Patch Panic: China’s Cyber Mischief Strikes Ivanti Software!
Ivanti Endpoint Manager Mobile software was hit by a China-nexus cyber threat, exploiting vulnerabilities CVE-2025-4427 and CVE-2025-4428. With more twists than a pretzel, the attackers turned legitimate system components into espionage tools, eyeing sectors from healthcare to defense. It’s like a heist movie, but with more code and fewer ski masks.

Hot Take:
Looks like UNC5221 has been busy swiping right on vulnerabilities, and this time they’ve matched with Ivanti’s EPMM software. It’s a classic tale of “hackers gonna hack,” but with a twist of espionage that makes James Bond look like a kid playing with a toy gun. The moral of the story? Always patch your software, or risk being part of a cyber soap opera starring Chinese threat actors!
Key Points:
– Two security flaws, CVE-2025-4427 and CVE-2025-4428, were exploited by the Chinese hacking group UNC5221.
– The vulnerabilities in Ivanti EPMM software allow unauthenticated arbitrary code execution.
– Affected sectors include healthcare, telecommunications, aviation, and more across Europe, North America, and Asia-Pacific.
– Attackers use KrustyLoader for deploying additional payloads and exploiting hard-coded MySQL credentials.
– GreyNoise noted increased scanning activity prior to vulnerability disclosure, hinting at premeditated exploitation.