Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Malware Identified in Attacks Exploiting Ivanti Connect Secure Vulnerabilities

0
Medium
Published: Fri Jul 18 2025 (07/18/2025, 07:33:09 UTC)
Source: AlienVault OTX General

Description

Malware campaigns exploiting vulnerabilities in Ivanti Connect Secure devices, specifically CVE-2025-0282, have been active from December 2024 through July 2025. Attackers leverage MDifyLoader to side-load Cobalt Strike Beacon DLLs, alongside vshell RAT and Fscan network scanner, to establish and maintain persistent access. Initial access vectors include brute-force attacks, direct exploitation of vulnerabilities, and use of stolen credentials. The threat actors employ advanced lateral movement techniques, persistence via domain account creation and malware service/task registration, and evasion methods such as using legitimate files and ETW bypasses. Although no public exploits are currently available, the threat is active and uses sophisticated tactics. European organizations using Ivanti Connect Secure devices are particularly at risk and should prioritize detection and mitigation. The threat is assessed as medium severity due to moderate impact and exploitation complexity.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 20:17:09 UTC

Technical Analysis

This threat involves malware campaigns targeting Ivanti Connect Secure devices by exploiting CVE-2025-0282, a vulnerability disclosed in 2025. The attackers use MDifyLoader, a loader tool that side-loads malicious DLLs, to deploy Cobalt Strike Beacon, a well-known post-exploitation framework, enabling command and control capabilities. Additional tools include vshell RAT, which provides remote access capabilities, and Fscan, a network scanner used for reconnaissance and lateral movement within compromised networks. Initial access is achieved through multiple methods: brute-force password attacks, direct exploitation of the vulnerability, and use of stolen credentials. Once inside, attackers create domain accounts to maintain persistence and register malicious services or scheduled tasks to survive reboots. They also employ evasion techniques such as leveraging legitimate system files and bypassing Event Tracing for Windows (ETW) to avoid detection by security tools. Despite the absence of publicly available exploits, the threat actors demonstrate advanced operational security and tactics, techniques, and procedures (TTPs). The medium severity rating reflects the moderate impact on confidentiality, integrity, and availability, combined with the complexity of exploitation and the requirement for some level of access or credential compromise. The threat is particularly relevant to organizations in Europe that deploy Ivanti Connect Secure devices, which are commonly used for remote access and VPN services.

Potential Impact

Organizations using Ivanti Connect Secure devices face risks including unauthorized access, data exfiltration, network reconnaissance, and potential lateral movement leading to widespread compromise. The use of Cobalt Strike Beacon and vshell RAT allows attackers to execute arbitrary commands, deploy additional malware, and maintain long-term persistence. Compromise of domain accounts can lead to privilege escalation and further infiltration into critical systems. The evasion techniques complicate detection and response, increasing the likelihood of prolonged undetected presence. This can result in operational disruption, intellectual property theft, regulatory non-compliance, and reputational damage. The threat's focus on remote access infrastructure makes it particularly dangerous as it can serve as a gateway to internal networks. While the medium severity rating suggests moderate impact, the sophistication of the tools and persistence mechanisms indicates that successful exploitation could have significant consequences for affected organizations.

Mitigation Recommendations

Organizations should implement multi-factor authentication (MFA) on all remote access systems, especially Ivanti Connect Secure devices, to reduce the risk of credential-based attacks. Regularly update and patch Ivanti Connect Secure appliances as vendors release fixes for CVE-2025-0282 and related vulnerabilities. Monitor authentication logs for brute-force attempts and anomalous login patterns, and implement account lockout policies to mitigate brute-force attacks. Deploy endpoint detection and response (EDR) solutions capable of detecting side-loading behaviors, Cobalt Strike activity, and ETW bypass techniques. Conduct network segmentation to limit lateral movement opportunities and restrict domain account creation privileges to trusted administrators only. Use threat hunting to identify vshell RAT and Fscan scanner activity within networks. Disable or restrict unnecessary services and scheduled tasks that could be abused for persistence. Finally, maintain comprehensive incident response plans and conduct regular security awareness training focused on credential security and phishing prevention.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://blogs.jpcert.or.jp/en/2025/07/ivanti_cs.html"]
Adversary
null
Pulse Id
6879f8b560d48aaf15291507
Threat Score
null

Indicators of Compromise

Cve

ValueDescriptionCopy
cveCVE-2025-0282
cveCVE-2025-22457

Hash

ValueDescriptionCopy
hash492cdc5bc3d8cc5e6440a0da246f6684
hashc793995b4be06c17bf4aae2e1302196b
hashd5bc25910f126796bef6658d840fb7c2
hashe880c4268fb48aebc5510e02f49d3bce
hash2db036cd60fcf917daffc47dda63e46ec3b16e9c
hashe75b425ec60396a69fe2c936c6cbad3e4297e4a2
hash09087fc4f8c261a810479bb574b0ecbf8173d4a8365a73113025bd506b95e3d7
hash0cbf71efa09ec4ce62d95c1448553314728ed5850720c8ad40352bfbb39be99a
hash1652ab693512cd4f26cc73e253b5b9b0e342ac70aa767524264fef08706d0e69
hash45ecb7b23b328ab762d8519e69738a20eb0cd5618a10abb2c57a9c72582aa7e7
hash48f3915fb8d8ad39dc5267894a950efc863bcc660f1654187b3d77a302fd040f
hash54350d677174269b4dc25b0ccfb0029d6aeac5abbbc8d39eb880c9fd95691125
hash699290a753f35ae3f05a7ea1984d95f6e6f21971a146714fca5708896e5e6218
hash85f9819118af284e6b00ce49fb0c85ff0c0b9d7a0589e1bb56a275ed91314965
hash9e91862b585fc4d213e9aaadd571435c1a007d326bd9b07b72dbecb77d1a27ac
hasha747be292339eae693b7c26cac0d33851cba31140fd0883371cc8de978583dbe
hashcff2afc651a9cba84a11a4e275cc9ec49e29af5fd968352d40aeee07fb00445e
hashf12250a43926dba46dcfb6145b7f1a524c0eead82bd1a8682307d1f2f1f1e66f

Url

ValueDescriptionCopy
urlhttp://proxy.objectlook.com:80
urlhttp://query.datasophos.com:443

Domain

ValueDescriptionCopy
domainproxy.objectlook.com
domainquery.datasophos.com

Threat ID: 687a0dd5a83201eaacf17323

Added to database: 7/18/2025, 9:03:17 AM

Last enriched: 2/26/2026, 8:17:09 PM

Last updated: 3/25/2026, 4:11:20 AM

Views: 337

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses