🚨 New Ivanti 0-Day Vulnerabilities Disclosed – Act Now to Protect Your Systems 🚨 Ivanti has disclosed two critical vulnerabilities affecting Connect Secure, Policy Secure, and Neurons for ZTA products: 🔍 CVE-2025-0282 Critical Remote Code Execution (RCE) Exploited in the wild by Chinese state-sponsored group UNC5337. Targets Connect Secure versions 22.7R2 to 22.7R2.4. 🔍 CVE-2025-0283 Privilege Escalation Vulnerability There is no evidence of exploitation so far. 💡 What You Need to Know: CVE-2025-0282 has a CVSS score of 9/10 and has been actively used for cyber espionage. Attackers are leveraging advanced malware like PHASEJAM and SPAWNANT to achieve persistence. Patches are now available in version 22.7R2.5. Ivanti also recommends running its updated External ICT checking tool to identify potential compromises. 🛡 Our Recommendations: 1️⃣ Run the latest ICT checker to identify suspicious files. 2️⃣ Upgrade to the patched version after thorough investigations. 3️⃣ Use Indicators of Compromise (IoCs) from tools like our Datalake and engage in proactive threat hunting through Orange Cyberdefense Managed Detection services. 👉Check out our blog post for a detailed look at our initial findings🕵️: https://ow.ly/pQL250UCOCT 👨⚕️🩹For assistance or remediation expertise, contact Orange Cyberdefense CERT or your representative. Stay vigilant! #Cybersecurity #Ivanti #VulnerabilityManagement #OrangeCyberdefense #ThreatIntelligence #CTI
Orange Cyberdefense’s Post
More Relevant Posts
-
🛡️ IOC (Indicators of Compromise) Checklist for Malware Analysis When analyzing malware, tracking the right IOCs is critical for early detection & response. Here’s a handy checklist: 🔹 File-Based IOCs Hash values (MD5/SHA1/SHA256) Malicious file names & file paths Suspicious DLLs or dropped files 🔹 Network IOCs Malicious IP addresses & domains C2 (Command & Control) servers Unusual ports or protocol usage Beaconing traffic patterns 🔹 System IOCs Registry key modifications Scheduled tasks / services created Unauthorized user accounts Persistence mechanisms 🔹 Behavioral IOCs Unusual process execution flow Injection into legitimate processes File encryption / ransomware activity Abnormal outbound traffic spikes ✅ Collecting, validating, and sharing these IOCs helps build stronger detection rules and improves threat intelligence across the security community. #CyberSecurity #MalwareAnalysis #IOC #ThreatIntelligence #SOCAnalyst
To view or add a comment, sign in
-
-
🛰 𝗡𝗺𝗮𝗽 𝗦𝗰𝗮𝗻 𝗧𝘆𝗽𝗲𝘀 & 𝗙𝗹𝗮𝗴𝘀 — 𝗔 𝗤𝘂𝗶𝗰𝗸 𝗥𝗲𝗳𝗲𝗿𝗲𝗻𝗰𝗲 𝗳𝗼𝗿 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗣𝗿𝗼𝘀 🔍 When it comes to network reconnaissance, understanding different Nmap scan options is crucial for penetration testers, blue teams, and network defenders alike. Here’s a breakdown of some of the most used scan types 👇 💥 -sS (TCP SYN) → Default for root users — fast and stealthy 🔐 -ST (TCP connect) → Standard 3-way handshake, for non-privileged users 🧪 -sF / -sN / -sX (FIN, Null, Xmas) → Special flag manipulations to detect firewalls and filtering 🌐 -sP / -sA / -sW (Ping, ACK, Window) → Advanced sweeps and port filtering detection techniques Each flag sequence reveals valuable info about open, closed, or filtered ports, helping you build a clear picture of the target network. ⚠️ Important: These techniques are powerful — use them responsibly and only on networks you’re authorized to scan. 👉 Which scan type do you rely on the most in your assessments? 🔔 Follow Cyber Talks for more cybersecurity tips! #Nmap #CyberSecurity #PenTesting #EthicalHacking #NetworkSecurity #BlueTeam #RedTeam #InfoSec #Reconnaissance #CyberPress
To view or add a comment, sign in
-
-
🚨 Cybersecurity Alert: Chinese APT Phantom Taurus Attacks Organizations with NETSTAR Malware 🔒 In the cybersecurity threat landscape, an advanced persistent threat (APT) group of Chinese origin, known as Phantom Taurus (also referred to as Mustang Panda), has intensified its operations targeting key organizations. This campaign, detected since July 2023, uses a .NET-based malware loader called NETSTAR to infiltrate sensitive networks, primarily in the telecommunications, IT, and other critical industries in the Asia-Pacific and Middle East regions. 