#ConnectWise

2025-06-14

ConnectWise rotates ScreenConnect code signing certificates; update to latest build by deadline to avoid service disruption. #ConnectWise #ScreenConnect #Cybersecurity

More details: thehackernews.com/2025/06/conn - flagthis.com/news/16682

2025-06-12

ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks
#ConnectWise
thehackernews.com/2025/06/conn

Andrew 🌻 Brandt 🐇threatresearch@infosec.exchange
2025-06-11

What a wonderful thing to find out while on vacation that my phone is blowing up because a news article about #ConnectWise published yesterday (bleepingcomputer.com/news/secu) referenced something I posted here in April (infosec.exchange/@threatresear). (Thanks, Bill ❤️ & @BleepingComputer)

2025-06-10

ConnectWise is turning the tables on cyber threats by rotating its digital certificates to foil sophisticated phishing attacks. Curious how this bold move could keep your systems safer? Dive into the details.

thedefendopsdiaries.com/connec

#connectwise
#cybersecurity
#codesigning
#phishing
#securityupdates

2025-06-09

#ConnectWise is changing server certificates on June 10, 2025, client updates required, although some updates still not ready.

borncity.com/win/2025/06/09/co

2025-06-09

Nutzt wer #ConnectWise Produkte? Die wechseln die Zertifikate zum 10.6.2025, also updaten (wobei die Produkte noch nicht alle aktuell sind).

borncity.com/blog/2025/06/09/c

2025-05-31

🚨 ConnectWise has revealed they were breached 🚨

Timing: unknown

Impact:
- A small number of customers were affected

Attack:
- Believed to be a state-sponsored threat actor
- Likely exploited vulnerability in ScreenConnect, CVE-2025-3935

Response:
- Working with Mandiant to investigate
- Contacted affected customers and law enforcement

#cybersecurity #ConnectWise #breach

bleepingcomputer.com/news/secu

IT InsightsITinsights
2025-05-30

🚨 Staat hackt ConnectWise! Miljoenen computers in gevaar? 💻🔒 Lees meer over deze zorgwekkende cyberaanval en bescherm je data!  
itinsights.nl/cybersecurity/st

2025-05-30

ConnectWise says nation-state attack targeted multiple ScreenConnect customers
#ConnectWise #CVE_2024_1709
therecord.media/connectwise-na

2025-05-29

Imagine discovering a trusted remote tool betrayed you—ConnectWise’s breach shows how a critical flaw handed nation-state hackers a master key. Are our digital defenses really up to the challenge?

thedefendopsdiaries.com/connec

#connectwise
#cyberattack
#nationstatehackers
#cybersecurity
#vulnerabilitymanagement

2025-05-23

⚠️ #ConnectWise RAT is the most popularly abused legitimate remote access tool and accounted for 56% of all active threat reports.

Read: hackread.com/connectwise-scree

#CyberSecurity #RAT #Malware #Scam #InfoSec

Andrew 🌻 Brandt 🐇threatresearch@infosec.exchange
2025-04-14

Last week I posted a thread about a #spam campaign delivering a #ConnectWise client as its payload. As of this morning, the threat actors have changed the payload (virustotal.com/gui/file/30e1d0) and it appears to try to connect to the address "relay.noscreener[.]info" which resolves to 104.194.145.66.

Embedded in the installer .msi file is a file called system.config, which contains this domain name and a base64-encoded string.

The fake Social Security website is still being hosted on a compromised site that belongs to a temp agency based on the east coast of the US.

Previous thread:

infosec.exchange/@threatresear

#malware #phishing #malspam

A virustotal graph showing the relationship between the new sample, its C2 domain, and the IP address where that domain is hosted.The system.config contents include the C2 domain and a base64-encoded value labeled "k=" -- a key, perhaps?
Andrew 🌻 Brandt 🐇threatresearch@infosec.exchange
2025-04-10

However, because this attack has been going on for two weeks, some endpoint protection tools (well, about a third of them) are catching on that this particular file is bad, and should feel bad.

virustotal.com/gui/file/13d71b

The most important lesson here is that attackers always come up with new ways to evade detection. Using a commercially available, normally legitimate remote access tool with a valid cryptographic signature lets the attacker bypass some kinds of endpoint detection.

Remember to check the From: address in emails, and the destination of any links they point to. You can do this by hovering your mouse over the link without clicking, and waiting a second. If it says it's from the SSA, but it isn't pointing to SSA.gov, then it's a lie.

If you find content like this useful, please follow me here, or on LinkedIn: linkedin.com/in/andrew-brandt-

9/fin

#spam #malware #malspam #ConnectWise #attacks

24 out of 73 endpoint protection clients tell you not to chew this gum or open this file. The others are just wrong.

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst