory-resident dropper that loads additional payloads.
  • Brushfire: A stealthy backdoor used for persistent access.

Alongside these new tools, UNC5221 continues to use previously identified malware, including:

  • Spawnsloth: A log-tampering tool to evade detection.
  • Spawnsnare: An encryption utility.
  • Spawnant: An installer for additional malware components.

How Attackers Weaponized the Flaw

Mandiant researcher Matt Lin noted that attackers moved quickly, beginning exploitation soon after Ivanti’s February patch. Initially, experts thought the flaw was too limited to be dangerous. The buffer overflow allowed only periods and numbers, seemingly restricting exploitability to a simple denial-of-service attack.

That assumption was wrong.

“Likely by studying the patch and differences in code between ICS 22.7R2.6 and earlier versions, the threat actor figured out a sophisticated way to weaponize the vulnerability and achieve remote code execution,” Lin said.

Mandiant’s investigation found UNC5221 had been exploiting this vulnerability for weeks before Ivanti upgraded its severity rating. The group’s history with Ivanti products suggests a strategic focus on security appliances as entry points for broader espionage operations.

Edge Devices: A Prime Target for Cyber Espionage

UNC5221’s latest campaign highlights a growing trend—attackers targeting edge devices like VPNs, firewalls, and routers. These systems often have privileged access to enterprise networks, making them valuable footholds for adversaries looking to:

  • Bypass traditional security defenses.
  • Maintain persistent access within networks.
  • Move laterally to compromise additional systems.
  • Steal sensitive data for espionage or ransomware attacks.

Mandiant has previously tracked UNC5221 exploiting other Ivanti vulnerabilities, including two zero-days patched in January (CVE-2025-0282 and CVE-2025-0283). In a related advisory, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) confirmed active exploitation of CVE-2025-0282 to deploy the “Resurge” malware.

Last year, Mandiant reported another UNC5221 campaign leveraging two more Ivanti zero-days (CVE-2023-46805 and CVE-2024-21887). The group used those flaws to drop web shells and other malware, solidifying their presence on victim systems.

The ongoing focus on Ivanti’s technology underscores how attackers adapt quickly. Even vulnerabilities initially deemed low risk can become serious threats if adversaries find a way to exploit them effectively.

Davis Emily
Davis Emily
Emily is a versatile and passionate content writer with a talent for storytelling and audience engagement. With a degree in English and expertise in SEO, she has crafted compelling content for various industries, including business, technology, healthcare, and lifestyle, always capturing her unique voice.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Share post:

Recent

More like this
Related

Underground Rave Scene in China: A Pulse of Rebellion and Freedom

Crouching through a small metal door into a dark...

Luke Humphries Weight Loss Journey with Before & After Image

Luke Humphries, the British professional darts player, has recently...

How to Check Your MTN Number: A Beginner’s Tutorial

Checking your MTN number can be a lifesaver when...

Is Pure Flix Free With Amazon Prime? All You Need to Know

Pure Flix is a popular faith-based streaming service offering...