CISA Alerts on RESURGE Malware Exploiting Zero-Day Vulnerability in Ivanti Connect Secure Devices
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert regarding a sophisticated malware variant named RESURGE, which is actively targeting Ivanti Connect Secure devices. This malware exploits a severe zero-day vulnerability, CVE-2025-0282, to infiltrate systems, maintain persistent access, and exfiltrate sensitive data.
Understanding CVE-2025-0282
CVE-2025-0282 is a stack-based buffer overflow vulnerability affecting Ivanti Connect Secure, Policy Secure, and ZTA Gateways. In such vulnerabilities, attackers send excessive data to a memory buffer, causing overflow into adjacent memory spaces. This overflow can be manipulated to execute arbitrary code on the affected device, granting unauthorized control to the attacker. CISA added this vulnerability to its Known Exploited Vulnerabilities Catalog on January 8, 2025, following reports of active exploitation since December 2024.
The RESURGE Malware: A Comprehensive Threat
RESURGE is a multifaceted malware that functions as a rootkit, dropper, backdoor, bootkit, proxy, and tunneler. Its primary objectives include establishing persistent access, evading detection, and facilitating further malicious activities. CISA’s analysis identified RESURGE after examining files from a compromised Ivanti Connect Secure device within a critical infrastructure organization. Alongside RESURGE, two other malicious components were discovered:
1. SPAWNSLOTH Variant: A log-tampering tool designed to erase evidence of intrusion from device logs, complicating forensic investigations.
2. Custom Binary dsmain: A binary that utilizes BusyBox utilities to decrypt and repackage coreboot images, enabling attackers to modify the device’s boot process for sustained control.
These components collectively form a robust attack toolkit, allowing attackers to gain entry, conceal their presence, and maintain control over compromised devices.
Mechanisms of Persistence and Concealment
RESURGE employs several sophisticated techniques to ensure persistence and evade detection:
– Early-Stage Loading: The malware inserts itself into the ld.so.preload file, ensuring it loads at startup before most other processes. This grants it control over the system from the moment the device powers on, making it difficult to detect and remove.
– Web Shell Deployment: RESURGE sets up a web shell—a lightweight script that provides a remote command interface—directly on the Ivanti running boot disk. This allows attackers to execute commands remotely without triggering standard security alerts.
– Coreboot Image Modification: By altering the coreboot image, which is responsible for initializing the hardware during the boot process, RESURGE embeds its code at a fundamental level. This modification ensures the malware’s survival through system reboots and software reinstalls.
– Traffic Filtering: RESURGE uses forged TLS certificates and a CRC32 fingerprint hashing scheme to differentiate between regular traffic and attacker commands. Ordinary traffic is forwarded to the legitimate Ivanti web server, while only attacker-controlled connections activate the malware’s functions, keeping its operations covert during normal use.
Implications for Organizations
Ivanti Connect Secure devices serve as VPN gateways for numerous organizations, including enterprises and government agencies. A successful compromise of these devices can expose entire networks to unauthorized access, data exfiltration, and further exploitation. Once RESURGE is established, attackers can harvest credentials, create unauthorized user accounts, reset passwords, and escalate privileges—all while evading detection mechanisms.
Recommended Mitigation Strategies
CISA strongly advises organizations utilizing Ivanti Connect Secure devices to take immediate action to mitigate this threat:
1. Apply Security Patches: Ensure that all devices are updated with the latest security patches provided by Ivanti to address CVE-2025-0282.
2. Conduct Comprehensive System Scans: Utilize advanced security tools to perform thorough scans of systems to detect and remove any presence of RESURGE or related malware components.
3. Monitor Network Traffic: Implement continuous monitoring of network traffic for unusual patterns or unauthorized access attempts that may indicate compromise.
4. Review and Harden Configurations: Assess device configurations to ensure they adhere to security best practices, minimizing potential attack vectors.
5. Educate and Train Personnel: Provide cybersecurity awareness training to staff to recognize phishing attempts and other common attack methods used to gain initial access.
Conclusion
The emergence of RESURGE underscores the evolving sophistication of cyber threats targeting critical infrastructure. Organizations must remain vigilant, promptly apply security updates, and implement robust monitoring and response strategies to protect against such advanced persistent threats.