• Hello and welcome! Register to enjoy full access and benefits:

    • Advertise in the Marketplace section for free.
    • Get more visibility with a signature link.
    • Company/website listings.
    • Ask & answer queries.
    • Much more...

    Register here or log in if you're already a member.

  • 🎉 WHV has crossed 14,000 monthly views and 157,000 clicks per month, as per Google Analytics! Thank you for your support! 🎉

Ivanti EPMM Under Attack: CISA Exposes Malware Kits Used by Hackers

johny899

New Member
Content Writer
Messages
306
Reaction score
3
Points
23
Balance
$311.9USD
Cyber attackers found vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), which allows corporations to manage mobile devices. The vulnerabilities allowed attackers to gain access and take control of the system.

The U.S. Cybersecurity Infrastructure and Security Agency (CISA) indicated the cyber attackers utilized malware kits - off-the-shelf hacking tools to easier access and hacking for the cyber criminals.

Security flaws: There were two significant vulnerabilities in Ivanti EPMM:​

• Authentication bypass - Attackers gained access without legitimate authentication.

• Code injection - Attackers crafted malware to run any commands they wanted inside the system.

While Ivanti fixed these vulnerabilities in May, hackers exploited them before the fix was issued.

The malware techniques​

Hackers employed malware disguised as files titled "web-install.jar." The files contained:

• A loader - places the malware onto the victim's system

• A listener - allows the hackers to send commands, steal data, and remain obfuscated in the background of the operating system

They were clever in choosing the file names such as ReflectUtil.class or WebAndroidAppInstaller.class, from which the files seem innocent, however, they acted as an entry point for intrusions.

Their Mode of Attack​

The hackers sent the system fake requests that ultimately allowed them to:

  • Learn about the system
  • View files and folders
  • Investigate the network
  • Intensify their malware
  • Collect login data (e.g., LDAP credentials)
They embedded their malware among small discreet pieces of code so it was less noticeable.

What CISA Recommends​

For those who utilize Ivanti EPMM, these are the steps you should follow:

  • Go ahead and update your software now, instead of postponing this action.
  • Scan for any malware. If any is found, take the system offline from the network.
  • Record evidence by taking a forensic image of the system.
To assist IT teams with identifying the malware, CISA also provided detection tools.
 
Top