Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Alerts on RESURGE Malware Threat to Ivanti Devices

CISA Alerts on RESURGE Malware Threat to Ivanti Devices

Posted on March 2, 2026 By CWS

A newly identified malware, known as RESURGE, is actively exploiting a significant zero-day vulnerability in Ivanti Connect Secure devices. This discovery has led the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to issue a critical alert. The malware is designed to persist through system reboots, steal sensitive credentials, and maintain its presence well after the initial breach.

Details of the Vulnerability and Attack Method

The primary vulnerability being exploited is CVE-2025-0282, a stack-based buffer overflow affecting Ivanti Connect Secure, Policy Secure, and ZTA Gateways. This type of vulnerability occurs when an attacker sends excessive data to a memory buffer, causing memory corruption and allowing the execution of arbitrary code on the target system. The vulnerability was officially recognized by CISA and added to its Known Exploited Vulnerabilities Catalog on January 8, 2025, following reports of its active exploitation in December 2024.

Ivanti Connect Secure and related products are widely used as secure remote access gateways by enterprises and government agencies, making them attractive targets for attackers.

Comprehensive Analysis of the Malware

CISA’s analysis revealed RESURGE after examining compromised Ivanti Connect Secure devices within a critical infrastructure organization. Alongside RESURGE, two other malicious tools were identified: a log-tampering variant of SPAWNSLOTH and a custom binary named “dsmain”. These tools work in tandem to facilitate unauthorized access, erase intrusion evidence, and modify the system’s core to ensure persistent access.

RESURGE is an evolution of the SPAWNCHIMERA malware, extending its capabilities by introducing additional commands. CISA described RESURGE as a multi-functional tool, acting as a rootkit, dropper, backdoor, bootkit, proxy, and tunneler.

Impact and Mitigation Strategies

The potential impact of RESURGE is extensive due to Ivanti Connect Secure’s role as a VPN gateway for numerous organizations. Successful exploitation can lead to unauthorized access to enterprise networks, allowing attackers to harvest credentials, create unauthorized accounts, and escalate privileges undetected.

RESURGE maintains its foothold by embedding itself into critical system files, such as “ld.so.preload”, ensuring it loads before most processes on the device. This strategic positioning grants it control over the system from startup, evading standard detection tools. Additionally, RESURGE establishes a web shell for remote command execution and manipulates coreboot images, embedding malicious code that survives software reinstalls.

CISA recommends organizations conduct a factory reset as the most reliable method to eliminate the malware. For cloud and virtual systems, a verified clean image should be used. Resetting all account credentials, particularly those managing Kerberos authentication, is crucial. Access for affected devices should be temporarily revoked, access policies reviewed, and administrative accounts closely monitored for unusual activity. Any suspicious incidents should be reported to CISA’s 24/7 Operations Center via [email protected] or (888) 282-0870.

Stay updated with the latest security news by following us on Google News, LinkedIn, and X. Set CSN as a preferred source for real-time updates.

Cyber Security News Tags:Bootkit, CISA, credential theft, Cybersecurity, infrastructure security, Ivanti, malware persistence, RESURGE malware, Rootkit, SPAWNCHIMERA, SPAWNSLOTH, U.S. Cybersecurity, VPN security, zero-day vulnerability

Post navigation

Previous Post: Nick Andersen Steps Up as Acting CISA Director
Next Post: Shield Your SaaS from Bot Threats with SafeLine WAF

Related Posts

Threat Actors Using Typosquatted PyPI Packages to Steal Cryptocurrency from Bittensor Wallets Threat Actors Using Typosquatted PyPI Packages to Steal Cryptocurrency from Bittensor Wallets Cyber Security News
Hackers Breaking Internet with 7.3 Tbps and 4.8 Billion Packets Per Second DDoS Attack Hackers Breaking Internet with 7.3 Tbps and 4.8 Billion Packets Per Second DDoS Attack Cyber Security News
Windows Cloud Files Mini Filter Driver Vulnerability Exploited to Escalate Privileges Windows Cloud Files Mini Filter Driver Vulnerability Exploited to Escalate Privileges Cyber Security News
Windows 11 24H2 Update Hides the Password Icon in the Sign-in Options on the Lock Screen Windows 11 24H2 Update Hides the Password Icon in the Sign-in Options on the Lock Screen Cyber Security News
Telnyx SDK on PyPI Compromised by Hackers Telnyx SDK on PyPI Compromised by Hackers Cyber Security News
Hackers Exploit RTL/LTR Scripts and Browser Gaps to Hide Malicious URLs Hackers Exploit RTL/LTR Scripts and Browser Gaps to Hide Malicious URLs Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vercel Data Breach: Security Measures and Investigation
  • OpenAI Launches Expanded Cyber Defense with GPT-5.4-Cyber
  • AI-Powered Exploit Reveals Chrome Vulnerability Risks
  • Apple Aims to Fix iPhone Bug Removing Czech Character
  • Emerging Nexcorium Botnet Exploits DVR Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vercel Data Breach: Security Measures and Investigation
  • OpenAI Launches Expanded Cyber Defense with GPT-5.4-Cyber
  • AI-Powered Exploit Reveals Chrome Vulnerability Risks
  • Apple Aims to Fix iPhone Bug Removing Czech Character
  • Emerging Nexcorium Botnet Exploits DVR Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark