Threat Actors Exploit Ivanti Connect Secure Flaws to Deploy Cobalt Strike Beacon

Threat Actors Exploit Ivanti Connect Secure Flaws to Deploy Cobalt Strike Beacon

Threat actors have been actively exploiting vulnerabilities in Ivanti Connect Secure, specifically CVE-2025-0282 and CVE-2025-22457, to deploy advanced malware, including MDifyLoader and Cobalt Strike Beacon.

These attacks, observed from December 2024 through July 2025, build on prior incidents involving SPAWNCHIMERA and DslogdRAT, demonstrating persistent targeting of VPN appliances.

Attackers leverage these flaws for initial access, subsequently introducing tools like vshell and Fscan to facilitate reconnaissance, lateral movement, and persistence within compromised networks.

The execution flow of Fscan

The sophistication of these operations highlights the attackers’ intent to evade detection through obfuscation, encryption, and legitimate file abuse, underscoring the need for robust patching and monitoring of external remote services.

Malware Execution

The execution flow begins with a scheduled task triggering a legitimate executable, such as Java’s rmic.exe or push_detect.exe, which side-loads MDifyLoader via DLL hijacking.

Derived from the open-source libPeConv project, MDifyLoader decrypts an encrypted data file using an RC4 key generated from the MD5 hash of the executable, ultimately injecting Cobalt Strike Beacon version 4.5 into memory.

This Beacon variant features custom modifications, including RC4-encrypted configuration data with a hardcoded “google” key and a “NewBeacon.dll” identifier, deviating from standard XOR decryption.

Obfuscation in MDifyLoader incorporates junk code with meaningless function calls and relative address references, complicating static analysis and deobfuscation efforts.

Similarly, vshell, a Go-based multi-platform RAT version 4.6.0, includes a system language check for Chinese, which attackers repeatedly tested and redeployed, suggesting remnants of internal development artifacts.

Cobalt Strike Beacon
Execution flow of Cobalt Strike through MDifyLoader

Fscan, an open-source network scanner, is executed via a legitimate python.exe that side-loads a malicious python311.dll based on FilelessRemotePE, decrypting the encoded k.bin payload with an RC4 key “99999999” for in-memory execution.

Post-Exploitation Tactics

Once inside the internal network, attackers employ brute-force attacks on Active Directory servers, FTP, MSSQL, and SSH services to harvest credentials, while exploiting the MS17-010 SMB vulnerability for lateral movement to unpatched hosts.

Obtained credentials enable RDP and SMB-based pivoting, with malware deployment across systems.

For persistence, new domain accounts are created and added to groups, blending with legitimate operations to survive credential revocations, while malware is registered as Windows services or scheduled tasks for automatic execution on startup or triggers.

Defense evasion is achieved through masquerading as legitimate files, file deletion to erase traces, and ETW bypassing via ntdll.dll patches in the Fscan loader, impairing EDR detection.

Command and control communications are secured with encrypted channels, including TLS and custom protocols, facilitating long-term access.

These tactics map to MITRE ATT&CK techniques such as T1133 for initial access, T1053.005 for scheduled tasks, T1110.001 for credential access, and T1210 for exploitation-based lateral movement, illustrating a comprehensive intrusion lifecycle.

JPCERT/CC warns that these attacks are likely to continue, urging organizations to scrutinize VPN devices and implement defenses against such encrypted, obfuscated payloads. For detailed indicators, including hashes and C2 servers, refer to the IOC table below.

Indicators of Compromise (IOC)

Category Item Value
Malware Cobalt Strike v4.5 update.dat – SHA256: 09087fc4f8c261a810479bb574b0ecbf8173d4a8365a73113025bd506b95e3d7
Malware Cobalt Strike v4.5 config.ini – SHA256: 1652ab693512cd4f26cc73e253b5b9b0e342ac70aa767524264fef08706d0e69
Malware vshell ws_windows_amd2.exe – SHA256: 48f3915fb8d8ad39dc5267894a950efc863bcc660f1654187b3d77a302fd040f
Malware vshell ws_windows_amd64.exe – SHA256: 54350d677174269b4dc25b0ccfb0029d6aeac5abbbc8d39eb880c9fd95691125
Malware vshell ws.exe – SHA256: 85f9819118af284e6b00ce49fb0c85ff0c0b9d7a0589e1bb56a275ed91314965
C2 Server 172.237.6.207:80
C2 Server proxy.objectlook.com:80
C2 Server api.openedr.eu.org:443
C2 Server community.openedr.eu.org:443
C2 Server query.datasophos.com:443

Get Free Ultimate SOC Requirements Checklist Before you build, buy, or switch your SOC for 2025 - Download Now


Source link