#Ivanti

2025-10-21

Beware of Malicious Ivanti VPN Client Sites in Google Search That Delivers Malware

Zscaler has identified an active campaign leveraging SEO poisoning to lure users into downloading a malicious version of the Ivanti Pulse Secure VPN client, according to the firm's research and development team.

Pulse ID: 68f77adddcc448c3e90e9be8
Pulse Link: otx.alienvault.com/pulse/68f77
Pulse Author: CyberHunter_NL
Created: 2025-10-21 12:21:49

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #Google #InfoSec #Ivanti #Malware #OTX #OpenThreatExchange #SEOPoisoning #VPN #Zscaler #bot #CyberHunter_NL

2025-10-20

Search, Click, Steal: The Hidden Threat of Spoofed Ivanti VPN Client Sites

Pulse ID: 68f07599e318af113ab2e1f1
Pulse Link: otx.alienvault.com/pulse/68f07
Pulse Author: Tr1sa111
Created: 2025-10-16 04:33:29

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #InfoSec #Ivanti #OTX #OpenThreatExchange #VPN #bot #Tr1sa111

2025-10-20

Search, Click, Steal: The Hidden Threat of Spoofed Ivanti VPN Client Sites

A recent campaign employs SEO poisoning on Bing to distribute a trojanized Ivanti Pulse Secure VPN client. Attackers use lookalike domains to host fake download pages, tricking users into installing a malicious MSI file. The trojan targets the connectionstore.dat file to steal VPN credentials, which are then exfiltrated to a C2 server on Azure infrastructure. This technique has been linked to Akira ransomware deployments in the past. The attack leverages signed executables and referrer-based conditional content delivery to evade detection. Organizations are advised to implement MFA, educate users, and monitor for suspicious activities to mitigate risks.

Pulse ID: 68ef1e76a4b321acc814160b
Pulse Link: otx.alienvault.com/pulse/68ef1
Pulse Author: AlienVault
Created: 2025-10-15 04:09:26

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Akira #Azure #CyberSecurity #InfoSec #Ivanti #MFA #OTX #OpenThreatExchange #RAT #RansomWare #SEOPoisoning #Trojan #VPN #bot #AlienVault

2025-10-14

🚨 Ivanti EPM hit by 13 vulnerabilities Ivanti warned of 13 flaws in Endpoint Manager 2024 - 2 high-risk bugs (RCE & privilege escalation) and 11 SQL injections enabling data theft. Fixes land in Nov 2025 and Q1 2026. 👉🏻  apply mitigations and avoid importing untrusted configs. #ransomNews #Ivanti

:mastodon: deciodecio@infosec.exchange
2025-10-09

La Zero Day Initiative a publié deux avis #0day concernant des vulnérabilités dans Ivanti Endpoint Manager :

ZDI-25-935 (CVSS 8.8) — RCE via Directory Traversal dans OnSaveToDB
Permet l’exécution de code arbitraire à distance.
⚠️ Exploitable via page/pièce jointe piégée — ou sans interaction si l’attaquant a des creds admin.
👇
zerodayinitiative.com/advisori

🧩 ZDI-25-947 (CVSS 7.8) — LPE via désérialisation non sécurisée dans AgentPortal
➡️ Permet une élévation de privilèges locale jusqu’à SYSTEM.
👇
zerodayinitiative.com/advisori

Le hic ?

Ivanti avait promis des patchs… d’abord pour septembre 2025, puis repoussés à mars 2026 (!)
Résultat : ZDI publie les détails en 0-day.

:blobfacepalm: :facepalm_cirno: :neocat_facepalm: 🤦‍♂️

#CyberVeille #infosec #Ivanti #IvantiEPMM

2025-09-25

Nutzt noch wer #Ivanti? Ich konnte Dokumente einsehen, dass #NTT Data das Produkt weltweit aussortiert - beim #Volkswagen-Konzern soll es auch raus sein.

borncity.com/blog/2025/09/25/i

2025-09-20

It's been a packed 24 hours in the cyber world! We've got major arrests, critical vulnerabilities, nation-state activity, and a deep dive into AI's evolving role in both defence and attack. Let's get into it:

Scattered Spider Takedown & TfL Attack Details 🕷️

- UK law enforcement, in coordination with the US DOJ, has arrested two teens, Thalha Jubair (19) and Owen Flowers (18), linked to the notorious Scattered Spider group.
- Jubair is charged with involvement in at least 120 network intrusions, extorting over $115 million from 47 US entities, including a breach of the US federal court system.
- Investigators traced Jubair's activities through cryptocurrency transactions used for gaming gift cards and food deliveries to his apartment, highlighting operational security failures.

