Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ConnectWise Discloses Suspected State-Sponsored Hack

ConnectWise Discloses Suspected State-Sponsored Hack

Posted on May 30, 2025May 30, 2025 By CWS

IT administration software program supplier ConnectWise has warned prospects {that a} suspected state-sponsored menace actor had breached its community.

“ConnectWise just lately realized of suspicious exercise inside our surroundings that we consider was tied to a complicated nation state actor, which affected a really small variety of ScreenConnect prospects,” the corporate stated in a scarce advisory.

The Florida-based firm says it has notified all impacted prospects and that it’s investigating the incident along with Mandiant. Legislation enforcement has been notified as effectively.

“As a part of our work with Mandiant, we carried out enhanced monitoring and hardening measures throughout our surroundings. We’ve not noticed any additional suspicious exercise in any buyer cases,” the corporate stated.

“We’re carefully monitoring the state of affairs and can share further data as we’re in a position,” it added.

In keeping with posts on Reddit, the intrusion possible occurred in November 2024 and ConnectWise has since recognized and addressed the underlying vulnerability.

The safety defect seems to be CVE-2025-3935, a high-severity vulnerability that uncovered ScreenConnect variations 25.2.3 and earlier to ViewState code injection assaults, permitting distant attackers to execute arbitrary code on the server.

Profitable exploitation of the bug requires that an attacker obtains machine keys that shield ViewState, for which they’d first require privileged system degree entry.Commercial. Scroll to proceed studying.

ConnectWise introduced patches for the flaw on April 24, when it revealed that it had realized of the difficulty from Microsoft, which noticed in-the-wild “misuse of publicly accessible ASP.NET machine keys to inject malicious code and deploy a post-exploitation framework” in December 2024.

“Microsoft discovered that publicly accessible keys had been being utilized to carry out malicious actions on servers usually,” ConnectWise stated, declaring that any product using ASP.NET framework ViewStates was possible affected.

SecurityWeek has contacted ConnectWise for extra data on the incident and can replace this text if a response is acquired.

ConnectWise ScreenConnect, a preferred self-hosted distant desktop utility that gives asset administration, distant work, and technical help capabilities, is understood to have been focused within the wild earlier than, to compromise enterprise networks for information theft and ransomware deployment.

Associated: Corporations Warned of Commvault Vulnerability Exploitation

Associated: Printer Firm Procolored Served Contaminated Software program for Months

Associated:Trump Cash Used as Lure in Malware Marketing campaign

Security Week News Tags:ConnectWise, Discloses, Hack, StateSponsored, Suspected

Post navigation

Previous Post: A Healthcare CISO’s Journey to Enabling Modern Care
Next Post: MITRE Publishes Post-Quantum Cryptography Migration Roadmap

Related Posts

Russian Government Now Actively Managing Cybercrime Groups: Security Firm Russian Government Now Actively Managing Cybercrime Groups: Security Firm Security Week News
Who’s Really Behind the Mask? Combatting Identity Fraud Who’s Really Behind the Mask? Combatting Identity Fraud Security Week News
Android Malware Uses AI for Extended Device Control Android Malware Uses AI for Extended Device Control Security Week News
GitLab, Atlassian Patch High-Severity Vulnerabilities GitLab, Atlassian Patch High-Severity Vulnerabilities Security Week News
Chain IQ, UBS Data Stolen in Ransomware Attack Chain IQ, UBS Data Stolen in Ransomware Attack Security Week News
James Bishop Appointed Pentagon’s New Cybersecurity Chief James Bishop Appointed Pentagon’s New Cybersecurity Chief Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution
  • Unpatched BitLocker Flaws Expose Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution
  • Unpatched BitLocker Flaws Expose Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark