Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Willow’s voice keyboard lets you type across all your iOS apps — and actually edit what you said

    Kering-backed fund Mirova pours $30.5M into India’s Varaha for regenerative farming

    Jack Dorsey funds diVine, a Vine reboot that includes Vine’s video archive

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Amazon to lay off 14,000 corporate employees

      October 29, 2025

      Elon Musk launches Grokipedia as an alternative to ‘woke’ Wikipedia

      October 29, 2025

      Fears of an AI bubble are growing, but some on Wall Street aren’t worried just yet

      October 18, 2025

      The sleeper issue that could play a huge role in Virginia and New Jersey — and the midterms

      October 16, 2025

      California bill regulating top AI companies signed into law

      September 30, 2025
    • Business

      Government faces questions about why US AWS outage disrupted UK tax office and banking firms

      October 23, 2025

      Amazon’s AWS outage knocked services like Alexa, Snapchat, Fortnite, Venmo and more offline

      October 21, 2025

      SAP ECC customers bet on composable ERP to avoid upgrading

      October 18, 2025

      Revenue generated by neoclouds expected to exceed $23bn in 2025, predicts Synergy

      October 15, 2025

      You can now try Fortnite directly in Discord

      October 8, 2025
    • Crypto

      JPMorgan Achieves First True Bridge Between Banks and DeFi

      November 12, 2025

      3 Signs Pointing to Mounting Selling Pressure on Pi Network in November

      November 12, 2025

      Dogecoin Faces Its Toughest Q4 In Years — Can a Late Bounce Save 2025?

      November 12, 2025

      Did One Whale Steal aPriori’s Airdrop? 14,000 Wallets Raise Big Questions

      November 12, 2025

      Why Analysts See A $5 Target for XRP Price in Q4 2025

      November 12, 2025
    • Technology

      Willow’s voice keyboard lets you type across all your iOS apps — and actually edit what you said

      November 13, 2025

      Kering-backed fund Mirova pours $30.5M into India’s Varaha for regenerative farming

      November 13, 2025

      Jack Dorsey funds diVine, a Vine reboot that includes Vine’s video archive

      November 13, 2025

      ‘Chad: The Brainrot IDE’ is a new Y Combinator-backed product so wild, people thought it was fake

      November 13, 2025

      Cybersecurity firm Deepwatch lays off dozens, citing move to ‘accelerate’ AI investment

      November 13, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»CISA exposes malware kits deployed in Ivanti EPMM attacks
    Technology

    CISA exposes malware kits deployed in Ivanti EPMM attacks

    TechAiVerseBy TechAiVerseSeptember 20, 2025No Comments3 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    CISA exposes malware kits deployed in Ivanti EPMM attacks
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    CISA exposes malware kits deployed in Ivanti EPMM attacks

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published an analysis of the malware deployed in attacks exploiting vulnerabilities affecting Ivanti Endpoint Manager Mobile (EPMM).

    The flaws are an authentication bypass in EPMM’s API component (CVE-2025-4427) and a code injection vulnerability (CVE-2025-4428) that allows execution of arbitrary code.

    The two vulnerabilities affect the following Ivanti EPMM development branches and their earlier releases: 11.12.0.4, 12.3.0.1, 12.4.0.1, and 12.5.0.0.

    Ivanti addressed the issues on May 13, but threat actors had already been exploiting them as zero days in attacks against “a very limited number of customers.”

    About a week later, threat intelligence platform EclecticIQ reported with high confidence that a China-nexus espionage group was leveraging the two vulnerabilities since at least May 15.

    The researchers said that the China-linked threat actor is very knowledgeable of Ivanti EPMM’s internal architecture, being capable of repurposing system components to exfiltrate data.

    CISA’s report, though, does not make any attribution and focuses only on the technical details of malicious files obtained from an organization attacked by threat actors using an exploit chain for CVE-2025-4427 and CVE-2025-4428.

    Split malware delivery

    The U.S. agency analyzed two sets of malware consisting of five files that the hackers used to gain initial access to on-premise Ivanti EPMM systems.

    “The cyber threat actors targeted the /mifs/rs/api/v2/ endpoint with HTTP GET requests and used the ?format= parameter to send malicious remote commands,” CISA says.

    The commands let the threat actor run reconnaissance activity by collecting system information, listing the root directory, mapping the network, fetching malicious files, and extracting Lightweight Directory Access Protocol (LDAP) credentials.

    Each of the analyzed malware sets included a distinct loader but with the same name, and malicious listeners that allow injecting and running arbitrary code on the compromised system:

    • Set 1:
      • web-install.jar (Loader 1)
      • ReflectUtil.class – included on Loader 1, manipulates Java objects to inject and manage the malicious listener in the set
      • SecurityHandlerWanListener.class – malicious listener that could be used to inject and execute code on the server, to exfiltrate data, and establish persistence
    • Set 2:
      • web-install.jar (Loader 2)
      • WebAndroidAppInstaller.class – a malicious listener in Loader 2, that the threat actor could use to inject and execute code, create persistence, and exfiltrate data

    According to CISA, the threat actor delivered the malware through separate HTTP GET requests in segmented, Base64-encoded chunks.

    The two distinct malware sets function similarly, intercepting specific HTTP requests to decode and run payloads provided by the attackers.

    CISA has provided detailed indicators of compromise (IOCs), YARA rules, and a SIGMA rule to help organizations detect such attacks.

    The agency’s recommendation for companies that find the analyzed malware or similar files on their systems is to isolate the affected hosts, collect and review artifacts, and create a full forensic disk image to share with CISA.

    As mitigation action, CISA recommends patching affected Ivanti EPMM immediately and treating mobile device management (MDM) systems as high-value assets (HVAs) that require additional security restrictions and monitoring.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleFortra warns of max severity flaw in GoAnywhere MFT’s License Servlet
    Next Article FBI warns of cybercriminals using fake FBI crime reporting portals
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Willow’s voice keyboard lets you type across all your iOS apps — and actually edit what you said

    November 13, 2025

    Kering-backed fund Mirova pours $30.5M into India’s Varaha for regenerative farming

    November 13, 2025

    Jack Dorsey funds diVine, a Vine reboot that includes Vine’s video archive

    November 13, 2025
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025380 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 202597 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 202571 Views

    Is Libby Compatible With Kobo E-Readers?

    March 31, 202555 Views
    Don't Miss
    Technology November 13, 2025

    Willow’s voice keyboard lets you type across all your iOS apps — and actually edit what you said

    Willow’s voice keyboard lets you type across all your iOS apps — and actually edit…

    Kering-backed fund Mirova pours $30.5M into India’s Varaha for regenerative farming

    Jack Dorsey funds diVine, a Vine reboot that includes Vine’s video archive

    ‘Chad: The Brainrot IDE’ is a new Y Combinator-backed product so wild, people thought it was fake

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Willow’s voice keyboard lets you type across all your iOS apps — and actually edit what you said

    November 13, 20253 Views

    Kering-backed fund Mirova pours $30.5M into India’s Varaha for regenerative farming

    November 13, 20253 Views

    Jack Dorsey funds diVine, a Vine reboot that includes Vine’s video archive

    November 13, 20251 Views
    Most Popular

    Xiaomi 15 Ultra Officially Launched in China, Malaysia launch to follow after global event

    March 12, 20250 Views

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views

    French Apex Legends voice cast refuses contracts over “unacceptable” AI clause

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.