Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Alerts on RESURGE Malware Threat to Ivanti Devices

CISA Alerts on RESURGE Malware Threat to Ivanti Devices

Posted on March 2, 2026 By CWS

A newly identified malware, known as RESURGE, is actively exploiting a significant zero-day vulnerability in Ivanti Connect Secure devices. This discovery has led the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to issue a critical alert. The malware is designed to persist through system reboots, steal sensitive credentials, and maintain its presence well after the initial breach.

Details of the Vulnerability and Attack Method

The primary vulnerability being exploited is CVE-2025-0282, a stack-based buffer overflow affecting Ivanti Connect Secure, Policy Secure, and ZTA Gateways. This type of vulnerability occurs when an attacker sends excessive data to a memory buffer, causing memory corruption and allowing the execution of arbitrary code on the target system. The vulnerability was officially recognized by CISA and added to its Known Exploited Vulnerabilities Catalog on January 8, 2025, following reports of its active exploitation in December 2024.

Ivanti Connect Secure and related products are widely used as secure remote access gateways by enterprises and government agencies, making them attractive targets for attackers.

Comprehensive Analysis of the Malware

CISA’s analysis revealed RESURGE after examining compromised Ivanti Connect Secure devices within a critical infrastructure organization. Alongside RESURGE, two other malicious tools were identified: a log-tampering variant of SPAWNSLOTH and a custom binary named “dsmain”. These tools work in tandem to facilitate unauthorized access, erase intrusion evidence, and modify the system’s core to ensure persistent access.

RESURGE is an evolution of the SPAWNCHIMERA malware, extending its capabilities by introducing additional commands. CISA described RESURGE as a multi-functional tool, acting as a rootkit, dropper, backdoor, bootkit, proxy, and tunneler.

Impact and Mitigation Strategies

The potential impact of RESURGE is extensive due to Ivanti Connect Secure’s role as a VPN gateway for numerous organizations. Successful exploitation can lead to unauthorized access to enterprise networks, allowing attackers to harvest credentials, create unauthorized accounts, and escalate privileges undetected.

RESURGE maintains its foothold by embedding itself into critical system files, such as “ld.so.preload”, ensuring it loads before most processes on the device. This strategic positioning grants it control over the system from startup, evading standard detection tools. Additionally, RESURGE establishes a web shell for remote command execution and manipulates coreboot images, embedding malicious code that survives software reinstalls.

CISA recommends organizations conduct a factory reset as the most reliable method to eliminate the malware. For cloud and virtual systems, a verified clean image should be used. Resetting all account credentials, particularly those managing Kerberos authentication, is crucial. Access for affected devices should be temporarily revoked, access policies reviewed, and administrative accounts closely monitored for unusual activity. Any suspicious incidents should be reported to CISA’s 24/7 Operations Center via [email protected] or (888) 282-0870.

Stay updated with the latest security news by following us on Google News, LinkedIn, and X. Set CSN as a preferred source for real-time updates.

Cyber Security News Tags:Bootkit, CISA, credential theft, Cybersecurity, infrastructure security, Ivanti, malware persistence, RESURGE malware, Rootkit, SPAWNCHIMERA, SPAWNSLOTH, U.S. Cybersecurity, VPN security, zero-day vulnerability

Post navigation

Previous Post: Nick Andersen Steps Up as Acting CISA Director
Next Post: Shield Your SaaS from Bot Threats with SafeLine WAF

Related Posts

Cloudflare Unveils MCP Server Portals to Secure AI Revolution Cloudflare Unveils MCP Server Portals to Secure AI Revolution Cyber Security News
Hackers Hijacked 18 Very Popular npm Packages With 2 Billion Weekly Downloads Hackers Hijacked 18 Very Popular npm Packages With 2 Billion Weekly Downloads Cyber Security News
RMM Tools: Vital for IT but Increasingly Misused by Hackers RMM Tools: Vital for IT but Increasingly Misused by Hackers Cyber Security News
SIM Swapping Attacks on the Rise SIM Swapping Attacks on the Rise Cyber Security News
Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware Cyber Security News
Microsoft Urges Action on Critical Windows Updates Microsoft Urges Action on Critical Windows Updates Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vercel Data Breach Linked to Context AI Compromise
  • Flowise Vulnerability Exposes Millions to Remote Code Risks
  • Vercel Data Breach: Security Measures and Investigation
  • OpenAI Launches Expanded Cyber Defense with GPT-5.4-Cyber
  • AI-Powered Exploit Reveals Chrome Vulnerability Risks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vercel Data Breach Linked to Context AI Compromise
  • Flowise Vulnerability Exposes Millions to Remote Code Risks
  • Vercel Data Breach: Security Measures and Investigation
  • OpenAI Launches Expanded Cyber Defense with GPT-5.4-Cyber
  • AI-Powered Exploit Reveals Chrome Vulnerability Risks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark