Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

ConnectWise Discloses Suspected State-Sponsored Hack

Posted on May 30, 2025May 30, 2025 By CWS

IT administration software program supplier ConnectWise has warned prospects {that a} suspected state-sponsored menace actor had breached its community.

“ConnectWise just lately realized of suspicious exercise inside our surroundings that we consider was tied to a complicated nation state actor, which affected a really small variety of ScreenConnect prospects,” the corporate stated in a scarce advisory.

The Florida-based firm says it has notified all impacted prospects and that it’s investigating the incident along with Mandiant. Legislation enforcement has been notified as effectively.

“As a part of our work with Mandiant, we carried out enhanced monitoring and hardening measures throughout our surroundings. We’ve not noticed any additional suspicious exercise in any buyer cases,” the corporate stated.

“We’re carefully monitoring the state of affairs and can share further data as we’re in a position,” it added.

In keeping with posts on Reddit, the intrusion possible occurred in November 2024 and ConnectWise has since recognized and addressed the underlying vulnerability.

The safety defect seems to be CVE-2025-3935, a high-severity vulnerability that uncovered ScreenConnect variations 25.2.3 and earlier to ViewState code injection assaults, permitting distant attackers to execute arbitrary code on the server.

Profitable exploitation of the bug requires that an attacker obtains machine keys that shield ViewState, for which they’d first require privileged system degree entry.Commercial. Scroll to proceed studying.

ConnectWise introduced patches for the flaw on April 24, when it revealed that it had realized of the difficulty from Microsoft, which noticed in-the-wild “misuse of publicly accessible ASP.NET machine keys to inject malicious code and deploy a post-exploitation framework” in December 2024.

“Microsoft discovered that publicly accessible keys had been being utilized to carry out malicious actions on servers usually,” ConnectWise stated, declaring that any product using ASP.NET framework ViewStates was possible affected.

SecurityWeek has contacted ConnectWise for extra data on the incident and can replace this text if a response is acquired.

ConnectWise ScreenConnect, a preferred self-hosted distant desktop utility that gives asset administration, distant work, and technical help capabilities, is understood to have been focused within the wild earlier than, to compromise enterprise networks for information theft and ransomware deployment.

Associated: Corporations Warned of Commvault Vulnerability Exploitation

Associated: Printer Firm Procolored Served Contaminated Software program for Months

Associated:Trump Cash Used as Lure in Malware Marketing campaign

Security Week News Tags:ConnectWise, Discloses, Hack, StateSponsored, Suspected

Post navigation

Previous Post: A Healthcare CISO’s Journey to Enabling Modern Care
Next Post: MITRE Publishes Post-Quantum Cryptography Migration Roadmap

Related Posts

Chipmaker Patch Tuesday: Intel, AMD, Arm Respond to New CPU Attacks Security Week News
Chinese Hackers Hit Drone Sector in Supply Chain Attacks Security Week News
Over 30 Vulnerabilities Patched in Android Security Week News
In Other News: Volkswagen App Hacked, DR32 Sentenced, New OT Security Solution Security Week News
CISA Releases Guidance on SIEM and SOAR Implementation Security Week News
Mikko Hypponen Leaves Anti-Malware Industry to Fight Against Drones Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News