Close Menu
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Chinese APTs Exploit ToolShell Zero-Days Ahead of Patch

July 22, 2025

Microsoft Links Ongoing SharePoint Exploits to Chinese Hacker Groups

July 22, 2025

Dell Declares Data Leak a Hoax

July 22, 2025
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance
The CISO Brief
Home » Attackers lodge backdoors into Ivanti Connect Secure devices
Vulnerabilities

Attackers lodge backdoors into Ivanti Connect Secure devices

Staff WriterBy Staff WriterFebruary 15, 2025Updated:May 17, 2025No Comments3 Mins Read5 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


Dive Brief:

Researchers tracking a recently disclosed zero-day vulnerability in Ivanti Connect Secure said hundreds of instances may have been compromised through exploits of CVE-2025-0282. Shadowserver scans identified 379 new backdoored instances on Wednesday.
“The backdoor was originally discovered by the National Cyber Security Centre of Finland in a CVE-2025-0282 exploitation case,” Shadowserver CEO Piotr Kijewski told Cybersecurity Dive via email on Friday. The agency shared remote detection methodology with Shadowserver, allowing it to scan the internet for confirmed compromises and notify affected entities, Kijewski said.
Ivanti did not say how many devices were compromised via CVE-2025-0282 exploits or remain unpatched. “The facts as we know them remain consistent with our Jan. 8 disclosure. We encourage focusing on verified facts to ensure accurate reporting,” a company spokesperson said Friday via email.

Dive Insight:

Actively exploited vulnerabilities in Ivanti products are a recurring problem for the vendor’s customers. Multiple attack sprees during the last year targeted zero-day vulnerabilities in Ivanti Connect Secure, Ivanti Cloud Service Appliance and Ivanti Endpoint Manager.

The Cybersecurity and Infrastructure Security Agency has added 12 Ivanti CVEs to its known exploited vulnerabilities catalog since Jan. 1, 2024.

Kijewski said it’s difficult to quantify the exact number of Ivanti Connect Secure instances compromised via the latest zero day affecting the VPN product. Some of the backdoors found by Shadowserver scans could be attributed to other malicious activity, Kijewski said.

Ivanti Connect Secure customers running versions affected by CVE-2025-0282 resolved the issue relatively fast compared to previous vulnerabilities in the same product, Kijewski said.

Yet, the number of Ivanti Connect Secure devices running a version vulnerable to CVE-2025-0282 remains high, according to Censys research. Excluding honeypots, Censys found 13,954 Ivanti Connect Secure devices exposed and unpatched on Friday, said Himaja Motheram, security researcher at Censys.

Censys detected nearly 33,000 Ivanti Connect Secure devices publicly exposed to the internet as of Friday.

“This is a serious situation. Exploitation has been going on for around two months at this stage, patching appears to be slow, and prominent organizations are being breached,” Motheram said Friday via email.

“Considering the repeated history of critical security flaws and global incidents tied to Ivanti devices, there’s increasingly little justification for using them from a security standpoint,” Motheram said.

While Shadowserver’s findings aren’t definitive with respect to which vulnerabilities are responsible for the compromised instances it found this week, the number of backdoored Ivanti Connect Secure devices is likely even higher, Motheram said.

Stephen Fewer, principal security researcher at Rapid7, shared similar concerns about active CVE-2025-0282 exploits.

“Compromising a VPN appliance on the network edge not only gives an attacker a gateway into your network but often gives an attacker access to user credentials that helps the attacker to move deeper into the compromised network. As such, this is a very serious incident,” Fewer said Friday via email.

Ivanti and researchers tracking CVE-2025-0282 urge organizations to patch any versions of Ivanti Connect Secure affected by the vulnerability. “We can confirm that the patched version successfully remediates the root cause of the vulnerability,” Fewer said.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleChinese hackers target Tibetan websites in malware attack, cybersecurity group says
Next Article Italian politicians express alarm at latest data breach allegedly affecting 800,000 citizens
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Chinese APTs Exploit ToolShell Zero-Days Ahead of Patch

July 22, 2025

Microsoft Links Ongoing SharePoint Exploits to Chinese Hacker Groups

July 22, 2025

Securing the Future: Enterprise AI Lockdown Strategies

July 22, 2025
Leave A Reply Cancel Reply

Latest Posts

Chinese APTs Exploit ToolShell Zero-Days Ahead of Patch

July 22, 20250 Views

Microsoft Links Ongoing SharePoint Exploits to Chinese Hacker Groups

July 22, 20250 Views

Dell Declares Data Leak a Hoax

July 22, 20250 Views

"Reclaiming Control: Fixing Broken Security Operations"

July 22, 20250 Views
Don't Miss

Big Risks for Malicious Code, Vulns

By Staff WriterFebruary 14, 2025

Attackers are finding more and more ways to post malicious projects to Hugging Face and…

North Korea’s Kimsuky Attacks Rivals’ Trusted Platforms

February 19, 2025

Deepwatch Acquires Dassana to Boost Cyber Resilience With AI

February 18, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Chinese APTs Exploit ToolShell Zero-Days Ahead of Patch

July 22, 2025

Microsoft Links Ongoing SharePoint Exploits to Chinese Hacker Groups

July 22, 2025

Dell Declares Data Leak a Hoax

July 22, 2025
Most Popular

Designing and Building Defenses for the Future

February 13, 202515 Views

United Natural Foods Faces Cyberattack Disruption

June 10, 20256 Views

Attackers lodge backdoors into Ivanti Connect Secure devices

February 15, 20255 Views
© 2025 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.