By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Ivanti EPMM flaw exploited by Chinese hackers to breach govt agencies
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Ivanti EPMM flaw exploited by Chinese hackers to breach govt agencies
Tech News

Ivanti EPMM flaw exploited by Chinese hackers to breach govt agencies

By admin 4 Min Read
Share
SHARE

Chinese hackers have been exploiting a remote code execution flaw in Ivanti Endpoint Manager Mobile (EPMM) to breach high-profile organizations worldwide.

The flaw is identified as CVE-2025-4428 and received a high-severity score.

The issue can be leveraged to execute code remotely on Ivanti EPMM version 12.5.0.0 and earlier via specially crafted API requests.

Ivanti disclosed the flaw together with an authentication bypass (CVE-2025-4427) and patched them both on May 13, 2025, noting that the two issues had been exploited previously against a “very limited number of customers.”

Yesterday, EclecticIQ’s researcher Arda Büyükkaya reported seeing CVE-2025-4428 being exploited extensively in the wild since May 15, and attributed them with high confidence to the UNC5221 activity cluster.

The particular threat group is considered an Ivanti specialist, regularly exploiting zero-day vulnerabilities in the firm’s products, like Connect Secure in January and again in April 2025.

The researcher confirmed this to BleepingComputer. He commented on the hackers’ deep knowledge about Ivanti systems saying that they know which files hold the information required for the next step of the attack, such as cleartext MySQL credentials, and targeting those specifically.

Exposed cleartext credentials
<strong>Exposed cleartext credentials</strong><br /><em>Source: EclecticIQ</em>

The entities targeted in the latest UNC5221 exploitation campaign are:

  • UK National Health Service institutions
  • National healthcare/pharma provider in North America
  • U.S. medical device manufacturer
  • Municipal agencies in Scandinavia and the UK
  • German Federal Research Institute
  • German telecommunications giant and IT subsidiaries
  • U.S.-based cybersecurity firm
  • Major U.S. foodservice distributor
  • Irish aerospace leasing firm
  • German industrial manufacturer
  • Japanese automotive electronics and powertrain supplier
  • U.S. firearms manufacturer
  • South Korean multinational commercial and consumer bank

These were confirmed breaches, as evidenced by reverse shells, data exfiltration/database exports, persistent malware injections, and abuse of internal Office 365 tokens and LDAP configurations.

The request triggering the CVE-2025-4428 exploit
<strong>The request triggering the CVE-2025-4428 exploit</strong><br /><em>Source: EclecticIQ</em>

Büyükkaya told BleepingComputer that based on the observed post-compromise activity, the threat actor was most likely engaged in espionage, monitoring high-value targets related to strategic interests.

The threat actor performed host reconnaissance by running system commands to gather details about the device, users, network, and configuration files, before dropping the KrystyLoader payload from a compromised AWS S3 bucket.

Dropping KrustyLoader on the target
<strong>Dropping KrustyLoader on the target</strong><br /><em>Source: EclecticIQ</em>

The output of those commands was temporarily saved as disguised .JPG files in a web-accessible directory, then immediately deleted to evade detection.

This indicates real-time data exfiltration, likely via HTTP GET requests, followed by artifact cleanup.

The EclecticIQ report also notes that the latest attacks conducted by UNC5221 feature links to the Linux backdoor ‘Auto-Color’ first reported by Palo Alto Networks’ Unit 42 in February but without clear attribution at the time.

The latest attacks indicate that Chinese espionage groups continue to target network perimeter devices for initial access into target organizations.

The exploitation that EclecticIQ observed started two days after the public disclosure, highlighting the criticality of applying security updates as soon as possible.

Red Report 2025

Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.

You Might Also Like

The Ultimate Dolby Atmos Experience Might Be In Your Car

Samsung Tri-fold Foldable Named and Dated

AI’s Next Evolution: From Advisor to Architect – New TCS/MIT SMR Study Reveals Game-Changing Shift

9 Best Coolers WIRED Tested for Every Budget, Any Situation

Astronomers observe the earliest moments of a new solar system

TAGGED: Actively Exploited, China, Ivanti, Ivanti Endpoint Manager Mobile, UNC5221, Vulnerability
Share This Article
Facebook Twitter Copy Link
Previous Article Lewis Hamilton admits he'll lose sleep at Monaco GP as Ferrari fears come to light
Next Article AI Is Eating Data Center Power Demand—and It’s Only Getting Worse
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

The Ultimate Dolby Atmos Experience Might Be In Your Car
Tech News
Littler fuelled for World Matchplay by 'hours and hours' of practice
Sports
Assassin’s Creed Shadows’ Development Budget Exceeded €100 Million
Gaming News
Asian shares, yen weather Japan uncertainty as earnings loom
Business
Samsung Tri-fold Foldable Named and Dated
Tech News
Ether preps record short squeeze as analysis sees $4K ETH price ‘soon’
Crypto
Ubisoft Shareholder Confronts Boss About 'Woke' Assassin's Creed
Gaming News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

The Ultimate Dolby Atmos Experience Might Be In Your Car

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
The Ultimate Dolby Atmos Experience Might Be In Your Car
July 21, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?