There has been a very interesting but serious cyber-attack in the news lately. Hackers affiliated with China exploited a zero-day strategy a vulnerability in a Lanscope Endpoint Manager to access a person's organizational systems. I know pretty technical or confusing, but don't worry, I will explain it to you.
This particular vulnerability CVE-2025-61932, allowed the hackers to execute and run code they wanted on the compromised systems. In other words, they had king power and access to run what they wanted - like having the master key to someone's computer.
The hack even started before anyone knew that this vulnerability existed, hence the misleadingly called zero-day. The developers of Lanscape learned of the existence of the vulnerability and released a patch version to fix the vulnerability in October 20, 2025. The US government agency CISA added it to their "must fix" list, and recommended it should be patched before November 12.
• They patched the bug with a security update.
• They informed all customers to apply the security patch immediately.
• Security agencies also shared detection measures to assist organizations in identifying if they were compromised.
That's a fairly brisk and responsible response, however, the damage highlights the dangers of zero day flaws.
It may also be prudent to:
What Is It All About
Research teams found that a hacking group called, Tick (also known as Bronze Butler) exploited a vulnerability in Lanscope application, organizations use this program to manage their computers and networks.This particular vulnerability CVE-2025-61932, allowed the hackers to execute and run code they wanted on the compromised systems. In other words, they had king power and access to run what they wanted - like having the master key to someone's computer.
The hack even started before anyone knew that this vulnerability existed, hence the misleadingly called zero-day. The developers of Lanscape learned of the existence of the vulnerability and released a patch version to fix the vulnerability in October 20, 2025. The US government agency CISA added it to their "must fix" list, and recommended it should be patched before November 12.
Why This Matters
You may be thinking, "So what?" Here are some reasons why this matters:- Lanscope is the de facto management tool used by many organizations. If a hacker is in Lanscope, they own the whole environment.
- The attackers used Lanscope to deliver a backdoor in the organization (the backdoor was identified as Gokcpdoor), that connected back to the attackers server through a covert channel.
- The attackers also used techniques such as dynamic link library (DLL) sideloading, remote desktop access, and even cloud-based access to extract data quietly.
- The attackers could observe the network, exfiltrate data, and even remove the evidence of carrying out these activities.
How Lanscope Fixed It
Lanscope's team acted with urgency:• They patched the bug with a security update.
• They informed all customers to apply the security patch immediately.
• Security agencies also shared detection measures to assist organizations in identifying if they were compromised.
That's a fairly brisk and responsible response, however, the damage highlights the dangers of zero day flaws.
If The Following Is Considered Advice
If your organization is utilizing Lanscope, don't procrastinate - upgrade it now.It may also be prudent to:
- Check whether any suspicious apps or files were added recently.
- Restrict access to management tools, like Lanscope.
- Monitor for bizarre network activity, including strange uploads or remote session start times.