Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

ConnectWise Discloses Suspected State-Sponsored Hack

Posted on May 30, 2025May 30, 2025 By CWS

IT administration software program supplier ConnectWise has warned prospects {that a} suspected state-sponsored menace actor had breached its community.

“ConnectWise just lately realized of suspicious exercise inside our surroundings that we consider was tied to a complicated nation state actor, which affected a really small variety of ScreenConnect prospects,” the corporate stated in a scarce advisory.

The Florida-based firm says it has notified all impacted prospects and that it’s investigating the incident along with Mandiant. Legislation enforcement has been notified as effectively.

“As a part of our work with Mandiant, we carried out enhanced monitoring and hardening measures throughout our surroundings. We’ve not noticed any additional suspicious exercise in any buyer cases,” the corporate stated.

“We’re carefully monitoring the state of affairs and can share further data as we’re in a position,” it added.

In keeping with posts on Reddit, the intrusion possible occurred in November 2024 and ConnectWise has since recognized and addressed the underlying vulnerability.

The safety defect seems to be CVE-2025-3935, a high-severity vulnerability that uncovered ScreenConnect variations 25.2.3 and earlier to ViewState code injection assaults, permitting distant attackers to execute arbitrary code on the server.

Profitable exploitation of the bug requires that an attacker obtains machine keys that shield ViewState, for which they’d first require privileged system degree entry.Commercial. Scroll to proceed studying.

ConnectWise introduced patches for the flaw on April 24, when it revealed that it had realized of the difficulty from Microsoft, which noticed in-the-wild “misuse of publicly accessible ASP.NET machine keys to inject malicious code and deploy a post-exploitation framework” in December 2024.

“Microsoft discovered that publicly accessible keys had been being utilized to carry out malicious actions on servers usually,” ConnectWise stated, declaring that any product using ASP.NET framework ViewStates was possible affected.

SecurityWeek has contacted ConnectWise for extra data on the incident and can replace this text if a response is acquired.

ConnectWise ScreenConnect, a preferred self-hosted distant desktop utility that gives asset administration, distant work, and technical help capabilities, is understood to have been focused within the wild earlier than, to compromise enterprise networks for information theft and ransomware deployment.

Associated: Corporations Warned of Commvault Vulnerability Exploitation

Associated: Printer Firm Procolored Served Contaminated Software program for Months

Associated:Trump Cash Used as Lure in Malware Marketing campaign

Security Week News Tags:ConnectWise, Discloses, Hack, StateSponsored, Suspected

Post navigation

Previous Post: A Healthcare CISO’s Journey to Enabling Modern Care
Next Post: MITRE Publishes Post-Quantum Cryptography Migration Roadmap

Related Posts

Dozens of SysAid Instances Vulnerable to Remote Hacking Security Week News
Orca Snaps Up Opus in Cloud Security Automation Push Security Week News
Russian APT Hits Ukrainian Government With New Malware via Signal Security Week News
Myanmar Military Shuts Down Major Cybercrime Center and Detains Over 2,000 People Security Week News
Cisco Patches Critical Vulnerabilities in Contact Center Appliance Security Week News
Threat Actor Infests Hotels With New RAT Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Fortifies Chrome Agentic AI Against Indirect Prompt Injection Attacks
  • Malicious Document Reader App in Google Play With 50K Downloads Installs Anatsa Malware
  • New GhostFrame Super Stealthy Phishing Kit Attacks Millions of Users Worldwide
  • QuasarRAT Core Functionalities Along with Encrypted Configuration and Obfuscation Techniques Exposed
  • CISO Conversations: Keith McCammon, CSO and Co-founder at Red Canary

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Fortifies Chrome Agentic AI Against Indirect Prompt Injection Attacks
  • Malicious Document Reader App in Google Play With 50K Downloads Installs Anatsa Malware
  • New GhostFrame Super Stealthy Phishing Kit Attacks Millions of Users Worldwide
  • QuasarRAT Core Functionalities Along with Encrypted Configuration and Obfuscation Techniques Exposed
  • CISO Conversations: Keith McCammon, CSO and Co-founder at Red Canary

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark