Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

ConnectWise Hit by Cyberattack; Nation-State Actor Suspected in Targeted Breach

Posted on May 30, 2025May 30, 2025 By CWS

Could 30, 2025Ravie LakshmananVulnerability / Information Breach
ConnectWise, the developer of distant entry and assist software program ScreenConnect, has disclosed that it was the sufferer of a cyber assault that it mentioned was probably perpetrated by a nation-state menace actor.
“ConnectWise not too long ago discovered of suspicious exercise inside our surroundings that we consider was tied to a classy nation-state actor, which affected a really small variety of ScreenConnect prospects,” the corporate mentioned in a short advisory on Could 28, 2025.
The corporate mentioned it has engaged the companies of Google Mandiant to conduct a forensic probe into the incident and that it has notified all affected prospects. The incident was first reported by CRN.
Nonetheless, it didn’t reveal the precise variety of prospects who had been impacted by the hack, when it occurred, or the id of the menace actor behind it.
It is value noting that the corporate, in late April 2025, patched CVE-2025-3935 (CVSS rating: 8.1), a high-severity vulnerability in ScreenConnect variations 25.2.3 and earlier that may very well be exploited for ViewState code injection assaults utilizing publicly disclosed ASP.NET machine keys – a way Microsoft disclosed earlier this February.

The problem was addressed in ScreenConnect model 25.2.4. That mentioned, it is at the moment not identified if the cyber assault is linked to the exploitation of the vulnerability.
ConnectWise mentioned it has applied enhanced monitoring and hardening measures throughout its surroundings to forestall such assaults from taking place once more sooner or later.
“Now we have not noticed any additional suspicious exercise in any buyer situations,” it added, stating it is intently monitoring the state of affairs.
In early 2024, safety flaws in ConnectWise ScreenConnect software program (CVE-2024-1708 and CVE-2024-1709) had been exploited by each cybercrime and nation-state menace actors, together with these from China, North Korea, and Russia, to ship quite a lot of malicious payloads.

Discovered this text fascinating? Comply with us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Actor, Breach, ConnectWise, Cyberattack, Hit, NationState, Suspected, Targeted

Post navigation

Previous Post: Actionable Threat Intelligence for Mitigating Emerging Cyber Threats
Next Post: Securing Multi-Cloud Infrastructures in 2025 Enterprise Deployments

Related Posts

Wormable AirPlay Flaws Enable Zero-Click RCE on Apple Devices via Public Wi-Fi The Hacker News
A 24-Hour Timeline of a Modern Stealer Campaign The Hacker News
BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan The Hacker News
Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails The Hacker News
GitLab Duo Vulnerability Enabled Attackers to Hijack AI Responses with Hidden Prompts The Hacker News
Why CTEM is the Winning Bet for CISOs in 2025 The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News