China-Linked Hackers Exploit Ivanti VPN Zero-Day
Nominet, a major country code registry, recently experienced a network breach. The intrusion exploited a previously unknown vulnerability inย Ivanti Connect Secure, aย VPNย product fromย Ivanti.
Nominet, which operates the .UK domain registry, announced the breach in a statement saying it had no evidence of data theft. The company added that its domain registration and management systems continue to operate normally.
Now, security researchers believe theyโve found the source of theย Ivanti Connect Secureย attacks, which have targeted a variety of organizations since at least mid-December: state-sponsored hacking groups based in China.
The attackers used theย Ivanti Connect Secureย exploit to drop a previously unreported malware family, tracked asย Dryhook, in compromised environments. This was after the attackers usedย Ivanti Connect Secureย to drop a web shell, allowing them to remotely control the affected appliances, according to Mandiant.
Theย Ivanti Connect Secureย attack chain began with the exploitation of theย Ivanti Connect Secureย zero-day, according to Mandiant, which the firm says is confirmed by several independent sources. The zero-day, tracked asย CVE-2025-0282, allows an attacker to remotely execute code on aย Ivanti Connect Secureย appliance without authentication, effectively giving them full control.
Following the initial exploitation ofย CVE-2025-0282, attackers leveraged a previously unreported web shell to deploy a new family of malware,ย Dryhook, to compromisedย Ivanti Connect Secureย instances.ย Dryhookย is a modular malware with a wide range of capabilities, including credential theft, lateral movement, privilege escalation, and further backdoor deployment.ย
Dryhookย has been observed in conjunction with several different toolsets, indicating that multiple groups are leveragingย Ivanti Connect Secureย to gain access to victim environments.
Theย Dryhookย backdoor is capable of communicating with command-and-control (C2) infrastructure in multiple ways, including through theย Torย anonymizing network, to avoid detection.ย
Dryhookย has been observed in the wild since early January 2025 and has been used to target organizations across a variety of sectors, including technology, government, finance, and manufacturing.
In addition toย Dryhook, attackers also leveraged the malware familiesย Phasejamย andย Spawnย in attacks againstย Ivanti Connect Secureย customers.ย Spawn, a malware family previously reported by FireEye (prior to its acquisition by Mandiant) in connection with the China-based group UNC5337, has been used by UNC5337 to target victims in the technology, finance, and other sectors. Meanwhile,ย Phasejamย โ which shares similarities withย Spawnย โ has been used by a second China-based group, UNC5221, to target the same victim environments as UNC5337.ย
Spawnย andย Phasejamย have both been observed since early January and are likely still active in some compromised environments. Theย Ivanti Connect Secureย series of attacks are the latest in a long line of attempts by China-based hackers to compromise VPNs. In April 2024, for example, a previously unreported zero-day vulnerability inย Pulse Secureโs VPN servers โ whichย Ivantiย now owns โ was exploited by a Chinese espionage group to target U.S. government organizations, as well as organizations in Europe and the Middle East.
Federal agencies in the U.S. had to scramble to apply patches toย Pulse Secureย devices to prevent compromise, and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned that the hackers had likely backdoored thousands ofย Pulse Secureย appliances.
Spawnย was used by a group tracked as UNC5337 in the past, and now Mandiant believes that UNC5337 โ or at least a group operating under the UNC5337 name โ might be to blame for theย Ivanti Connect Secureย compromises. Theย Spawnย malware was first observed in the wild in mid-December 2024, Mandiant says, after UNC5337 exploited theย Ivanti Connect Secureย vulnerabilities.
Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more
User forum
0 messages