Hackers Exploit Cisco ASA 0-Day to Deploy RayInitiator and LINE VIPER Malware


Security teams worldwide have been warned after attackers began exploiting a newly discovered zero-day vulnerability in Cisco Adaptive Security Appliance (ASA) 5500-X Series firewalls.

The breach allows hackers to deploy sophisticated malware, dubbed RayInitiator and LINE VIPER, potentially giving them full control of affected devices.

Today, the National Cyber Security Centre (NCSC), part of GCHQ, issued detailed guidance to help defenders identify and block this threat.

In its latest advisory, the NCSC provided an in-depth malware analysis report and urged organisations to act swiftly to secure their networks.

Cisco confirmed that the same threat actor behind last year’s ASA attacks has developed new techniques to exploit vulnerabilities in the 5500-X Series.

Once compromised, attackers can execute arbitrary commands, install malicious payloads, and extract sensitive data.

Cisco’s security update page includes recommended patches and configuration changes to close the exploited hole.

The NCSC’s report on RayInitiator and LINE VIPER outlines how the malware operates. RayInitiator establishes a foothold by modifying firewall configurations and creating hidden administrator accounts.

LINE VIPER then provides a backdoor, enabling remote command execution and data exfiltration without triggering common detection tools.

Network defenders can download the full analysis report and detection rules to spot indicators of compromise.

Affected organisations are advised to:

  • Apply Cisco’s security patches immediately. Juggling unsupported or end-of-life firmware increases risk, so updating to the latest software release is essential.
  • Monitor firewall logs closely. Look for unusual administrative logins, unexplained configuration changes, or connections to unfamiliar external hosts.
  • Implement network segmentation. Ensure critical systems are isolated from exposed firewalls to limit blast radius.
  • Report incidents to the NCSC. Early reporting can help track the threat actor’s methods and improve collective defenses.

The NCSC also highlighted that some ASA 5500-X models will reach end-of-support between September 2025 and August 2026.

Obsolete devices often lack security updates, making them prime targets for attackers. Organisations still using these models should plan their replacement or upgrade paths without delay.

Ollie Whitehouse, Chief Technology Officer at the NCSC, emphasized the urgency:

“It is critical for organisations to follow vendor best practices on detection and remediation. End-of-life technology presents a significant risk. Systems and devices should be promptly migrated to modern versions to address vulnerabilities and strengthen resilience.”

This alert builds on a joint advisory released last year, which examined earlier Cisco ASA malware strains, LINE DANCER and LINE RUNNER.

The new RayInitiator and LINE VIPER tools exhibit greater stealth and flexibility, marking a serious escalation in attacker capabilities.

Cisco has also published a detection guide on their website, offering step-by-step advice to secure ASA deployments and defend against continued attacks.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.