📡 Technical Details of the Threat NETSTAR acts as an initial component that downloads and executes additional payloads, allowing attackers to establish persistent control. Infection vectors include spear-phishing emails with malicious attachments disguised as legitimate documents, such as LNK or ISO files that evade traditional detections. 🔍 Key Malware Features - 🛡️ Advanced Obfuscation: NETSTAR employs .NET obfuscation techniques to hide its code and resist static analysis, using libraries like ConfuserEx. - 📤 Payload Downloads: Once executed, it connects to command and control (C2) servers to retrieve secondary modules, including backdoors and data collection tools. - 🎯 Specific Targets: Victims include telecommunications providers in countries like India, Pakistan, and Thailand, with possible extensions to the Middle East, focusing on industrial and governmental espionage. - ⚡ Persistence: It implements methods such as scheduled tasks and registry modifications to remain active on compromised Windows systems. This threat highlights the evolution of state-sponsored APTs in using .NET frameworks for malware, complicating detection in corporate environments. Organizations in critical sectors must prioritize security updates, anti-phishing training, and monitoring for unusual network traffic. For more information visit: https://enigmasecurity.cl #Cybersecurity #Malware #APT #PhantomTaurus #NETSTAR #CyberThreats #Telecommunications #DigitalEspionage Connect with me on LinkedIn to discuss defense strategies: https://lnkd.in/eFb3bY4C 📅 Wed, 01 Oct 2025 12:21:11 +0000 🔗Subscribe to the Membership: https://lnkd.in/eh_rNRyt
To view or add a comment, sign in
-
-
🔐 Cybersecurity Fact of the Day Did you know that SSLBL is a community project that tracks and shares malicious SSL certificates and JA3/JA3S fingerprints used by threat actors? (abuse.ch, 2023) Developed by abuse.ch, the SSL Blacklist (SSLBL) helps defenders detect and block encrypted command and control (C2) traffic associated with malware families such as Dridex, TrickBot, and Emotet. By analysing SSL/TLS handshake data, it identifies malicious activity even when payloads are encrypted. 📊 Key benefits of SSLBL include: Real-time feeds of malicious SSL certificates and fingerprints Integration with IDS/IPS, firewalls, and SIEM platforms Detection of malicious encrypted communications Free and open access for researchers and security teams 💡 SSLBL strengthens network visibility in encrypted environments, helping organisations identify threats that hide behind legitimate TLS traffic. Have a great day, and stay secure! 🔐 #CyberSecurity #SSLBL #ThreatIntelligence #abusech #TLS #JA3 #NetworkSecurity #ThreatHunting #SOC
To view or add a comment, sign in
-
𝐄𝐧𝐜𝐫𝐲𝐩𝐭𝐢𝐨𝐧 𝐝𝐨𝐞𝐬𝐧’𝐭 𝐡𝐢𝐝𝐞 𝐭𝐡𝐫𝐞𝐚𝐭𝐬, 𝐢𝐭 𝐡𝐢𝐝𝐞𝐬 𝐭𝐡𝐞𝐦 𝐟𝐫𝐨𝐦 𝐲𝐨𝐮. Over 90% of modern attacks now use encrypted channels (HTTPS, TLS 1.3, QUIC) to bypass traditional monitoring. The scary part? With TLS 1.3 and Encrypted SNI (ESNI), even the domain name inside the handshake is encrypted — meaning your firewall, IDS, or proxy can’t even see where the traffic is going. This breaks most traditional security controls that depend on: SNI (Server Name Indication) inspection IP/domain reputation Deep Packet Inspection (DPI) SOL: That’s why modern defenders use SSL/TLS interception, JA3/JA3S fingerprinting, and flow-based anomaly detection. Instead of reading the traffic, they profile the encryption itself — analyzing patterns in TLS handshakes, cipher suites, and packet timing to spot malicious behavior even without decrypting the content. That’s next-level defense: Detecting the way malware encrypts, not what it says. #CyberSecurity #BlueTeam #ThreatDetection #NetworkSecurity #TLS #JA3 #IDS
To view or add a comment, sign in
-
