API security

Chinese threat actors continue exploiting Ivanti VPN flaws using new malware

Share
close up on man hand type password on keyboard computer desktop to access VPN mode

Cybersecurity firm Mandiant warned that Chinese threat actors are using new malware to continue exploiting recent vulnerabilities in Ivanti Connect Secure VPN appliances, reports SecurityWeek.

Ivanti addressed the flaws on Jan. 31 and patched a fifth vulnerability in its enterprise VPN and network access products roughly a week later. After the patch rollout, attackers continued exploiting one of the vulnerabilities tracked as CVE-2024-21893, which is described as a server-side request forgery vulnerability in Ivanti’s enterprise VPN and network access appliances' SAML component. Mandiant notes that CVE-2024-21893 is being exploited by a threat actor from China tracked as UNC5325 to deploy new malware families such as PitJet, Pitdog, PitStop, PitHook, and LittleLamb.WoolTea. UNC5325 seems to be linked to Chinese cyberespionage group UNC3886, which was previously observed exploiting vulnerable VMware products and "has primarily targeted the defense industrial base, technology, and telecommunication organizations located in the US and APJ regions." "UNC5325 demonstrates significant knowledge of the Ivanti Connect Secure appliance as seen in both the malware they used and the attempts to persist across factory resets.” Mandiant notes.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.