Ivanti Zero-Days Exploited to Drop MDifyLoader and Launch In-Memory Cobalt Strike Attacks

Threat Score
72%
4 articles 100.0% Similarity 15 hours ago

Activity Timeline

Threat Actors Exploit Ivanti Connect Secure Flaws ...
GB Hackers
Jul 18
11:00
Ivanti Bugs Exploited Even After Three Months of P...
The Cyber Express
Jul 18
11:40
Threat Actors Exploiting Ivanti Connect Secure Vul...
Cybersecurity News
Jul 18
13:22
Ivanti Zero-Days Exploited to Drop MDifyLoader and...
The Hacker News
Primary Article
Jul 18
18:13
Cybersecurity researchers have disclosed details of a new malware calledMDifyLoaderthat has been observed in conjunction with cyber attacks exploiting security flaws in Ivanti Connect Secure (ICS) appliances. According to a report published by JPCERT/CC today, the threat actors behind the exploitation ofCVE-2025-0282andCVE-2025-22457in intrusions observed between December 2024 and July 2025 have weaponized the vulnerabilities to drop MDifyLoader, which is then used to launch Cobalt Strike in memory. CVE-2025-0282 is a critical security flaw in ICS that could permit unauthenticated remote code execution. It was addressed by Ivanti in early January 2025. CVE-2025-22457, patched in April 2025, concerns a stack-based buffer overflow that could be exploited to execute arbitrary code. While both vulnerabilities have been weaponized in the wild as zero-days, findings from JPCERT/CC in April have revealed that the first of the two issues had been abused to deliver malware families likeSPAWNCHI...

Cluster AI

Beta Organization

Save to Folder

Choose a folder to save this cluster: