Executive Summary
In early 2025, the Cybersecurity and Infrastructure Security Agency (CISA) identified a sophisticated malware variant named RESURGE, which exploited the critical vulnerability CVE-2025-0282 in Ivanti Connect Secure appliances. This vulnerability allowed unauthenticated remote code execution, enabling attackers to deploy RESURGE to establish persistent access, create web shells, harvest credentials, and escalate privileges. The malware's advanced evasion techniques, including network-level stealth and boot-level persistence, posed significant challenges for detection and remediation.
The emergence of RESURGE underscores a growing trend of advanced persistent threats targeting critical infrastructure through zero-day vulnerabilities. Organizations must prioritize timely patching, implement robust monitoring systems, and adopt a zero-trust security model to mitigate such sophisticated attacks.
Why This Matters Now
The RESURGE malware's ability to remain dormant and undetected on Ivanti devices highlights the urgent need for organizations to reassess their security postures, emphasizing proactive threat hunting and comprehensive vulnerability management to prevent potential breaches.
Attack Path Analysis
The adversary exploited a critical vulnerability in Ivanti Connect Secure devices to gain unauthorized access. They then deployed the RESURGE malware, which created web shells and manipulated system files to escalate privileges. Utilizing the compromised device, the attacker moved laterally within the network, establishing SSH tunnels for command-and-control communication. The malware's encryption mechanisms facilitated covert data exfiltration. Ultimately, the attacker maintained persistent access, potentially leading to significant operational disruption.
Kill Chain Progression
Initial Compromise
Description
The attacker exploited CVE-2025-0282, a stack-based buffer overflow vulnerability in Ivanti Connect Secure devices, to gain unauthorized remote access.
Related CVEs
CVE-2025-0282
CVSS 9A stack-based buffer overflow in Ivanti Connect Secure, Policy Secure, and ZTA Gateways allows a remote unauthenticated attacker to achieve remote code execution.
Affected Products:
Ivanti Connect Secure – < 22.7R2.5
Ivanti Policy Secure – < 22.7R1.2
Ivanti Neurons for ZTA Gateways – < 22.7R2.3
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
Techniques identified for SEO/filtering; may be expanded with full STIX/TAXII enrichment later.
Exploit Public-Facing Application
System Firmware
DLL Search Order Hijacking
Web Protocols
File Deletion
Match Legitimate Name or Location
Port Knocking
Credential API Hooking
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Ensure all system components and software are protected from known vulnerabilities
Control ID: 6.2
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Article 5
CISA ZTMM 2.0 – Asset Management
Control ID: 3.1
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Government Administration
CISA-documented RESURGE malware targeting Ivanti VPN devices poses critical APT risks to government infrastructure requiring immediate dormant implant detection and remediation.
Financial Services
Advanced persistent threat exploiting CVE-2025-0282 compromises secure remote access infrastructure, enabling credential theft and privilege escalation threatening financial data protection compliance.
Health Care / Life Sciences
Dormant malware on VPN appliances bypasses network monitoring, creating persistent backdoors that violate HIPAA encryption requirements and enable patient data exfiltration.
Defense/Space
Chinese-linked UNC5221 threat actor's sophisticated network evasion capabilities and boot-level persistence mechanisms pose severe national security risks to defense communications infrastructure.
Sources
- CISA warns that RESURGE malware can be dormant on Ivanti deviceshttps://www.bleepingcomputer.com/news/security/cisa-warns-that-resurge-malware-can-be-dormant-on-ivanti-devices/Verified
- CISA Releases Malware Analysis Report on RESURGE Malware Associated with Ivanti Connect Securehttps://www.cisa.gov/news-events/alerts/2025/03/28/cisa-releases-malware-analysis-report-resurge-malware-associated-ivanti-connect-secureVerified
- Ivanti Releases Security Updates for Connect Secure, Policy Secure, and ZTA Gatewayshttps://www.cisa.gov/news-events/alerts/2025/01/08/ivanti-releases-security-updates-connect-secure-policy-secure-and-zta-gatewaysVerified
- CISA Mitigation Instructions for CVE-2025-0282https://www.cisa.gov/cisa-mitigation-instructions-cve-2025-0282Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it could have constrained the attacker's lateral movement and data exfiltration, thereby reducing the overall impact.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: The attacker's initial access may have been limited, reducing the potential for further exploitation.
Control: Zero Trust Segmentation
Mitigation: The attacker's ability to escalate privileges could have been constrained, limiting their control over the compromised system.
Control: East-West Traffic Security
Mitigation: The attacker's lateral movement within the network may have been limited, reducing the spread of the attack.
Control: Multicloud Visibility & Control
Mitigation: The attacker's covert communication channels could have been constrained, limiting their ability to control compromised systems.
Control: Egress Security & Policy Enforcement
Mitigation: The attacker's data exfiltration efforts may have been limited, reducing the loss of sensitive information.
The attacker's ability to cause operational disruption and data loss may have been constrained, reducing the overall impact.
Impact at a Glance
Affected Business Functions
- Remote Access Services
- Network Security Operations
Estimated downtime: 7 days
Estimated loss: $500,000
Potential exposure of sensitive corporate data and user credentials.
Recommended Actions
Key Takeaways & Next Steps
- • Implement Zero Trust Segmentation to restrict lateral movement and limit the attacker's ability to traverse the network.
- • Deploy East-West Traffic Security controls to monitor and control internal traffic, detecting unauthorized communications.
- • Utilize Multicloud Visibility & Control solutions to gain comprehensive insights into network activities and identify anomalies.
- • Enforce Egress Security & Policy Enforcement to prevent unauthorized data exfiltration and block malicious outbound traffic.
- • Regularly update and patch systems to address known vulnerabilities, reducing the risk of exploitation.