📰 The Hacker News | thehackernews.com/2025/09/uk-a
🕵🏼 The Register | go.theregister.com/feed/www.th
🗞️ The Record | therecord.media/scattered-spid

Russian Airport Website Hacked ✈️

- Pulkovo Airport in St. Petersburg, Russia's second-largest air hub, reported its website was knocked offline due to a cyberattack.
- While airport operations remained unaffected, this incident follows other disruptions in Russia's aviation sector, including a system failure at KrasAvia and a major Aeroflot outage claimed by pro-Ukrainian groups.
- The attack highlights ongoing cyber warfare targeting Russian critical infrastructure since the 2022 invasion of Ukraine.

🗞️ The Record | therecord.media/russia-pulkovo

Russian APTs Turla and Gamaredon Collaborate in Ukraine 🇷🇺

- ESET researchers have documented the first technical evidence of collaboration between two Russian FSB-linked APTs, Gamaredon and Turla, in attacks against Ukrainian entities.
- Gamaredon's tools (PteroGraphin, PteroOdd) were observed deploying Turla's sophisticated Kazuar backdoor, with Gamaredon potentially providing initial access for Turla's targeted espionage.
- This convergence suggests a strategic alignment, likely intensified by the ongoing conflict, focusing on high-value targets within Ukraine's defence sector.

📰 The Hacker News | thehackernews.com/2025/09/russ
🗞️ The Record | therecord.media/russian-spy-gr

Iranian UNC1549 Targets Telecoms via LinkedIn Lures 🎣

- The Iran-nexus cyber espionage group UNC1549 (aka Subtle Snail) has infiltrated 34 devices across 11 telecommunications firms in Europe, Canada, UAE, UK, and US.
- The group uses sophisticated LinkedIn job lures, posing as HR reps, to build trust and deliver the MINIBIKE backdoor via DLL side-loading from fraudulent domains.
- MINIBIKE is a modular backdoor capable of extensive reconnaissance, credential theft (including Outlook and browser data), and persistence, with C2 traffic proxied through Azure cloud services for stealth.

📰 The Hacker News | thehackernews.com/2025/09/unc1

Global PhaaS Surge: Lighthouse & Lucid Campaigns 🌐

- The Phishing-as-a-Service (PhaaS) platforms Lighthouse and Lucid are linked to over 17,500 phishing domains, targeting 316 brands across 74 countries.
- These Chinese-speaking threat actors (XinXin group) use advanced techniques like homoglyph attacks (e.g., Japanese Hiragana character 'ん' to mimic '/') and specific User-Agent/proxy country checks to evade detection.
- Phishing infrastructure is shifting, with a 25% increase in email-based credential harvesting, moving away from Telegram, and leveraging services like EmailJS to bypass self-hosted infrastructure.

📰 The Hacker News | thehackernews.com/2025/09/1750

Max Severity Flaw in GoAnywhere MFT (CVE-2025-10035) ⚠️

- Fortra has patched a maximum-severity deserialization vulnerability (CVE-2025-10035) in GoAnywhere MFT's License Servlet, allowing potential command injection.
- This flaw is "virtually identical" to CVE-2023-0669, a zero-day exploited by the Clop ransomware gang two years ago, affecting over 100 organisations.
- While no active exploitation is confirmed yet, researchers anticipate it, urging immediate patching or ensuring the Admin Console is not publicly exposed to the internet.

