By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features
Tech News

RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features

By Viral Trending Content 4 Min Read
Share
SHARE

Mar 30, 2025Ravie LakshmananVulnerability / Zero-Day

RESURGE Malware

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has shed light on a new malware called RESURGE that has been deployed as part of exploitation activity targeting a now-patched security flaw in Ivanti Connect Secure (ICS) appliances.

“RESURGE contains capabilities of the SPAWNCHIMERA malware variant, including surviving reboots; however, RESURGE contains distinctive commands that alter its behavior,” the agency said. “The file contains capabilities of a rootkit, dropper, backdoor, bootkit, proxy, and tunneler.”

The security vulnerability associated with the deployment of the malware is CVE-2025-0282, a stack-based buffer overflow vulnerability affecting Ivanti Connect Secure, Policy Secure, and ZTA Gateways that could result in remote code execution.

Cybersecurity

It impacts the following versions –

  • Ivanti Connect Secure before version 22.7R2.5
  • Ivanti Policy Secure before version 22.7R1.2, and
  • Ivanti Neurons for ZTA gateways before version 22.7R2.3

According to Google-owned Mandiant, CVE-2025-0282 has been weaponized to deliver what’s called the SPAWN ecosystem of malware, comprising several components such as SPAWNANT, SPAWNMOLE, and SPAWNSNAIL. The use of SPAWN has been attributed to a China-nexus espionage group dubbed UNC5337.

Last month, JPCERT/CC revealed that it observed the security defect being used to deliver an updated version of SPAWN known as SPAWNCHIMERA, which combines all the aforementioned disparate modules into one monolithic malware, while also incorporating changes to facilitate inter-process communication via UNIX domain sockets.

Most notably, the revised variant harbored a feature to patch CVE-2025-0282 so as to prevent other malicious actors from exploiting it for their campaigns.

RESURGE (“libdsupgrade.so”), per CISA, is an improvement over SPAWNCHIMERA with support for three new commands –

  • Insert itself into “ld.so.preload,” set up a web shell, manipulate integrity checks, and modify files
  • Enable the use of web shells for credential harvesting, account creation, password resets, and privilege escalation
  • Copy the web shell to the Ivanti running boot disk and manipulate the running coreboot image

CISA said it also unearthed two other artifacts from an unspecified critical infrastructure entity’s ICS device: A variant of SPAWNSLOTH (“liblogblock.so”) contained within RESURGE and a bespoke 64-bit Linux ELF binary (“dsmain”).

Cybersecurity

“The [SPAWNSLOTH variant] tampers with the Ivanti device logs,” it said. “The third file is a custom embedded binary that contains an open-source shell script and a subset of applets from the open-source tool BusyBox. The open-source shell script allows for the ability to extract an uncompressed kernel image (vmlinux) from a compromised kernel image.”

It’s worth noting that CVE-2025-0282 has also been exploited as a zero-day by another China-linked threat group tracked as Silk Typhoon (formerly Hafnium), Microsoft disclosed earlier this month.

The latest findings indicate that the threat actors behind the malware are actively refining and reworking their tradecraft, making it imperative that organizations patch their Ivanti instances to the latest version.

As further mitigation, it’s advised to reset credentials of privileged and non-privileged accounts, rotate passwords for all domain users and all local accounts, review access policies to temporarily revoke privileges for affected devices, reset relevant account credentials or access keys, and monitor accounts for signs of anomalous activity.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

AI’s Next Evolution: From Advisor to Architect – New TCS/MIT SMR Study Reveals Game-Changing Shift

9 Best Coolers WIRED Tested for Every Budget, Any Situation

Astronomers observe the earliest moments of a new solar system

EncryptHub Targets Web3 Developers Using Fake AI Platforms to Deploy Fickle Stealer Malware

Best Nintendo Switch 2 Controllers (2025), Tested and Reviewed

TAGGED: CISA, critical infrastructure, cyber espionage, Cyber Security, Cybersecurity, Internet, Ivanti, Malware, rootkit, Vulnerability, Zero-Day
Share This Article
Facebook Twitter Copy Link
Previous Article Today in History: March 30, Reagan shot in assassination attempt
Next Article What are crypto-backed mortgages, and how do they work?
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Ether preps record short squeeze as analysis sees $4K ETH price ‘soon’
Crypto
Ubisoft Shareholder Confronts Boss About 'Woke' Assassin's Creed
Gaming News
Low P/E ratios, yields up to 9%! Are these the FTSE 250’s best value stocks?
Business
What’s in the Epstein grand jury transcripts? Former prosecutor says ‘It’s not going to be much’
Business
Crypto Crooks Take Over Stellar Blade’s X Account, Spread Fake Crypto
Crypto
Tom Bergeron: Photos of the Former ‘Dancing With the Stars’ Host Over the Years
Celebrity
‘Crypto Week’ ushers in big change: What happens now?
Crypto

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Ether preps record short squeeze as analysis sees $4K ETH price ‘soon’

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Ether preps record short squeeze as analysis sees $4K ETH price ‘soon’
July 21, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?