Aggregator
SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk
Palo Alto, USA, 28th March 2025, CyberNewsWire
The post SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk appeared first on Security Boulevard.
CISA Releases Malware Analysis Report on RESURGE Malware Associated with Ivanti Connect Secure
CISA has published a Malware Analysis Report (MAR) with analysis and associated detection signatures on a new malware variant CISA has identified as RESURGE. RESURGE contains capabilities of the SPAWNCHIMERA[1] malware variant, including surviving reboots; however, RESURGE contains distinctive commands that alter its behavior. These commands:
- Create a web shell, manipulate integrity checks, and modify files.
- Enable the use of web shells for credential harvesting, account creation, password resets, and escalating permissions.
- Copy the web shell to the Ivanti running boot disk and manipulate the running coreboot image.
RESURGE is associated with the exploitation of CVE-2025-0282 in Ivanti Connect Secure appliances. CVE-2025-0282 is a stack-based buffer overflow vulnerability in Ivanti Connect Secure, Policy Secure, and ZTA Gateways. CISA added CVE-2025-0282 to its Known Exploited Vulnerabilities Catalog on January 8, 2025.
For more information on the abovementioned malware variants and YARA rules for detection, see: MAR-25993211.R1.V1.CLEAR.
For a downloadable copy of the SIGMA rule associated with this MAR, see: AR25-087A SIGMA YAML.
CISA urges users and administrators to implement the following actions in addition to the Mitigation Instructions for CVE-2025-0282:
- For the highest level of confidence, conduct a factory reset.
- For Cloud and Virtual systems, conduct a factory reset using an external known clean image of the device.
- See Ivanti’s Recommended Recovery Steps for more information, including how to conduct a factory reset.
- Reset credentials of privileged and non-privileged accounts.
- Reset passwords for all domain users and all local accounts, such as Guest, HelpAssistant, DefaultAccount, System, Administrator, and krbtgt. The krbtgt account is responsible for handling Kerberos ticket requests as well as encrypting and signing them. The krbtgt account should be reset twice because the account has a two-password history. The first account reset for the krbtgt needs to be allowed to replicate prior to the second reset to avoid any issues. See CISA’s Eviction Guidance for Networks Affected by the SolarWinds and Active Directory/M365 Compromise for more information. Although tailored to Federal Civilian Executive Branch (FCEB) agencies compromised in the 2020 SolarWinds Orion supply chain compromise, the steps are applicable to organizations with Windows AD compromise.
- Review access policies to temporarily revoke privileges/access for affected devices. If it is necessary to not alert the attacker (e.g., for intelligence purposes), then privileges can be reduced for affected accounts/devices to “contain” them.
- Reset the relevant account credentials or access keys if the investigation finds the threat actor’s access is limited to non-elevated permissions.
- Monitor related accounts, especially administrative accounts, for any further signs of unauthorized access.
Organizations should report incidents and anomalous activity related to information found in the malware analysis report to CISA’s 24/7 Operations Center at [email protected] or (888) 282-0870. Malware submissions can be made directly to Malware Nextgen at https://malware.cisa.gov.
See the following resources for more guidance:
Trump CISA Cuts Threaten US Election Integrity, Experts Warn
CoffeeLoader Uses GPU-Based Armoury Packer to Evade EDR and Antivirus Detection
Submit #521246: https://github.com/HDFGroup/hdf5 HDF5 1.14.6 NULL Pointer Dereference [Accepted]
Submit #521193: https://github.com/HDFGroup/hdf5 HDF5 1.14.6 Double Free [Accepted]
Submit #521170: https://github.com/HDFGroup/hdf5 HDF5 1.14.6 Heap-based Buffer Overflow [Accepted]
Submit #521151: https://github.com/HDFGroup/hdf5 HDF5 1.14.6 Heap-based Buffer Overflow [Accepted]
CVE-2025-2922 | Netis WF-2404 1.1.124EN BusyBox Shell cleartext storage
CVE-2025-2921 | Netis WF-2404 1.1.124EN /etc/passwd default password
CVE-2025-2920 | Netis WF-2404 1.1.124EN /еtc/passwd weak hash
CVE-2025-2919 | Netis WF-2404 1.1.124EN UART hardware allows activation of test or debug logic at runtime
大疆新发布的这款户外神器,治好了我的「充电焦虑」
这个 69 岁的「AI硬件」创业者,正被数百万年轻人追捧
Submit #521039: Netis WF-2404 Router Firmware Version: APR-R4A4-V1.1.124EN-Netis(WF-2404),2010.12.14 16:18. Inclusion of Undocumented Features or Chicken Bits [Accepted]
Submit #521038: Netis WF-2404 Router Firmware Version: APR-R4A4-V1.1.124EN-Netis(WF-2404),2010.12.14 16:18. Use of Weak Hash [Accepted]
Submit #521037: Netis WF-2404 Router Firmware Version: APR-R4A4-V1.1.124EN-Netis(WF-2404),2010.12.14 16:18. Use of Weak Hash [Accepted]
Submit #521036: Netis WF-2404 Firmware Version: APR-R4A4-V1.1.124EN-Netis(WF-2404),2010.12.14 16:18. Hardware Allows Activation of Test or Debug Logic at Runtime [Accepted]
Red Team Tactics Grow More Sophisticated with Advancements in Artificial Intelligence
A recent scoping review has revealed that red team tactics are becoming increasingly sophisticated as artificial intelligence (AI) technologies advance. The study, which analyzed 11 articles published between 2015 and 2023, identified a wide array of AI methods being employed in cyberattacks, including classification, regression, and clustering techniques. Among the most prominent AI methods utilized […]
The post Red Team Tactics Grow More Sophisticated with Advancements in Artificial Intelligence appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.