CISA warns that RESURGE malware can be dormant on Ivanti devices
嗯,用户让我用中文帮他总结一下这篇文章的内容,控制在一百个字以内。他不需要以“文章内容总结”或者“这篇文章”这样的开头,直接写描述即可。好的,首先我需要仔细阅读文章,抓住主要信息。 文章主要讲的是美国网络安全和基础设施安全局(CISA)发布了关于恶意软件RESURGE的新细节。这个恶意软件利用了零日漏洞CVE-2025-0282,攻击Ivanti Connect Secure设备。RESURGE能够隐藏在设备中不被检测到,并且使用复杂的网络级 evasion 和认证技术来进行隐蔽通信。 CISA最初在去年3月28日记录了这个恶意软件,它可以在重启后存活,创建webshell窃取凭证,创建账户,重置密码,并提升权限。研究人员指出,这个漏洞自2024年12月中旬以来被一个与中国有关的威胁行为者利用。 更新后的公告详细说明了RESURGE的技术细节,包括它如何通过特定的TLS连接等待攻击者的指令,以及使用伪造的证书来逃避检测。此外,RESURGE还具备持久性和静默通信的能力。 总结一下,文章主要介绍了RESURGE的恶意功能、攻击手法以及CISA提供的检测和防御建议。所以,在总结的时候需要涵盖这些关键点:恶意软件名称、攻击目标、利用的漏洞、隐藏机制、复杂技术以及CISA的建议。 接下来我要把这些信息浓缩到100字以内。确保涵盖主要点:RESURGE恶意软件、零日漏洞CVE-2025-0282、Ivanti设备攻击、隐藏和网络 evasion 技术、CISA建议使用IoCs检测和移除。 现在试着组织语言:“CISA披露恶意软件RESURGE利用零日漏洞CVE-2025-0282攻击Ivanti设备。该软件可隐藏潜伏并使用复杂网络技术进行隐蔽通信。研究人员指出其自去年12月起被中国关联威胁行为者用于攻击。” 这样大约79个字左右,符合要求,并且涵盖了主要信息。 </think> CISA披露恶意软件RESURGE利用零日漏洞CVE-2025-0282攻击Ivanti设备。该软件可隐藏潜伏并使用复杂网络技术进行隐蔽通信。研究人员指出其自去年12月起被中国关联威胁行为者用于攻击。 2026-2-27 16:0:22 Author: www.bleepingcomputer.com(查看原文) 阅读量:0 收藏

CISA warns that RESURGE malware can be dormant on Ivanti devices

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released new details about RESURGE, a malicious implant used in zero-day attacks exploiting CVE-2025-0282 to breach Ivanti Connect Secure devices.

The update focuses on the implant's undetected latency on the appliances and its "sophisticated network-level evasion and authentication techniques" that enable covert communication with the attacker.

CISA originally documented the malware on March 28 last year, saying that it can survive reboots, create webshells for stealing credentials, create accounts, reset passwords, and escalate privileges.

Wiz

According to researchers at incident response company Mandiant, the critical CVE-2025-0282 vulnerability was exploited as a zero-day since mid-December 2024 by a threat actor linked to China, tracked internally as UNC5221.

Network-level evasion

CISA's updated bulletin provides additional technical information on RESURGE, a malicious 32-bit Linux Shared Object file named libdsupgrade.so that was extracted from a compromised device.

The implant is described as a passive command-and-control (C2) implant with rootkit, bootkit, backdoor, dropper, proxying, and tunneling capabilities.

Instead of beaconing to the C2, it waits indefinitely for a particular inbound TLS connection, evading network monitoring, CISA says in the updated document.

When loaded under the ‘web’ process, it hooks the ‘accept()’ function to inspect incoming TLS packets before they reach the web server, looking for specific connection attempts from a remote attacker that are identified using the CRC32 TLS fingerprint hashing scheme.

If the fingerprint does not match, traffic is directed to the legitimate Ivanti server. CISA further details Rusrge's authentication mechanism saying that the threat actor also uses a fake Ivanti certificate to ensure that they are interacting with the implant and not the Ivanti web server.

The agency highlights that the certificate's purpose is just to for authentication and verification purposes, as it is not used to encrypt communication. Furthermore, the fake certificate also helps the actor evade detection by impersonating the legitimate server.

Because the forged certificate is sent unencrypted over the internet, CISA says that defenders could use it as a network signature to detect an active compromise.

After fingerprint validation and authentication with the malware, the threat actor establishes secure remote access to the implant using a Mutual TLS session encrypted with the Elliptic Curve protocol.

"Static analysis indicates the RESURGE implant will request the remote actors' EC key to utilize for encryption, and will also verify it with a hard-coded EC Certificate Authority (CA) key," CISA says.

By mimicking legitimate TLS/SSH traffic, the implant achieves stealth and persistence, the American cybersecurity agency says.

Another file analyzed is a variant of the SpawnSloth malware using the name liblogblock.so and contained by the RESURGE implant. Its main purpose is log tampering to hide malicious activity on compromised devices.

A third file that CISA analyzed is dsmain, a kernel extraction script that embeds the open-source script 'extract_vmlinux.sh' and the BusyBox collection of Unix/Linux utilities.

liblogblock.so - 3526af9189533470bc0e90d54bafb0db7bda784be82a372ce112e361f7c7b104
libdsupgrade.so - 52bbc44eb451cb5e16bf98bc5b1823d2f47a18d71f14543b460395a1c1b1aeda
dsmain - b1221000f43734436ec8022caaa34b133f4581ca3ae8eccd8d57ea62573f301d

It allows RESURGE to decrypt, modify, and re-encrypt coreboot firmware images and manipulate filesystem contents for boot-level persistence.

“CISA’s updated analysis shows that RESURGE can remain latent on systems until a remote actor attempts to connect to the compromised device,” the agency notes. Because of this, the malicious implant "may be dormant and undetected on Ivanti Connect Secure devices and remains an active threat."

CISA suggests that system administrators use the updated indicators of compromise (IoCs) to discover dormant RESURGE infections and remove them from Ivanti devices.

tines

The future of IT infrastructure is here

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.


文章来源: https://www.bleepingcomputer.com/news/security/cisa-warns-that-resurge-malware-can-be-dormant-on-ivanti-devices/
如有侵权请联系:admin#unsafe.sh