Friday, April 4, 2025
Homecyber securityCISA Warns of RESURGE Malware Exploiting Ivanti Connect Secure RCE Vulnerability

CISA Warns of RESURGE Malware Exploiting Ivanti Connect Secure RCE Vulnerability

Published on

SIEM as a Service

Follow Us on Google News

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a detailed Malware Analysis Report (MAR-25993211-r1.v1) on the RESURGE malware, which exploits the Remote Code Execution (RCE) vulnerability CVE-2025-0282 in Ivanti Connect Secure devices.

This vulnerability has been leveraged by threat actors to compromise critical infrastructure systems, enabling unauthorized access and control.

CISA’s analysis revealed that RESURGE is a sophisticated backdoor malware with functionalities similar to SPAWNCHIMERA.

It establishes Secure Shell (SSH) tunnels for command-and-control (C2) operations, modifies system files, bypasses integrity checks, and deploys web shells on compromised devices.

Additionally, RESURGE creates a persistent foothold by copying malicious components to the Ivanti boot disk.

A variant of SPAWNSLOTH malware was also identified within the RESURGE sample, further complicating system recovery efforts.

SPAWNSLOTH is designed to tamper with device logs, erasing traces of malicious activity.

Another file analyzed by CISA, named “dsmain,” contains an embedded shell script and applets from the open-source BusyBox toolset.

These components allow threat actors to extract uncompressed kernel images (vmlinux), analyze vulnerabilities, and execute malicious payloads.

The attackers utilized advanced encryption techniques to manipulate coreboot RAM disks, ensuring stealthy operations.

Malware Functionality Breakdown

RESURGE employs a series of commands to establish remote command execution capabilities.

It inserts itself into critical system files like ld.so.preload, modifies Python scripts to disable mismatch tracking, and generates cryptographic signatures to disguise altered files as legitimate.

Commands executed by the malware include creating secure sockets for SSH access, manipulating boot processes, and deploying additional payloads.

SPAWNSLOTH, meanwhile, uses function-hooking techniques to intercept system calls and manipulate shared memory linked to logging processes.

This ensures that log entries related to malicious activities are erased or altered.

Recommendations for Mitigation

CISA urges organizations using Ivanti Connect Secure devices to implement robust cybersecurity measures immediately:

  • Apply patches for CVE-2025-0282 and ensure systems are updated.
  • Maintain strong password policies and restrict administrative privileges.
  • Monitor system logs for anomalies and scan for unauthorized modifications.
  • Deploy antivirus solutions with updated signatures to detect malware variants like RESURGE and SPAWNSLOTH.

Organizations are advised to exercise caution when handling external media or downloading software from unverified sources.

Regular audits of network traffic and system integrity are critical in identifying potential compromises.

CISA emphasizes the importance of reporting suspicious activity promptly. Malware samples can be submitted for analysis via official channels listed on CISA’s website.

For further assistance or detailed guidance on securing systems against emerging threats, organizations can contact CISA directly.

This advisory highlights the growing sophistication of cyber threats targeting critical infrastructure.

Vigilance and proactive defense strategies are essential in mitigating risks posed by advanced malware like RESURGE.

Find this News Interesting! Follow us on Google NewsLinkedIn, and X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Top 20 Best Open-Source SOC Tools in 2025

As cyber threats continue to evolve, Security Operations Centers (SOCs) require robust tools to...

Hackers Exploit Fast Flux to Evade Detection and Obscure Malicious Servers

Cybersecurity agencies worldwide have issued a joint advisory warning against the growing threat posed...

Oracle Confirms The Data Breach- Starts Initiating Client Notifications

Oracle Corporation has confirmed a data breach involving its older Gen 1 servers, marking...

Vite Development Server Flaw Allows Attackers Bypass Path Restrictions

A critical security vulnerability, CVE-2025-31125, has been identified in the Vite development server.Due to improper...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Top 20 Best Open-Source SOC Tools in 2025

As cyber threats continue to evolve, Security Operations Centers (SOCs) require robust tools to...

Hackers Exploit Fast Flux to Evade Detection and Obscure Malicious Servers

Cybersecurity agencies worldwide have issued a joint advisory warning against the growing threat posed...

Oracle Confirms The Data Breach- Starts Initiating Client Notifications

Oracle Corporation has confirmed a data breach involving its older Gen 1 servers, marking...