Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Alerts on RESURGE Malware Threat to Ivanti Devices

CISA Alerts on RESURGE Malware Threat to Ivanti Devices

Posted on March 2, 2026 By CWS

A newly identified malware, known as RESURGE, is actively exploiting a significant zero-day vulnerability in Ivanti Connect Secure devices. This discovery has led the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to issue a critical alert. The malware is designed to persist through system reboots, steal sensitive credentials, and maintain its presence well after the initial breach.

Details of the Vulnerability and Attack Method

The primary vulnerability being exploited is CVE-2025-0282, a stack-based buffer overflow affecting Ivanti Connect Secure, Policy Secure, and ZTA Gateways. This type of vulnerability occurs when an attacker sends excessive data to a memory buffer, causing memory corruption and allowing the execution of arbitrary code on the target system. The vulnerability was officially recognized by CISA and added to its Known Exploited Vulnerabilities Catalog on January 8, 2025, following reports of its active exploitation in December 2024.

Ivanti Connect Secure and related products are widely used as secure remote access gateways by enterprises and government agencies, making them attractive targets for attackers.

Comprehensive Analysis of the Malware

CISA’s analysis revealed RESURGE after examining compromised Ivanti Connect Secure devices within a critical infrastructure organization. Alongside RESURGE, two other malicious tools were identified: a log-tampering variant of SPAWNSLOTH and a custom binary named “dsmain”. These tools work in tandem to facilitate unauthorized access, erase intrusion evidence, and modify the system’s core to ensure persistent access.

RESURGE is an evolution of the SPAWNCHIMERA malware, extending its capabilities by introducing additional commands. CISA described RESURGE as a multi-functional tool, acting as a rootkit, dropper, backdoor, bootkit, proxy, and tunneler.

Impact and Mitigation Strategies

The potential impact of RESURGE is extensive due to Ivanti Connect Secure’s role as a VPN gateway for numerous organizations. Successful exploitation can lead to unauthorized access to enterprise networks, allowing attackers to harvest credentials, create unauthorized accounts, and escalate privileges undetected.

RESURGE maintains its foothold by embedding itself into critical system files, such as “ld.so.preload”, ensuring it loads before most processes on the device. This strategic positioning grants it control over the system from startup, evading standard detection tools. Additionally, RESURGE establishes a web shell for remote command execution and manipulates coreboot images, embedding malicious code that survives software reinstalls.

CISA recommends organizations conduct a factory reset as the most reliable method to eliminate the malware. For cloud and virtual systems, a verified clean image should be used. Resetting all account credentials, particularly those managing Kerberos authentication, is crucial. Access for affected devices should be temporarily revoked, access policies reviewed, and administrative accounts closely monitored for unusual activity. Any suspicious incidents should be reported to CISA’s 24/7 Operations Center via [email protected] or (888) 282-0870.

Stay updated with the latest security news by following us on Google News, LinkedIn, and X. Set CSN as a preferred source for real-time updates.

Cyber Security News Tags:Bootkit, CISA, credential theft, Cybersecurity, infrastructure security, Ivanti, malware persistence, RESURGE malware, Rootkit, SPAWNCHIMERA, SPAWNSLOTH, U.S. Cybersecurity, VPN security, zero-day vulnerability

Post navigation

Previous Post: Nick Andersen Steps Up as Acting CISA Director
Next Post: Shield Your SaaS from Bot Threats with SafeLine WAF

Related Posts

28,000 Microsoft Exchange Servers Vulnerable to CVE-2025-53786 Exposed Online 28,000 Microsoft Exchange Servers Vulnerable to CVE-2025-53786 Exposed Online Cyber Security News
Authorities Arrested 17 Criminal Bankers, EUR 4.5 Million Seized Authorities Arrested 17 Criminal Bankers, EUR 4.5 Million Seized Cyber Security News
PoC Exploit Tool Released for FortiWeb WAF Vulnerability Exploited in the Wild PoC Exploit Tool Released for FortiWeb WAF Vulnerability Exploited in the Wild Cyber Security News
World’s Largest Hacking Forum BreachForums Creator Sentenced to Three Years in Prison World’s Largest Hacking Forum BreachForums Creator Sentenced to Three Years in Prison Cyber Security News
Hundreds of Exposed Clawdbot Gateways Leave API Keys and Private Chats Vulnerable Hundreds of Exposed Clawdbot Gateways Leave API Keys and Private Chats Vulnerable Cyber Security News
Sturnus Banking Malware Steals Communications from Signal and WhatsApp, Gaining Full Control of The Device Sturnus Banking Malware Steals Communications from Signal and WhatsApp, Gaining Full Control of The Device Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical SD-WAN Vulnerability and AI Threats Emerge
  • Widespread SonicWall Firewall Attacks Exploiting Vulnerabilities
  • Madison Square Garden Confirms Major Data Breach
  • Shield Your SaaS from Bot Threats with SafeLine WAF
  • CISA Alerts on RESURGE Malware Threat to Ivanti Devices

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical SD-WAN Vulnerability and AI Threats Emerge
  • Widespread SonicWall Firewall Attacks Exploiting Vulnerabilities
  • Madison Square Garden Confirms Major Data Breach
  • Shield Your SaaS from Bot Threats with SafeLine WAF
  • CISA Alerts on RESURGE Malware Threat to Ivanti Devices

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News