Original Article Text

Click to Toggle View

CISA emergency directive: Mitigate Ivanti zero-days immediately. CISA issued this year's first emergency directive ordering Federal Civilian Executive Branch (FCEB) agencies to immediately mitigate two Ivanti Connect Secure and Ivanti Policy Secure zero-day flaws in response to widespread and active exploitation by multiple threat actors. This is an expected development, given that vulnerable Ivanti appliances are now targeted in extensive attacks chaining the CVE-2023-46805 authentication bypass and the CVE-2024-21887 command injection vulnerabilities since December, and the vendor has yet to release security patches. "CISA has determined these conditions pose an unacceptable risk to Federal Civilian Executive Branch (FCEB) agencies and require emergency action," the cybersecurity agency said on Friday. "This determination is based on widespread exploitation of vulnerabilities by multiple threat actors, the prevalence of the affected products in the federal enterprise, the high potential for a compromise of agency information systems, the impact of a successful compromise, and the complexity of the proposed mitigations." ED 24-01 required actions As instructed by emergency directive ED 24-01, federal agencies now must promptly implement Ivanti's publicly disclosed mitigation measures to block attack attempts. The agencies are also required to use Ivanti's External Integrity Checker Tool and: To fully restore impacted appliances and bring them back into service, they have to follow Ivanti's recovery instructions and then: Threat monitoring service Shadowserver currently tracks more than 16,200 ICS VPN appliances exposed online, over 4,700 in the United States (Shodan also sees almost 17,000 Internet-exposed Ivanti ICS devices). Shadowserver is also monitoring the number of compromised Ivanti Connect Secure VPN instances worldwide, with more than 600 devices already hacked on January 16. Actively exploited to drop crypto-miners, malware Threat intelligence company Volexity says that one of the attackers (a suspected Chinese state-backed threat actor tracked as UTA0178 and UNC5221) has already backdoored over 2,100 Ivanti appliances using a GIFTEDVISITOR webshell variant. Mandiant found five custom malware strains deployed on breached customers' systems with the end goal of stealing credentials, deploying webshells, and additional malicious payloads. The threat actor has been harvesting and stealing account and session data and more info from compromised networks. Victims discovered so far include government and military departments worldwide, national telecommunications companies, defense contractors, technology companies, banking, finance, and accounting organizations, worldwide consulting outfits, and aerospace, aviation, and engineering firms. They vary greatly in size and range from small businesses to some of the largest organizations worldwide, including multiple Fortune 500 companies from various industry sectors. Attackers have also been seen by Volexity and GreyNoise deploying XMRig cryptocurrency miners and Rust-based malware payloads still waiting for analysis.

Daily Brief Summary

CYBERCRIME // CISA Directs Immediate Action Against Ivanti Zero-Day Threats

CISA has issued an emergency directive due to active exploitation of two critical Ivanti zero-day vulnerabilities, namely CVE-2023-46805 and CVE-2024-21887.

Federal Civilian Executive Branch agencies are ordered to swiftly implement Ivanti's mitigation measures to thwart ongoing attacks.

Ivanti has not released patches for these vulnerabilities, prompting CISA to classify the situation as posing an "unacceptable risk."

The Shadowserver service is tracking over 16,200 Internet-exposed Ivanti ICS VPN appliances globally, with more than 600 confirmed compromises.

Volexity reports that a Chinese state-backed threat actor has backdoored over 2,100 Ivanti appliances, deploying malware including cryptocurrency miners.

The ongoing cyber attacks have affected a diverse range of organizations, from small businesses to Fortune 500 companies across various industry sectors, including government and military.