Cybersecurity Comedy: Ivanti’s Zero-Day Drama Unpatched!
CISA has reported malware attacks on Ivanti Endpoint Manager Mobile, exploiting two vulnerabilities. These flaws, CVE-2025-4427 and CVE-2025-4428, allow authentication bypass and code injection. Despite Ivanti’s fixes, threat actors, possibly linked to China, have been exploiting these vulnerabilities. CISA advises immediate patching and treating MDM systems as high-value assets.

Hot Take:
Ivanti, I hardly knew ye! Looks like our friends over at Ivanti Endpoint Manager Mobile (EPMM) were hosting a malware fiesta, and everyone was invited – as long as they were exploiting zero-day vulnerabilities. The real kicker? The Malware Olympics were well underway before Ivanti could even blow the whistle. Time to patch those vulnerabilities ASAP, because nobody likes uninvited guests – especially when they come with malicious intentions and a penchant for espionage.
Key Points:
– Two critical vulnerabilities in Ivanti EPMM (CVE-2025-4427 and CVE-2025-4428) were exploited as zero-days.
– A China-nexus espionage group was reportedly leveraging these vulnerabilities.
– CISA analyzed malware used in these attacks, focusing on technical details and malware delivery methods.
– Threat actors used HTTP GET requests to deliver malware in segmented, Base64-encoded chunks.
– CISA recommends patching affected systems and treating mobile device management (MDM) systems as high-value assets.