By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms
Tech News

Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms

By Viral Trending Content 5 Min Read
Share
SHARE

Jul 03, 2025Ravie LakshmananThreat Intelligence / Vulnerability

Chinese Hackers Exploit Ivanti CSA Zero-Days

The French cybersecurity agency on Tuesday revealed that a number of entities spanning governmental, telecommunications, media, finance, and transport sectors in the country were impacted by a malicious campaign undertaken by a Chinese hacking group by weaponizing several zero-day vulnerabilities in Ivanti Cloud Services Appliance (CSA) devices.

The campaign, detected at the beginning of September 2024, has been attributed to a distinct intrusion set codenamed Houken, which is assessed to share some level overlaps with a threat cluster tracked by Google Mandiant under the moniker UNC5174 (aka Uteus or Uetus).

“While its operators use zero-day vulnerabilities and a sophisticated rootkit, they also leverage a wide number of open-source tools mostly crafted by Chinese-speaking developers,” the French National Agency for the Security of Information Systems (ANSSI) said. “Houken’s attack infrastructure is made up of diverse elements — including commercial VPNs and dedicated servers.”

The agency theorized that Houken is likely being used by an initial access broker since 2023 with an aim to gain a foothold into target networks and then shared with other threat actors interested in carrying out follow-on post-exploitation activities, reflective of a multi-party approach to vulnerability exploitation, as pointed out by HarfangLab.

Cybersecurity

“A first party identifies vulnerabilities, a second uses them at scale to create opportunities, then accesses are distributed to third parties which further attempt to develop targets of interest,” the French cybersecurity company noted earlier this February.

“The operators behind the UNC5174 and Houken intrusion sets are likely primarily looking for valuable initial accesses to sell to a state-linked actor seeking insightful intelligence,” the agency added.

In recent months, UNC5174 has been linked to the active exploitation of SAP NetWeaver flaws to deliver GOREVERSE, a variant of GoReShell. The hacking crew has also leveraged vulnerabilities in Palo Alto Networks, Connectwise ScreenConnect, and F5 BIG-IP software in the past to deliver the SNOWLIGHT malware, which is then used to drop a Golang tunneling utility called GOHEAVY.

Another report from SentinelOne attributed the threat actor to an intrusion against a “leading European media organization” in late September 2024.

In the attacks documented by ANSSI, the attackers have been observed exploiting three security defects in Ivanti CSA devices, CVE-2024-8963, CVE-2024-9380, and CVE-2024-8190, as zero-days to obtain credentials and establish persistence using one of the three methods –

  • Directly deploying PHP web shells
  • Modifying existing PHP scripts to inject web shell capabilities, and
  • Installing a kernel module that serves as a rootkit

The attacks are characterized by the use of publicly available web shells like Behinder and neo-reGeorg, followed by the deployment of GOREVERSE to maintain persistence after lateral movements. Also employed is an HTTP proxy tunneling tool called suo5 and a Linux kernel module named “sysinitd.ko” that was documented by Fortinet in October 2024 and January 2025.

“It is composed of a kernel module (sysinitd.ko) and a user-space executable file (sysinitd) installed on the targeted device through the execution of a shell script: install.sh,” ANSSI said. “By hijacking inbound TCP traffic over all ports, and invoking shells, sysinitd.ko and sysinitd allow the remote execution of any command with root privileges.”

Cybersecurity

That’s not all. Besides conducting reconnaissance and operating in the UTC+8 time zone (which corresponds to China Standard Time), the attackers have been observed attempting to patch the vulnerabilities, likely to prevent exploitation by other unrelated actors, ANSSI added.

It’s suspected that the threat actors have a wide targeting range, comprising governmental and education sectors in Southeast Asia, non-governmental organizations located in China, including Hong Kong and Macau, and governmental, defence, education, media or telecommunication sectors in the West.

On top of that, the tradecraft similarities between Houken and UNC5174 have raised the possibility that they are operated by a common threat actor. That having said, at least in one incident, the threat actors are said to have weaponized the access to deploy cryptocurrency miners, underscoring their financial motivations.

“The threat actor behind the Houken and UNC5174 intrusion sets might correspond to a private entity, selling accesses and worthwhile data to several state-linked bodies while seeking its own interests leading lucrative oriented operations,” ANSSI said.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

New Dungarvan & West Waterford Gift Card launched

Gemini 3 vs GPT-5 Pro: Coding, Math, Benchmarks & Creative Tests

New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT

‘Powerful AI is now changing what it means to be good at your work’

OnePlus 15 is Wake-up Call that Apple & Samsung Should Not Ignore

TAGGED: cyber espionage, Cyber Security, Cybersecurity, Internet, Ivanti, Malware, Open Source, Palo Alto Networks, rootkit, Threat Intelligence, Vulnerability, Zero-Day
Share This Article
Facebook Twitter Copy Link
Previous Article London IPO fundraising falls to 30-year low
Next Article Xbox Execs Reportedly Raved About ‘Blade Runner Meets Destiny 2’ Loot Shooter Before Canceling It
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

LoHi restaurant blames local contractors for sewage deluge, long closure
Business
New Dungarvan & West Waterford Gift Card launched
Tech News
Ukraine signs deal with France for 100 Rafale jets and air defence systems
World News
Future with U: Phemex celebrates its 6th anniversary with 66% user growth and shared vision
Crypto
Fallout 4 Anniversary Edition is a Mess That Could Have Been Avoided
Gaming News
Google parent Alphabet shares jump 5% after Berkshire Hathaway makes rare tech bet with $4.9 billion stake
Business
Ethereum Treasuries In Trouble: 65% Of Firms Under mNAV
Crypto

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

LoHi restaurant blames local contractors for sewage deluge, long closure

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
LoHi restaurant blames local contractors for sewage deluge, long closure
November 18, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?