China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks Telecommunications and manufacturing sectors in Central and South Asian countries have emerged as the target of an ongoing campaign distributing a new variant of a known malware called PlugX (aka Korplug or SOGU). "The new variant's features overlap with both the RainyDay and Turian backdoors, including abuse of the same legitimate applications for DLL side-loading, the XOR-RC4-RtlDecompressBuffer algorithm used to encrypt/decrypt payloads and the RC4 keys used," Cisco Talos researchers Joey Chen and Takahiro Takeda said in an analysis published this week. The cybersecurity company noted that the configuration associated with the PlugX variant diverges significantly from the usual PlugX configuration format, instead adopting the same structure used in RainyDay, a backdoor associated with a China-linked threat actor known as Lotus Panda (aka Naikon APT). It's also likely tracked by Kaspersky as FoundCore and attributed to a Chinese-speaking threat group it calls Cycldek. https://lnkd.in/e5X4SQFN Stay Connected to Sidharth Sharma, CPA, CISA, CISM, CFE, CDPSE for content related to Cyber Security. #CyberSecurity #JPMC #Technology #InfoSec #DataProtection #DataPrivacy #ThreatIntelligence #CyberThreats #NetworkSecurity #CyberDefense #SecurityAwareness #ITSecurity #SecuritySolutions #CyberResilience #DigitalSecurity #SecurityBestPractices #CyberRisk #SecurityOperations
To view or add a comment, sign in
-
🚨 Cyber Attack? Don’t Panic—Respond Like a Pro. Every clinic, brand, and business needs a lean, audit-ready incident response plan. Here are the 5 essential steps to protect your data, reputation, and operations: 🔍 Identify – Spot the breach or suspicious activity fast 🛑 Contain – Isolate affected systems to stop the spread 🧹 Eradicate – Remove malware, unauthorized access, or vulnerabilities 🔁 Recover – Restore systems, data, and workflows securely 🧠 Review – Analyze what happened and strengthen your defenses 💡 Pro tip: Document every step. It’s not just smart—it’s compliance gold. CyberSecurity #IncidentResponse #ComplianceReady #ClinicProtection #VeriSe3ure #AuditProof #hipaa #DataDefense #ModularSecurity
To view or add a comment, sign in
-
277 Days to Detect a Breach: Why Speed Matters According to IBM’s latest study, it takes an average of 277 days to identify and contain a data breach. That’s over 9 months of undetected access — enough time for attackers to move laterally, steal data, and destroy trust. Why does this happen? Because traditional tools like antivirus and firewalls focus on blocking, not detecting. Modern threats — especially fileless malware and insider risks — require continuous visibility. That’s where Managed Detection & Response (MDR) steps in: ⚙️ It monitors your systems 24/7 ⚙️ Detects anomalies in real time ⚙️ Responds to incidents before damage spreads The difference between a 277-day breach and a 27-minute response often comes down to MDR. How fast could your organization detect an active threat today? #CyberSecurity #ThreatDetection #MDR #IncidentResponse
To view or add a comment, sign in
-
Your employees are being tricked into stealing their own files - and they don't even know it. A sophisticated threat group has evolved beyond phishing. Their new malware, LOSTKEYS, hides behind fake CAPTCHA pages that trick users into running malicious PowerShell commands - silently exfiltrating sensitive documents and system data from policy, NGO, and defense-adjacent targets. This isn't spray-and-pray. It's surgical espionage. The group is adapting to stronger email defenses by shifting to browser-based lures and direct file theft - bypassing traditional security controls entirely. Even private firms in defense or policy ecosystems are proxy targets. One compromised researcher, supplier, or consultant can expose entire intelligence networks. What to do now: Tighten browser security controls Restrict PowerShell execution for non-admin users Train staff to question any site asking them to run commands Cyber espionage isn't just a government problem anymore - it's an ecosystem risk. Is your team prepared to spot these evolving tactics? #CyberSecurity #InfoSec #CISO #CyberAwareness #RiskManagement #DataProtection
To view or add a comment, sign in
-
Complacency turns businesses into fossils, and in today’s cyber jungle, outdated IT practices are the fastest path to extinction. Here’s how you can stay ahead: #aitc411 #DigitalEvolution #FutureProofIT • Review your security policies regularly to ensure they reflect current threats. • Update systems and software on schedule to close known vulnerabilities. • Train your team frequently so they can spot phishing and social engineering attempts. • Audit access controls to limit exposure to sensitive data. Stay sharp. Stay relevant. Stay secure. Message us to learn how to ramp up your defenses.
To view or add a comment, sign in
-