Malware Identified in Attacks Exploiting Ivanti Connect Secure Vulnerabilities
NetmanageIT OpenCTI - opencti.netmanageit.com

SUMMARY :
The article details malware and tactics used in attacks targeting Ivanti Connect Secure vulnerabilities from December 2024 to July 2025. It describes MDifyLoader, a loader based on libPeConv, which deploys Cobalt Strike Beacon through DLL side-loading. The attackers also utilized vshell, a multi-platform RAT, and Fscan, a network scanning tool. After gaining initial access, the threat actors performed lateral movement using brute-force attacks, exploited vulnerabilities, and used stolen credentials. They established persistence by creating domain accounts and registering malware as services or scheduled tasks. The attackers employed various evasion techniques, including the use of legitimate files and ETW bypasses.
OPENCTI LABELS :
cobalt strike,cobalt strike beacon,fscan,vshell,ivanti connect secure,mdifyloader
Open in NetmanageIT OpenCTI Public Instance with below link!
Use public read only username and password on login page.
NOTE : Use Public READ only user credentials on login page banner.
Malware Identified in Attacks Exploiting Ivanti Connect Secure Vulnerabilities