Thursday, April 10, 2025
Homecyber securityChinese Hackers Exploit Ivanti VPN Vulnerability to Deliver Malware Payloads

Chinese Hackers Exploit Ivanti VPN Vulnerability to Deliver Malware Payloads

Published on

SIEM as a Service

Follow Us on Google News

Ivanti disclosed a critical security vulnerability, CVE-2025-22457, affecting its Connect Secure (ICS) VPN appliances, particularly versions 22.7R2.5 and earlier.

This buffer overflow vulnerability enables attackers to achieve remote code execution when exploited successfully.

Security researchers from Mandiant and Ivanti have confirmed active exploitation of this vulnerability in the wild, targeting ICS 9.X (end-of-life) and earlier versions.

- Advertisement - Google News

The exploitation has been attributed to UNC5221, a suspected China-nexus espionage group known for its sophisticated cyber operations and history of exploiting zero-day vulnerabilities.

The earliest signs of exploitation were observed in mid-March 2025, with attackers deploying two newly identified malware families TRAILBLAZE and BRUSHFIRE alongside the previously reported SPAWN malware ecosystem.

These tools are designed for espionage and stealthy persistence, enabling attackers to evade detection while maintaining access to compromised systems.

Technical Details of the Exploitation

CVE-2025-22457 was initially assessed as a low-risk denial-of-service vulnerability due to its limited character space.

However, attackers appear to have studied the patch released in February 2025 (ICS version 22.7R2.6) and discovered a complex method to exploit earlier versions for remote code execution.

Following successful exploitation, a shell script dropper is used to execute the TRAILBLAZE in-memory dropper, which injects the BRUSHFIRE passive backdoor into running processes.

This sequence creates temporary files containing process metadata before deleting them to avoid detection.

The dropper operates in a non-persistent manner, requiring re-execution after system reboot.

TRAILBLAZE is a lightweight dropper written in bare C that uses raw syscalls for minimal footprint.

It injects hooks into targeted processes and deploys the BRUSHFIRE backdoor.

BRUSHFIRE, also written in bare C, functions as an SSL_read hook that decrypts and executes shellcode embedded in incoming data streams. If successful, it sends responses back via SSL_write.

Additionally, attackers deployed components from the SPAWN malware ecosystem, including SPAWNSLOTH (log tampering utility), SPAWNSNARE (kernel image extractor and encryptor), and SPAWNWAVE (an evolved implant utility combining features from other SPAWN malware).

These tools demonstrate advanced capabilities for tampering with logs, extracting kernel images, and maintaining stealthy persistence on compromised devices.

Attribution and Broader Implications

The exploitation campaign has been attributed to UNC5221 by Google Threat Intelligence Group (GTIG).

UNC5221 has previously targeted edge devices using zero-day vulnerabilities such as CVE-2023-46805 and CVE-2024-21887.

Their operations span multiple countries and industries, leveraging an extensive toolkit that includes passive backdoors and trojanized legitimate components.

UNC5221’s consistent focus on edge devices underscores their strategic emphasis on exploiting critical infrastructure vulnerabilities.

Their ability to uncover complex exploitation methods highlights their technical expertise and operational tempo.

GTIG anticipates continued efforts by UNC5221 to exploit both zero-day and n-day vulnerabilities on edge devices globally.

To address CVE-2025-22457, Ivanti has released patches for ICS appliances, urging customers to upgrade to version 22.7R2.6 or later immediately.

Organizations are advised to use Ivanti’s Integrity Checker Tool (ICT) for anomaly detection and investigate suspicious activity related to core dumps or TLS certificates presented to appliances.

Active monitoring of systems and timely application of security patches remain critical defenses against such advanced threats.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Dell Alerts Users to Critical PowerScale OneFS Flaws Enabling Account Takeover

Dell Technologies has issued an urgent security advisory to its users, warning of several...

SonicWall Patches Multiple Vulnerabilities in NetExtender Windows Client

SonicWall has issued a critical alert concerning multiple vulnerabilities discovered in its NetExtender Windows...

Cable: Powerful Post-Exploitation Toolkit for Active Directory Attacks

Cybersecurity researchers are raising alarms about Cable, a potent open-source post-exploitation toolkit designed to exploit...

Langflow AI Builder Vulnerability Allows Remote Server Takeover by Attackers

A critical security vulnerability has been discovered in the Langflow AI Builder, a popular...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Dell Alerts Users to Critical PowerScale OneFS Flaws Enabling Account Takeover

Dell Technologies has issued an urgent security advisory to its users, warning of several...

SonicWall Patches Multiple Vulnerabilities in NetExtender Windows Client

SonicWall has issued a critical alert concerning multiple vulnerabilities discovered in its NetExtender Windows...

Cable: Powerful Post-Exploitation Toolkit for Active Directory Attacks

Cybersecurity researchers are raising alarms about Cable, a potent open-source post-exploitation toolkit designed to exploit...