Malware

CISA: Fixed Ivanti Bug Used by Novel RESURGE Malware

Privacy concept: pixelated words Malware on digital background, 3d render

The Cybersecurity and Infrastructure Security Agency warned that Ivanti Connect Secure instances that remain vulnerable to the patched stack-based buffer overflow bug, tracked as CVE-2025-0282, were subjected to attacks spreading the nascent RESURGE malware, according to The Hacker News.

Based on the SPAWNCHIMERA payload, RESURGE has been enhanced with self-insertion, integrity check manipulation, and file modification features, as well as the capability to establish web shells facilitating account creation, credential theft, password resets, and privilege escalation, said CISA.

Further analysis of a compromised ICS device belonging to a critical infrastructure organization revealed that RESURGE contains not only a SPAWNSLOTH malware variant that enabled Ivanti device log tampering but also a custom 64-bit Linux ELF binary with an open-source shell script allowing uncompressed kernel image extraction from a compressed image.

These findings come after Microsoft reported that Chinese state-backed threat group Silk Typhoon leveraged CVE-2025-0282 in attacks earlier this month.

You can skip this ad in 5 seconds

Cookies

This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies.