Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Alerts on RESURGE Malware Threat to Ivanti Devices

CISA Alerts on RESURGE Malware Threat to Ivanti Devices

Posted on March 2, 2026 By CWS

A newly identified malware, known as RESURGE, is actively exploiting a significant zero-day vulnerability in Ivanti Connect Secure devices. This discovery has led the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to issue a critical alert. The malware is designed to persist through system reboots, steal sensitive credentials, and maintain its presence well after the initial breach.

Details of the Vulnerability and Attack Method

The primary vulnerability being exploited is CVE-2025-0282, a stack-based buffer overflow affecting Ivanti Connect Secure, Policy Secure, and ZTA Gateways. This type of vulnerability occurs when an attacker sends excessive data to a memory buffer, causing memory corruption and allowing the execution of arbitrary code on the target system. The vulnerability was officially recognized by CISA and added to its Known Exploited Vulnerabilities Catalog on January 8, 2025, following reports of its active exploitation in December 2024.

Ivanti Connect Secure and related products are widely used as secure remote access gateways by enterprises and government agencies, making them attractive targets for attackers.

Comprehensive Analysis of the Malware

CISA’s analysis revealed RESURGE after examining compromised Ivanti Connect Secure devices within a critical infrastructure organization. Alongside RESURGE, two other malicious tools were identified: a log-tampering variant of SPAWNSLOTH and a custom binary named “dsmain”. These tools work in tandem to facilitate unauthorized access, erase intrusion evidence, and modify the system’s core to ensure persistent access.

RESURGE is an evolution of the SPAWNCHIMERA malware, extending its capabilities by introducing additional commands. CISA described RESURGE as a multi-functional tool, acting as a rootkit, dropper, backdoor, bootkit, proxy, and tunneler.

Impact and Mitigation Strategies

The potential impact of RESURGE is extensive due to Ivanti Connect Secure’s role as a VPN gateway for numerous organizations. Successful exploitation can lead to unauthorized access to enterprise networks, allowing attackers to harvest credentials, create unauthorized accounts, and escalate privileges undetected.

RESURGE maintains its foothold by embedding itself into critical system files, such as “ld.so.preload”, ensuring it loads before most processes on the device. This strategic positioning grants it control over the system from startup, evading standard detection tools. Additionally, RESURGE establishes a web shell for remote command execution and manipulates coreboot images, embedding malicious code that survives software reinstalls.

CISA recommends organizations conduct a factory reset as the most reliable method to eliminate the malware. For cloud and virtual systems, a verified clean image should be used. Resetting all account credentials, particularly those managing Kerberos authentication, is crucial. Access for affected devices should be temporarily revoked, access policies reviewed, and administrative accounts closely monitored for unusual activity. Any suspicious incidents should be reported to CISA’s 24/7 Operations Center via [email protected] or (888) 282-0870.

Stay updated with the latest security news by following us on Google News, LinkedIn, and X. Set CSN as a preferred source for real-time updates.

Cyber Security News Tags:Bootkit, CISA, credential theft, Cybersecurity, infrastructure security, Ivanti, malware persistence, RESURGE malware, Rootkit, SPAWNCHIMERA, SPAWNSLOTH, U.S. Cybersecurity, VPN security, zero-day vulnerability

Post navigation

Previous Post: Nick Andersen Steps Up as Acting CISA Director
Next Post: Shield Your SaaS from Bot Threats with SafeLine WAF

Related Posts

Windows 11 24H2 Security Update Causes SSD/HDD Failures and Potential Data Corruption Windows 11 24H2 Security Update Causes SSD/HDD Failures and Potential Data Corruption Cyber Security News
Critical Citrix 0-Day Vulnerability Exploited Since May, Leaving Global Entities Exposed Critical Citrix 0-Day Vulnerability Exploited Since May, Leaving Global Entities Exposed Cyber Security News
Louis Vuitton Hacked – Attackers Stolen Customers Personal Data Louis Vuitton Hacked – Attackers Stolen Customers Personal Data Cyber Security News
Windows Remote Access Connection Manager 0-Day Vulnerability Exploited in Attacks Windows Remote Access Connection Manager 0-Day Vulnerability Exploited in Attacks Cyber Security News
China-Nexus APT Group Leverages DLL Sideloading Technique to Attack Government and Media Sectors China-Nexus APT Group Leverages DLL Sideloading Technique to Attack Government and Media Sectors Cyber Security News
A Container Based Red Teaming Toolkit for AI Security Testing A Container Based Red Teaming Toolkit for AI Security Testing Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chrome’s AI Assistant Vulnerability Patched to Prevent Risks
  • OCRFix Botnet Trojan Uses Blockchain for Stealth Operations
  • OpenClaw Flaw Could Allow AI Takeover via Malicious Sites
  • Critical SD-WAN Vulnerability and AI Threats Emerge
  • Widespread SonicWall Firewall Attacks Exploiting Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Chrome’s AI Assistant Vulnerability Patched to Prevent Risks
  • OCRFix Botnet Trojan Uses Blockchain for Stealth Operations
  • OpenClaw Flaw Could Allow AI Takeover via Malicious Sites
  • Critical SD-WAN Vulnerability and AI Threats Emerge
  • Widespread SonicWall Firewall Attacks Exploiting Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News