🤫 CyberScoop | cyberscoop.com/goanywhere-file
🤖 Bleeping Computer | bleepingcomputer.com/news/secu
🕵🏼 The Register | go.theregister.com/feed/www.th

Ivanti EPMM Zero-Days Under Active Exploitation (CVE-2025-4427, CVE-2025-4428) 🚨

- CISA has detailed two malware strains actively exploiting Ivanti EPMM zero-days (CVE-2025-4427, authentication bypass; CVE-2025-4428, RCE) chained together.
- Exploitation was observed around May 15, 2025, following PoC publication, with suspected China-nexus espionage groups leveraging the flaws to deploy malicious Java class listeners.
- These listeners enable arbitrary code execution, data exfiltration, and persistence, delivered in segmented, Base64-encoded chunks to evade detection. Immediate patching and treating MDM systems as high-value assets are critical.

📰 The Hacker News | thehackernews.com/2025/09/cisa
🤖 Bleeping Computer | bleepingcomputer.com/news/secu
🕵🏼 The Register | go.theregister.com/feed/www.th

Critical Entra ID Flaw (CVE-2025-55241) Could Grant Global Admin Access 🔑

- A researcher discovered a critical flaw (CVE-2025-55241) in Microsoft Entra ID that could have allowed access to almost every tenant worldwide via undocumented "Actor tokens."
- The vulnerability in the legacy Azure Active Directory Graph API failed to validate originating tenants, enabling cross-tenant authentication as any user, including Global Admins, without logging.
- Microsoft has swiftly mitigated the issue, confirming no abuse was detected, but the potential impact underscores the severity of identity-related vulnerabilities in cloud environments.

🕵🏼 The Register | go.theregister.com/feed/www.th

ChatGPT "ShadowLeak" Bug Exfiltrated Gmail Secrets 📧

- OpenAI patched a critical "ShadowLeak" flaw in ChatGPT's Deep Research assistant that allowed attackers to steal Gmail secrets with a single, maliciously crafted email.
- The attack hid instructions in white-on-white text or CSS within an email, which the AI agent would dutifully follow when summarising the inbox, exfiltrating sensitive data to an attacker-controlled server.
- This server-side execution bypasses traditional security controls, highlighting new risks with AI agents accessing private data and the need for robust input sanitisation and agent access controls.

🕵🏼 The Register | go.theregister.com/feed/www.th

China's GoLaxy AI Persona Army for Information Warfare 🇨🇳

- Leaked documents from Chinese company GoLaxy reveal a chilling new approach to information warfare: an army of AI personas designed for intimate, surgical persuasion.
- These aren't crude bots but highly realistic, adaptable digital identities, crafted using scraped social data and generative AI (DeepSeek) to build psychological profiles and shape narratives.
- The documents show dossiers on 2,000 American public figures and thousands of influencers, with operations already active in Hong Kong and Taiwan, signalling a new frontier in cognitive warfare.

🗞️ The Record | therecord.media/golaxy-china-a

FBI Warns of Fake Crime Reporting Portals 🛡️

- The FBI has issued a warning about cybercriminals impersonating its Internet Crime Complaint Center (IC3) website to conduct financial scams and steal personal information.
- These spoofed sites often use slightly altered domains (e.g., icc3[.]live) and may even display legitimate-looking warnings to trick victims.
- The FBI advises users to always manually type www.ic3.gov, avoid clicking sponsored search results, and never share personal info or send money to individuals claiming to be from the FBI or IC3.

🤖 Bleeping Computer | bleepingcomputer.com/news/secu

ChatGPT Can Now Solve CAPTCHAs with Prompt Engineering 🤖

- Researchers have demonstrated that ChatGPT-4o can be tricked into solving complex, image-based CAPTCHAs by using cleverly worded prompts and "staged consent."
- This bypasses the chatbot's policy prohibitions, raising serious questions about the long-term reliability of CAPTCHAs as a human-proving security mechanism against increasingly capable AI systems.
- The technique involved initially "training" the LLM on "fake" CAPTCHAs in one chat, then transferring that context to an agent chat to solve real ones, highlighting the evolving threat of prompt injection.

🕵🏼 The Register | go.theregister.com/feed/www.th

Future of CVE Program in Limbo Amidst CISA Debate 📋

- The future governance of the globally critical CVE Program is being debated, with CISA asserting its leadership role following a recent funding scare.
- CISA released documents outlining its vision for a CISA-led, vendor-neutral program, arguing against privatisation due to potential conflicts of interest and national security risks.
- However, CVE Program board members have formed the CVE Foundation, advocating for a globally supported, collaborative model with CISA as one of many contributors, questioning CISA's historical role and financial transparency.

🗞️ The Record | therecord.media/cve-program-fu

MI6 Launches Dark Web Portal "Silent Courier" for Spy Recruitment 🇬🇧

- The UK's Secret Intelligence Service (MI6) has launched "Silent Courier," an upgraded dark web portal on the Tor network, to securely recruit foreign informants globally.
- The initiative aims to attract individuals with sensitive information on global instability or hostile intelligence activity, providing anonymous direct contact with MI6.
- Instructions are available in eight languages via YouTube, advising potential sources on secure access methods, including using clean devices and VPNs where Tor is blocked.

🕵🏼 The Register | go.theregister.com/feed/www.th
🗞️ The Record | therecord.media/mi6-darkweb-po

Automating Alert Triage with AI Agents and Confluence SOPs 🤖

- Tines has released a pre-built workflow that automates security alert triage by leveraging AI agents and Confluence SOPs, aiming to reduce MTTR and analyst fatigue.
- The workflow uses AI to classify alerts, automatically retrieves relevant SOPs from Confluence, creates structured case records, and orchestrates remediation actions across various security tools.
- This solution integrates with platforms like CrowdStrike, AbuseIPDB, Okta, and Slack, providing consistent handling of alerts and automated notifications to on-call teams.

📰 The Hacker News | thehackernews.com/2025/09/how-

#CyberSecurity #ThreatIntelligence #Vulnerabilities #ZeroDay #RCE #APT #Ransomware #ScatteredSpider #Ivanti #GoAnywhere #EntraID #ChatGPT #AI #Phishing #PhaaS #DataPrivacy #COPPA #OnlineSafetyAct #CVE #QuantumComputing #InfoSec #CyberAttack #IncidentResponse

2025-09-19

Two severe vulnerabilities in Ivanti's EPMM let hackers bypass security and execute malicious code. Is your system truly protected? Dive in to uncover what you need to know.

thedefendopsdiaries.com/ivanti

#ivanti
#epmm
#cve20254427
#cve20254428
#vulnerabilitymanagement

2025-09-19

⚠️ CISA alert: Malware exploiting Ivanti EPMM flaws.
- CVE-2025-4427: RCE
- CVE-2025-4428: File write
- Malware: Slinger webshell + unnamed backdoor
- Agencies ordered to patch now.

Details 👉 technadu.com/cisa-warns-of-mal

#CISA #Ivanti #CVE #CyberSecurity

CISA
2025-08-31

📢 H1 2025 : 53 % des exploits de vulnérabilités attribués à des acteurs étatiques, essor de ClickFix
📝 Contexte: Infosecurity Magazine relaie une analyse du rapport « H1 2025 Malware and Vulnerability Trends » de Reco...
📖 cyberveille : cyberveille.ch/posts/2025-08-3
🌐 source : infosecurity-magazine.com/news
#ClickFix #Ivanti #Cyberveille

2025-08-28

Authorities have accused 3 China-based tech firms of exploiting known vulnerabilities, including flaws in Ivanti and Cisco, as part of a years-long cyber espionage campaign.

Read: hackread.com/uk-us-blame-3-chi

#CyberSecurity #China #SaltTyphoon #CyberAttack #Ivanti #Cisco

Marco Ciappelli🎙️✨:verified: :donor:Marcociappelli@infosec.exchange
2025-08-14

🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!

We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!

🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!

We're thrilled to share this critical Brand Story conversation thanks to our friends at ReversingLabs 🙏

Your Business Apps Are Bringing Friends You Didn't Invite

Every commercial software application is a complex assembly of first-party, contracted, open source, and third-party code. But when #SolarWinds, #Kaseya, and #Ivanti happened, we learned that vendor questionnaires and contractual assurances offer little protection against supply chain compromises.

At #BlackHat2025, Saša Zdjelar, Chief Trust Officer at ReversingLabs, reveals how organizations can finally verify the integrity of #software from outside vendors—without relying on blind trust.

The game-changer: Comprehensive binary analysis that deconstructs any file into its components to:

• Detect malware, tampering, and embedded secrets

• Identify #vulnerabilities and insecure practices

• Uncover undocumented network connections

• Flag #compliance risks from restricted regions

This isn't just another policy checkbox—it's a true technical control that inspects the software itself, regardless of size or complexity.

Real-world applications:

• Procurement: Auto-scan all software before deployment

• Version Monitoring: Detect unexpected behavior changes between releases

• Critical Environments: Verify integrity before software enters OT, ICS, or financial systems

• Risk Management: Assess COTS software as part of ongoing vendor reviews

With regulations like EO 14028 and the EU's #CyberResilience Act demanding transparency, the ability to technically validate every application delivers both strategic protection and measurable benefits.

📺 Watch the video: youtu.be/pU9bHYFND7c

🎧 Listen to the podcast: brand-stories-podcast.simpleca

📖 Read the blog: itspmagazine.com/their-stories

➤ Learn more about ReversingLabs: itspm.ag/reversinglabs-v57b

✦ Catch more stories from #ReversingLabs: itspmagazine.com/directory/rev

🎪 Follow all of our #BHUSA 2025 coverage: itspmagazine.com/bhusa25

#Cybersecurity #SupplyChainSecurity #SoftwareIntegrity #BlackHatUSA #BHUSA25 #ThirdPartyRisk #SBOM #BinaryAnalysis #Compliance #ZeroTrust

2025-07-03

Houken Hackers linked to China breach French systems using Ivanti zero day flaws targeting government telecom finance and media sectors.

More: hackread.com/china-houken-hack

#CyberSecurity #Vulnerability #Ivanti #0day #China #France

2025-06-13

Ivanti has released security updates to fix three vulnerabilities in its Workspace Control solution

Vulnerabilities: hard-coded key

Impact: Potential privilege escalation, and full system compromise

Vulnerability IDs: CVE-2025-5353, 2-25-22455, CVE-2025-22463

Recommendation: Upgrade to 10.19.10.0 or later

#cybersecurity #vulnerabilitymanagement #Ivanti

bleepingcomputer.com/news/secu

Alexandre Dulaunoyadulau@infosec.exchange
2025-05-29

The VLAI Severity model is accessible via API. Here is a simple example from a recent Ivanti vulnerability description from their vulnerability webpage.

The VLAI Security model for vulnerabilities is accessible via vulnerability-lookup and the public instance operated by CIRCL.

So, if you have a vulnerability description, you can quickly assess it to get a general idea of its severity.

curl -X 'POST' \
'https://vulnerability.circl.lu/api/vlai/severity-classification' \
-H 'accept: application/json' \
-H 'Content-Type: application/json' \
-d '{ "description": "Ivanti has released updates for Ivanti Neurons for ITSM (on-prem only) which addresses one critical severity vulnerability. Depending on system configuration, successful exploitation could allow an unauthenticated remote attacker to gain administrative access to the system. We are not aware of any customers being exploited by these vulnerabilities at the time of disclosure. We have included an environmental score to provide customers with additional context on the adjusted risk of this vulnerability with typical use cases. Customers who have followed Ivanti guidance on securing the IIS website and restricted access to a limited number of IP addresses and domain names have a reduced risk to their environment. Customers who have users log into the solution from outside their company network also have a reduced risk to their environment if they ensure that the solution is configured with a DMZ." }'

and the result

{
"severity": "Critical",
"confidence": 0.9256
}

#cve #ivanti #vulnerability #vulnerabilitymanagement #vulnerabilities

For more details: vulnerability-lookup.org/2025/

@circl @gcve

2025-05-26

Zdalne wykonanie kodu bez uwierzytelnienia – Ivanti Endpoint Manager Mobile

Ivanti to jedna z tych firm, która często gości na łamach portalu sekurak.pl. Dzieje się tak za sprawą ogromnego zainteresowania ze strony badaczy bezpieczeństwa, ale także i cyberprzestępców, co przekłada się na stosunkowo dużą liczbę ujawnionych błędów (nie bez winy jest fakt, że rozwiązania bezpieczeństwa – chociaż Ivanti nie jest...

#WBiegu #Android #Bypass #IOS #Ivanti #Mdm #Rce #Websec

sekurak.pl/zdalne-wykonanie-ko

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst