China-Linked Hackers Exploit Ivanti Flaws: A Comedy of Errors in Cybersecurity
China-linked APT UNC5221 wasted no time exploiting Ivanti EPMM flaws, targeting critical sectors globally. With a dash of espionage and a pinch of cyber-mischief, they exploited vulnerabilities to access sensitive data. Ivanti released patches faster than you can say “unauthenticated remote code execution.” Users, update now!

Hot Take:
Looks like China’s UNC5221 group is playing a high-stakes game of “Capture the Flag,” but with less fun and more global cyber espionage. They’ve turned Ivanti EPMM vulnerabilities into their own personal buffet, gobbling up data from critical sectors worldwide. Maybe they thought “EPMM” stood for “Every Piece of My Metadata” because they sure are collecting it all!
Key Points:
- China-linked APT group UNC5221 exploits Ivanti EPMM flaws CVE-2025-4427 and CVE-2025-4428.
- The vulnerabilities allow unauthenticated remote code execution and access to protected resources.
- Targets include critical sectors in Europe, North America, and Asia-Pacific.
- Attackers use KrustyLoader malware and standard Linux tools for stealthy, long-term access.
- Stolen data includes PII, credentials, and Office 365 tokens, enabling further espionage activities.
Already a member? Log in here