Monday, April 14, 2025
Homecyber securityCISA Warns of RESURGE Malware Exploiting Ivanti Connect Secure RCE Vulnerability

CISA Warns of RESURGE Malware Exploiting Ivanti Connect Secure RCE Vulnerability

Published on

SIEM as a Service

Follow Us on Google News

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a detailed Malware Analysis Report (MAR-25993211-r1.v1) on the RESURGE malware, which exploits the Remote Code Execution (RCE) vulnerability CVE-2025-0282 in Ivanti Connect Secure devices.

This vulnerability has been leveraged by threat actors to compromise critical infrastructure systems, enabling unauthorized access and control.

CISA’s analysis revealed that RESURGE is a sophisticated backdoor malware with functionalities similar to SPAWNCHIMERA.

- Advertisement - Google News

It establishes Secure Shell (SSH) tunnels for command-and-control (C2) operations, modifies system files, bypasses integrity checks, and deploys web shells on compromised devices.

Additionally, RESURGE creates a persistent foothold by copying malicious components to the Ivanti boot disk.

A variant of SPAWNSLOTH malware was also identified within the RESURGE sample, further complicating system recovery efforts.

SPAWNSLOTH is designed to tamper with device logs, erasing traces of malicious activity.

Another file analyzed by CISA, named “dsmain,” contains an embedded shell script and applets from the open-source BusyBox toolset.

These components allow threat actors to extract uncompressed kernel images (vmlinux), analyze vulnerabilities, and execute malicious payloads.

The attackers utilized advanced encryption techniques to manipulate coreboot RAM disks, ensuring stealthy operations.

Malware Functionality Breakdown

RESURGE employs a series of commands to establish remote command execution capabilities.

It inserts itself into critical system files like ld.so.preload, modifies Python scripts to disable mismatch tracking, and generates cryptographic signatures to disguise altered files as legitimate.

Commands executed by the malware include creating secure sockets for SSH access, manipulating boot processes, and deploying additional payloads.

SPAWNSLOTH, meanwhile, uses function-hooking techniques to intercept system calls and manipulate shared memory linked to logging processes.

This ensures that log entries related to malicious activities are erased or altered.

Recommendations for Mitigation

CISA urges organizations using Ivanti Connect Secure devices to implement robust cybersecurity measures immediately:

  • Apply patches for CVE-2025-0282 and ensure systems are updated.
  • Maintain strong password policies and restrict administrative privileges.
  • Monitor system logs for anomalies and scan for unauthorized modifications.
  • Deploy antivirus solutions with updated signatures to detect malware variants like RESURGE and SPAWNSLOTH.

Organizations are advised to exercise caution when handling external media or downloading software from unverified sources.

Regular audits of network traffic and system integrity are critical in identifying potential compromises.

CISA emphasizes the importance of reporting suspicious activity promptly. Malware samples can be submitted for analysis via official channels listed on CISA’s website.

For further assistance or detailed guidance on securing systems against emerging threats, organizations can contact CISA directly.

This advisory highlights the growing sophistication of cyber threats targeting critical infrastructure.

Vigilance and proactive defense strategies are essential in mitigating risks posed by advanced malware like RESURGE.

Find this News Interesting! Follow us on Google NewsLinkedIn, and X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

IBM Aspera Faspex Flaw Allows Injection of Malicious JavaScript in Web UI

A significant security vulnerability has been identified in IBM Aspera Faspex 5, a popular...

Chinese APT Group Targets Ivanti VPN Vulnerabilities to Breach Networks

In a concerning report from cybersecurity firm TeamT5, it has been revealed that a...

VMware ESXi 8.0 Update 3e Is Now Free — Here’s What’s New

VMware has announced that ESXi 8.0 Update 3e, the latest version of its industry-leading hypervisor,...

Slow Pisces Group Targets Developers Using Coding Challenges Laced with Python Malware

A North Korean state-sponsored threat group known as "Slow Pisces" has been orchestrating sophisticated...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

IBM Aspera Faspex Flaw Allows Injection of Malicious JavaScript in Web UI

A significant security vulnerability has been identified in IBM Aspera Faspex 5, a popular...

Chinese APT Group Targets Ivanti VPN Vulnerabilities to Breach Networks

In a concerning report from cybersecurity firm TeamT5, it has been revealed that a...

VMware ESXi 8.0 Update 3e Is Now Free — Here’s What’s New

VMware has announced that ESXi 8.0 Update 3e, the latest version of its industry-leading hypervisor,...