Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Warns of Two Malware Strains Exploiting Ivanti EPMM CVE-2025-4427 and CVE-2025-4428

Posted on September 19, 2025September 19, 2025 By CWS

Sep 19, 2025Ravie LakshmananData Breach / Vulnerability
The U.S. Cybersecurity and Infrastructure Safety Company (CISA) on Thursday launched particulars of two units of malware that have been found in an unnamed group’s community following the exploitation of safety flaws in Ivanti Endpoint Supervisor Cellular (EPMM).
“Every set comprises loaders for malicious listeners that allow cyber menace actors to run arbitrary code on the compromised server,” CISA stated in an alert.
The vulnerabilities that have been exploited within the assault embrace CVE-2025-4427 and CVE-2025-4428, each of which have been abused as zero-days previous to them being addressed by Ivanti in Could 2025.

Whereas CVE-2025-4427 considerations an authentication bypass that enables attackers to entry protected sources, CVE-2025-4428 permits distant code execution. Consequently, the 2 flaws might be chained to execute arbitrary code on a susceptible system with out authentication.
In keeping with CISA, the menace actors gained entry to server working EPMM by combing the 2 vulnerabilities round Could 15, 2025, following the publication of a proof-of-concept (PoC) exploit.
This permitted the attackers to run instructions that made it doable to gather system info, obtain malicious recordsdata, checklist the basis listing, map the community, execute scripts to create a heapdump, and dump Light-weight Listing Entry Protocol (LDAP) credentials, the company added.
Additional evaluation decided that the cyber menace actors dropped two units of malicious recordsdata to the “/tmp” listing, every of which enabled persistence by injecting and working arbitrary code on the compromised server:

Set 1 – web-install.jar (aka Loader 1), ReflectUtil.class, and SecurityHandlerWanListener.class
Set 2 – web-install.jar (aka Loader 2) and WebAndroidAppInstaller.class

Particularly, each units comprise a loader which launches a malicious compiled Java class listener that intercepts particular HTTP requests and processes them to decode and decrypt payloads for subsequent execution.
“ReflectUtil.class manipulates Java objects to inject and handle the malicious listener SecurityHandlerWanListener in Apache Tomcat,” CISA stated. “[SecurityHandlerWanListener.class] malicious listener that intercepts particular HTTP requests and processes them to decode and decrypt payloads, which dynamically create and execute a brand new class.”
WebAndroidAppInstaller.class, however, works in another way by retrieving and decrypting a password parameter from the request utilizing a hard-coded key, the contents of that are used to outline and implement a brand new class. The results of the execution of the brand new class is then encrypted utilizing the identical hard-coded key and generates a response with the encrypted output.

The tip result’s that it permits the attackers to inject and execute arbitrary code on the server, enabling follow-on exercise and persistence, in addition to exfiltrate knowledge by intercepting and processing HTTP requests.
To remain protected in opposition to these assaults, organizations are suggested to replace their cases to the newest model, monitor for indicators of suspicious exercise, and implement crucial restrictions to forestall unauthorized entry to cellular system administration (MDM) methods.

The Hacker News Tags:CISA, CVE20254427, CVE20254428, EPMM, Exploiting, Ivanti, Malware, Strains, Warns

Post navigation

Previous Post: SolarWinds Releases Advisory on Salesloft Drift Security Incident
Next Post: U.K. Arrests Two Teen Scattered Spider Hackers Linked to August 2024 TfL Cyber Attack

Related Posts

67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers The Hacker News
Chinese Hackers Deploy MarsSnake Backdoor in Multi-Year Attack on Saudi Organization The Hacker News
Critical Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI The Hacker News
Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps The Hacker News
iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More The Hacker News
Russian Hackers Using ClickFix Fake CAPTCHA to Deploy New LOSTKEYS Malware The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Phishing Attack Targets Facebook Users to Steal Login Credentials
  • Unpatched Vulnerabilities Expose Novakon HMIs to Remote Hacking
  • U.K. Arrests Two Teen Scattered Spider Hackers Linked to August 2024 TfL Cyber Attack
  • CISA Warns of Two Malware Strains Exploiting Ivanti EPMM CVE-2025-4427 and CVE-2025-4428
  • SolarWinds Releases Advisory on Salesloft Drift Security Incident

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Phishing Attack Targets Facebook Users to Steal Login Credentials
  • Unpatched Vulnerabilities Expose Novakon HMIs to Remote Hacking
  • U.K. Arrests Two Teen Scattered Spider Hackers Linked to August 2024 TfL Cyber Attack
  • CISA Warns of Two Malware Strains Exploiting Ivanti EPMM CVE-2025-4427 and CVE-2025-4428
  • SolarWinds Releases Advisory on Salesloft Drift Security Incident

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News