On April 3, 2025, Ivanti disclosed a critical vulnerability, CVE-2025-22457, affecting Ivanti Connect Secure (ICS) VPN appliances. This vulnerability, a stack based buffer overflow in versions 22.7R2.5 and earlier, enables remote code execution (RCE) and has been actively exploited in the wild.
The attackers leveraged a sophisticated exploitation chain to deploy custom malware families including TRAILBLAZE, BRUSHFIRE, and components of the known SPAWN malware ecosystem. Mandiant and Ivanti strongly urge immediate patching and use of detection tools.
2. Threat Actor: UNC5221
4. Shell Script Dropper
5. Malware Components Overview
Recommendations:
SOURCES:
Enjoyed reading this Threat Intelligence Advisory? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn.
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.
Keeping this cookie enabled helps us to improve our website.
Please enable Strictly Necessary Cookies first so that we can save your preferences!
This website uses the following additional cookies:
(List the cookies that you are using on the website here.)
More information about our Cookie Policy