CISA Warns RESURGE Malware Can Remain Dormant on Ivanti Connect Secure Devices
好的,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”这样的开头。首先,我需要通读整篇文章,抓住主要信息。 文章主要讲的是CISA更新了关于RESURGE恶意软件的分析报告。这种恶意软件能够潜伏在被入侵的设备中很长时间,只有在攻击者尝试远程访问时才会激活。它还使用了高级加密技术和伪造的证书来隐藏自己的通信,这让检测变得更加困难。 接下来,我需要把这些关键点浓缩到100字以内。要确保涵盖恶意软件的潜伏特性、使用的加密技术以及对组织的风险。同时,要避免使用复杂的术语,让总结更易理解。 可能的结构是:CISA更新报告指出RESURGE恶意软件如何潜伏、激活条件、使用的加密和证书技术、以及对组织的风险。这样既全面又简洁。 最后,检查字数是否符合要求,并确保表达清晰流畅。 </think> CISA更新报告指出,RESURGE恶意软件可潜伏于Ivanti设备中长时间不活跃,仅在攻击者远程访问时激活。其利用高级加密、伪造证书和SSH隧道隐蔽通信,增加检测难度。该恶意软件通过篡改文件和部署网络壳维持持久性,对关键基础设施构成严重威胁。 2026-3-2 10:18:58 Author: thecyberexpress.com(查看原文) 阅读量:14 收藏

The latest update on RESURGE malware from Cybersecurity and Infrastructure Security Agency (CISA) signals a concerning reality for network defenders: stealth-focused malware is becoming harder to detect and easier to maintain inside enterprise infrastructure.

In its updated CISA malware analysis report, the agency revealed that malware can remain dormant for long periods on compromised Ivanti Connect Secure devices, activating only when attackers attempt remote access.

This dormant behavior increases the risk level because organizations may believe their systems are clean while the threat remains quietly embedded in the network.

The updated findings build on the original March 2025 report but introduce deeper technical insights into how RESURGE malware leverages advanced encryption, forged certificates, and Secure Shell (SSH) tunnels to maintain covert command-and-control communication.

RESURGE Malware Uses Stealth and Dormancy to Evade Detection

According to the updated analysis, malware is designed to exploit the Ivanti Connect Secure vulnerability CVE-2025-0282 and establish persistence through network-level evasion techniques.

Unlike traditional malware that triggers alerts through continuous activity, this network evasion malware remains inactive until a remote actor connects to the compromised device. This tactic allows it to bypass routine monitoring tools that rely heavily on behavioral detection.

report-ad-banner

CISA noted that the malware modifies files, manipulates integrity checks, and deploys web shells directly to the Ivanti boot disk—methods that make removal more complex and detection less straightforward.

“As America’s cyber defense agency, the Cybersecurity and Infrastructure Security Agency remains fully committed to safeguarding the nation’s critical infrastructure, even during the ongoing multi week shutdown of the Department of Homeland Security,” said CISA Acting Director Dr. Madhu Gottumukkala.

“The vulnerabilities detailed in this updated Malware Analysis Report pose real risks to people, property, and essential systems. Given the ease with which these vulnerabilities can be exploited through sophisticated network-level evasion, we determined it was imperative to provide network defenders with enhanced insights to respond faster to the RESURGE malware.”

The emphasis on critical infrastructure highlights why RESURGE malware is not just another vulnerability exploitation case—it represents a persistent access tool that attackers can reuse over time.

Advanced Encryption and Fake TLS Certificates Strengthen RESURGE Malware

One of the most concerning aspects of the updated malware analysis is its use of advanced cryptographic techniques and forged Transport Layer Security (TLS) certificates.

CISA revealed that the malware uses Elliptical Curve Cryptography (ECC) alongside fake TLS certificates not simply for encryption but for authentication—allowing attackers to verify they are communicating with an infected device rather than a legitimate server.

This approach makes the SSH command and control malware far more difficult to detect using traditional inspection tools.

The report also identified TLS fingerprinting and CRC32 hashing mechanisms that help the malware distinguish between benign and malicious traffic. These layered techniques show a clear shift toward stealth-first malware design.

“By expanding on the technical details in the original Malware Analysis Report (MAR) on RESURGE, we are equipping network defenders with a deeper, more complete understanding of this malware—along with the tools they need to identify, mitigate, and respond effectively,” said Nick Andersen, CISA Executive Assistant Director for Cybersecurity. “

Our updated analysis shows that RESURGE can remain dormant and undetected on Ivanti Connect Secure devices, meaning the threat is very much active.”

Why the Update Matters for Enterprise Security

The updated RESURGE malware report reflects a broader trend in modern cyber threats: attackers are prioritizing persistence over immediate impact. Instead of launching noisy attacks, threat actors are embedding long-term access mechanisms into network infrastructure.

CISA’s findings also reinforce the importance of proactive patching and threat hunting, especially for organizations running remote access appliances like Ivanti Connect Secure.

Another key takeaway is that relying solely on automated scanning tools is no longer enough. Dormant malware, by design, avoids detection until it is too late.

CISA has urged organizations to apply mitigation guidance tied to CVE-2025-0282 and use updated indicators of compromise to detect potential infections.


文章来源: https://thecyberexpress.com/resurge-malware-remains-active/
如有侵权请联系:admin#unsafe.sh