Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

ConnectWise Discloses Suspected State-Sponsored Hack

Posted on May 30, 2025May 30, 2025 By CWS

IT administration software program supplier ConnectWise has warned prospects {that a} suspected state-sponsored menace actor had breached its community.

“ConnectWise just lately realized of suspicious exercise inside our surroundings that we consider was tied to a complicated nation state actor, which affected a really small variety of ScreenConnect prospects,” the corporate stated in a scarce advisory.

The Florida-based firm says it has notified all impacted prospects and that it’s investigating the incident along with Mandiant. Legislation enforcement has been notified as effectively.

“As a part of our work with Mandiant, we carried out enhanced monitoring and hardening measures throughout our surroundings. We’ve not noticed any additional suspicious exercise in any buyer cases,” the corporate stated.

“We’re carefully monitoring the state of affairs and can share further data as we’re in a position,” it added.

In keeping with posts on Reddit, the intrusion possible occurred in November 2024 and ConnectWise has since recognized and addressed the underlying vulnerability.

The safety defect seems to be CVE-2025-3935, a high-severity vulnerability that uncovered ScreenConnect variations 25.2.3 and earlier to ViewState code injection assaults, permitting distant attackers to execute arbitrary code on the server.

Profitable exploitation of the bug requires that an attacker obtains machine keys that shield ViewState, for which they’d first require privileged system degree entry.Commercial. Scroll to proceed studying.

ConnectWise introduced patches for the flaw on April 24, when it revealed that it had realized of the difficulty from Microsoft, which noticed in-the-wild “misuse of publicly accessible ASP.NET machine keys to inject malicious code and deploy a post-exploitation framework” in December 2024.

“Microsoft discovered that publicly accessible keys had been being utilized to carry out malicious actions on servers usually,” ConnectWise stated, declaring that any product using ASP.NET framework ViewStates was possible affected.

SecurityWeek has contacted ConnectWise for extra data on the incident and can replace this text if a response is acquired.

ConnectWise ScreenConnect, a preferred self-hosted distant desktop utility that gives asset administration, distant work, and technical help capabilities, is understood to have been focused within the wild earlier than, to compromise enterprise networks for information theft and ransomware deployment.

Associated: Corporations Warned of Commvault Vulnerability Exploitation

Associated: Printer Firm Procolored Served Contaminated Software program for Months

Associated:Trump Cash Used as Lure in Malware Marketing campaign

Security Week News Tags:ConnectWise, Discloses, Hack, StateSponsored, Suspected

Post navigation

Previous Post: A Healthcare CISO’s Journey to Enabling Modern Care
Next Post: MITRE Publishes Post-Quantum Cryptography Migration Roadmap

Related Posts

RondoDox Botnet Takes ‘Exploit Shotgun’ Approach Security Week News
F5 to Acquire CalypsoAI for $180 Million Security Week News
Dozens of SysAid Instances Vulnerable to Remote Hacking Security Week News
Google Ships Android ‘Advanced Protection’ Mode to Thwart Surveillance Spyware Security Week News
Geordie Emerges From Stealth With $6.5M for AI Agent Security Platform Security Week News
North Korean Hackers Targeted Hundreds in Fake Job Interview Attacks Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars
  • Vidar Stealer Bypassing Browser Security Via Direct Memory Injection to Steal Login Credentials
  • Threat Actors With Stealer Malwares Processing Millions of Credentials a Day
  • New Rust-Based ChaosBot Malware Leverages Discord for Stealthy Command and Control
  • Salt Typhoon Using Zero-Day Exploits and DLL Sideloading Techniques to Attack Organizations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars
  • Vidar Stealer Bypassing Browser Security Via Direct Memory Injection to Steal Login Credentials
  • Threat Actors With Stealer Malwares Processing Millions of Credentials a Day
  • New Rust-Based ChaosBot Malware Leverages Discord for Stealthy Command and Control
  • Salt Typhoon Using Zero-Day Exploits and DLL Sideloading Techniques to Attack Organizations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News