RESURGE malware has been enhanced with self-insertion and the capability to establish web shells.
Ivanti Connect Secure instances which remain vulnerable to a recent bug are being subjected to attacks spreading the RESURGE malware.
The stack-based buffer overflow bug, tracked as CVE-2025-0282, has been patched, but according to CISA, RESURGE has been enhanced with self-insertion, integrity check manipulation, and file modification features - as well as the capability to establish web shells facilitating account creation, credential theft, password resets, and privilege escalation.
According to
The Hacker News, further analysis of a compromised ICS device - belonging to a critical infrastructure organisation - revealed that RESURGE contains a SPAWNSLOTH malware variant that has enabled Ivanti device log tampering.
Written by
Dan Raywood is a B2B journalist with 25 years of experience, including covering cybersecurity for the past 17 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.
He has spoken at events including 44CON, Infosecurity Europe, RANT Forum, BSides Scotland, Steelcon and the National Cyber Security Show, and served as editor of SC Media UK, Infosecurity Magazine and IT Security Guru. He was also an analyst with 451 Research and a product marketing lead at Tenable.