Ivanti zero-day attacks infected devices with custom malware

Share:

Hackers exploiting the critical Ivanti Connect Secure zero-day vulnerability disclosed yesterday installed on compromised VPN appliances new malware called ‘Dryhook’ and ‘Phasejam’ that is not currently associated with any threat group.

The security issue, now tracked as CVE-2025-0282 is a critical stack-based buffer overflow flaw that impacts Ivanti Connect Secure 22.7R2.5 and older, Ivanti Policy Secure 22.7R1.2 and older, and Ivanti Neurons for ZTA gateways 22.7R2.3 and older.

Although the flaw has a broad impact, the vendor specified that attacks were only observed against Connect Secure appliances while also noting that the number of affected customers is “limited.”

According to cybersecurity company Mandiant (now part of Google Cloud), attackers started leveraging the vulnerability since mid-December and used the custom Spawn malware toolkit.

The malicious framework is typically associated with a suspected China-linked espionage that the company tracks as UNC5337 and is likely part of a larger cluster tracked as UNC5221.

However, the previously unknown ‘Dryhook’ and ‘Phasejam’ malware families found on some compromised appliances are not attributed to any threat group at this time.

Attack chain and new malware
Mandiant’s report informs that the attacker sent HTTP requests to specific URLs to identify ICS appliance versions. To hide the origin, the threat actor passed the requests through VPS providers or Tor networks.

Next, they exploited CVE-2025-0282 to gain initial access, disabled SELinux protections, modified iptables rules to prevent syslog forwarding, and remounted the drive as ‘read-write’ to allow malware deployment.

The researchers say that the hackers launched the Phasejam dropper, which that deploys a web shell to compromised components such as ‘getComponent.cgi’ and ‘restAuth.cgi,’ while also overwriting system files to allow command execution.

Commands supported by the web shell
Commands supported by the web shell
Source: Mandiant
The hackers also modified the upgrade script ‘DSUpgrade.pm’ to block real upgrades and simulate a fake upgrade process, so the malware would persist on the system.

The attackers also install ‘Spawn’ tools like Spawnmole (tunneler), Spawnsnail (SSH backdoor), and Spawnsloth (log tampering utility), which, unlike the Phasejam web shell, can persist across system upgrades.

Both Spawn malware and the new threata tried to evade Ivanti’s Integrity Checker Tool (ICT) by recalculating the SHA256 file hashes for the malicious files so they passed verification.

“SPAWNANT is careful to circumvent the ICT by recalculating the SHA256 hash for any maliciously modified files. Once the appropriate modifications are complete, SPAWNANT generates a new RSA key pair to sign the modified manifest.” – Mandiant

The hackers goal appears to be stealing databases in the appliance that typically contain sensitive information related to “VPN sessions, session cookies, API keys, certificates, and credential material.”

“Mandiant has observed the threat actor archiving the database cache on a compromised appliance and staging the archived data in a directory served by the public-facing web server to enable exfiltration of the database,” explain the researchers.

Finally, the threat actors use a new piece of malware called Dryhook to capture usernames and passwords during standard authentication processes and store them in base64-encoded form for future retrieval.

Code that generates a fake upgrade screen
Code that generates a fake upgrade screen
Source: Mandiant
Defense measures
System administrators are recommended to perform a factory reset and upgrade to Ivanti Connect Secure 22.7.R2.5, even if internal and external ICT scans find no signs of malicious activity.

Mandiant has also shared a list of indicators of compromise (IoCs) along with YARA rules to help detect suspicious activity associated with this campaign.

According to Macnica researcher Yutaka Sejiyama, there were over 3,600 ICS appliances exposed on the public web when Ivanti released a patch for the vulnerability.

The researcher told BleepingComputer that the number has now dropped to about 2,800, so there’s still a significant attack surface that remains exposed to attacks.

Source

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
11:34 pm, Jan 14, 2025
weather icon 9°C
L: 8° | H: 10°
overcast clouds
Humidity: 92 %
Pressure: 1034 mb
Wind: 6 mph WSW
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 100%
Rain Chance: 0%
Visibility: 8 km
Sunrise: 8:00 am
Sunset: 4:18 pm
DailyHourly
Daily ForecastHourly Forecast
Tomorrow 9:00 pm
weather icon
8° | 10°°C 0 mm 0% 3 mph 97 % 1035 mb 0 mm/h
Thu Jan 16 9:00 pm
weather icon
5° | 9°°C 0 mm 0% 4 mph 96 % 1034 mb 0 mm/h
Fri Jan 17 9:00 pm
weather icon
4° | 8°°C 0 mm 0% 5 mph 92 % 1035 mb 0 mm/h
Sat Jan 18 9:00 pm
weather icon
2° | 7°°C 0 mm 0% 3 mph 90 % 1033 mb 0 mm/h
Sun Jan 19 9:00 pm
weather icon
2° | 7°°C 0 mm 0% 4 mph 96 % 1024 mb 0 mm/h
Tomorrow 12:00 am
weather icon
8° | 9°°C 0 mm 0% 3 mph 92 % 1034 mb 0 mm/h
Tomorrow 3:00 am
weather icon
7° | 8°°C 0 mm 0% 3 mph 94 % 1034 mb 0 mm/h
Tomorrow 6:00 am
weather icon
6° | 7°°C 0 mm 0% 2 mph 95 % 1034 mb 0 mm/h
Tomorrow 9:00 am
weather icon
7° | 7°°C 0 mm 0% 3 mph 97 % 1035 mb 0 mm/h
Tomorrow 12:00 pm
weather icon
9° | 9°°C 0 mm 0% 2 mph 89 % 1034 mb 0 mm/h
Tomorrow 3:00 pm
weather icon
9° | 9°°C 0 mm 0% 2 mph 89 % 1033 mb 0 mm/h
Tomorrow 6:00 pm
weather icon
7° | 7°°C 0 mm 0% 2 mph 95 % 1034 mb 0 mm/h
Tomorrow 9:00 pm
weather icon
7° | 7°°C 0 mm 0% 2 mph 96 % 1034 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€93,613.88
2.41%
Ethereum(ETH)
€3,131.43
3.15%
XRP(XRP)
€2.59
6.02%
Tether(USDT)
€0.97
0.01%
Solana(SOL)
€182.30
2.71%
Dogecoin(DOGE)
€0.346274
5.93%
USDC(USDC)
€0.97
0.00%
Shiba Inu(SHIB)
€0.000021
2.43%
Pepe(PEPE)
€0.000016
3.54%
Peanut the Squirrel(PNUT)
€0.60
6.86%
Scroll to Top