Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

CISA reports flaw in Adobe AEM with perfect 10.0 score – already under active attack

Discover Spotify working on ‘SongDNA’ feature to introduce you to the people behind your favorite music

Apple adds 650 megawatts of renewable energy in Europe, also deploys renewable energy in China

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » CISA warns two malware strains that utilize Ivanti EPMM CVE-2025-4427 and CVE-2025-4428
Identity

CISA warns two malware strains that utilize Ivanti EPMM CVE-2025-4427 and CVE-2025-4428

userBy userSeptember 19, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

September 19, 2025Ravi LakshmananData Breaches/Vulnerabilities

The US Cybersecurity and Infrastructure Security Agency (CISA) released details on two malware discovered in the network of unknown organizations following the exploitation of security flaws in Ivanti Endpoint Manager Mobile (EPMM).

“Each set includes loaders for malicious listeners that allow cyberthreat actors to execute arbitrary code on compromised servers,” CISA said in a warning.

Vulnerabilities exploited in the attack include CVE-2025-4427 and CVE-2025-4428. Both were abused as zero-day before being addressed by Ivanti in May 2025.

DFIR Retainer Service

CVE-2025-4427 is about authentication bypassing that allows attackers to access protected resources, while CVE-2025-4428 allows remote code execution. As a result, two flaws can be chained together to execute arbitrary code on vulnerable devices without authentication.

According to the CISA, the threat actor combed two vulnerabilities around May 15, 2025, and accessed a server running EPMM following the publication of a proof of concept (POC) exploit.

This allowed the attacker to collect system information, download malicious files, and execute commands that allowed him to run lists of root directories, maps of the network, and scripts to create Heapdump.

Further analysis determined that the cyberthreat actor had dropped two sets of malicious files into the “/TMP” directory, each enabling persistence by injecting and running arbitrary code into the compromised server.

Set 1 -web -install.jar (aka loader 1), Reflectutil.class, and securityhandlerwanlistener.class set 2 -web -install.jar (aka loader 2) and webandroidappinstaller.class

Specifically, both sets contain loaders that invoke malicious Java class listeners that intercept specific HTTP requests and handle them to decode and decode the payload for subsequent execution.

“Reflectutil.class manipulates Java objects to inject and manage malicious listener SecurityHandlerWanListener into Apache Tomcat,” says Cisa. “[SecurityHandlerWanListener.class] A malicious listener that intercepts specific HTTP requests, processes them, and handles them to decode and decode payloads that dynamically create and execute new classes. ”

On the other hand, WeBandroidAppInstaller.class works differently by using hardcoded keys to retrieve and decrypt password parameters from requests. Its contents are used to define and implement new classes. The execution of the new class then results in a response being encrypted using the same hardcoded key and generated with the encrypted output.

CIS Build Kit

The end result is that an attacker can inject and execute arbitrary code into the server, removing data by intercepting and processing HTTP requests, as well as enabling subsequent activity and persistence.

To remain protected against these attacks, organizations recommend updating instances to the latest version, monitoring for signs of suspicious activity, and implementing the necessary restrictions to prevent unauthorized access to mobile device management (MDM) systems.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleOpenai’s research on AI models is intentionally lying
Next Article Clean Harbors is a safe proof of commercial PFA incineration operations
user
  • Website

Related Posts

CISA reports flaw in Adobe AEM with perfect 10.0 score – already under active attack

October 16, 2025

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

October 15, 2025

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

October 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

CISA reports flaw in Adobe AEM with perfect 10.0 score – already under active attack

Discover Spotify working on ‘SongDNA’ feature to introduce you to the people behind your favorite music

Apple adds 650 megawatts of renewable energy in Europe, also deploys renewable energy in China

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.