Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    5 shows like ‘Big Mouth’ on Netflix to stream now that animated show is over

    June 8, 2025

    Tedhar CEO Paolo Ardoino says ‘No need is needed’

    June 8, 2025

    What is MicroSD Express? Everything You Need To Know

    June 8, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Ivanti EPMM defect was exploited by Chinese hackers for violation of government
    Security

    Ivanti EPMM defect was exploited by Chinese hackers for violation of government

    PineapplesUpdateBy PineapplesUpdateMay 24, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Ivanti EPMM defect was exploited by Chinese hackers for violation of government
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ivanti EPMM defect was exploited by Chinese hackers for violation of government

    Chinese hackers are exploiting a remote code execution defects at the Ivanti & Point Manager Mobile (EPMM) to dissolve high-profile organizations worldwide.

    The defect is identified as CVE-2025–4428 and a high-seriousness score is obtained.

    The issue can be availed to remotely execute the code at the EPMM version 12.5.0.0 and through the first specially designed API requests.

    Ivanti revealed simultaneous defects with an authentication bypass (CVE-2025-4427) and patched both of them on 13 May 2025, given that both issues were first exploited against “very limited number of customers”.

    Tomorrow, Eclectic researcher Arda Buukkaya CVE-2025-4428 reported to be exploited extensively in the wild since 15 May, and attributed them to high confidence for the UNC52221 activity cluster.

    The special threat group is considered a ivit specialist, who regularly exploits zero-day weaknesses in firm’s products, such as safe in January and again in April 2025.

    The researcher confirmed this to Bleepingcomputer. He commented on the deep knowledge of the hackers about the Ivanti system, saying that they know which files keep the information required for the next stage of the attack, such as Cleartext MySQL credentials, and especially to target them.

    Exposed cleartext credentials
    Exposed cleartext credentials
    Source: Eclecticiq

    The latest UNC5221 exploitation campaign has targeted institutions:

    • Britain national healthcare institute
    • National Health Service/Pharma provider in North America
    • American medical equipment manufacturer
    • Municipal agencies in Scandinavia and UK
    • German federal research institute
    • German telecommunication giants and IT assistant
    • US-based cyber security firm
    • Major American Food distributor
    • Irish aerospace leasing firm
    • German industrial manufacturer
    • Japanese motor vehicle electronics and powertrain supplier
    • American firearm
    • South Korean Multinational Commercial and Consumer Bank

    These were confirmed, as clarified by reverse shells, data exfIs/database exports, frequent malware injections and misuse of internal office 365 tokens and LDAP configurations.

    CVE-2025-4428 request to trigger exploitation
    CVE-2025-4428 request to trigger exploitation
    Source: Eclecticiq

    Büyükkaya told Bleepingcomputer that the danger was most likely in spying on the actor, which was monitoring high-value targets related to strategic interests.

    The danger actor performed host hosions by running a system command to collect details about devices, users, networks and configuration files before leaving the crystyloder payload from an AWS S3 bucket.

    Sleep on the target
    Sleep on the target
    Source: Eclecticiq

    The output of those commands was temporarily saved.

    This indicates real -time data exfoliation, possibly through HTTP GET requests, followed by deformation evidence.

    The EclecticIQ report also notes that the latest attacks by UNC5221 reported the link of the Linux backdoor ‘Auto-Rang’ for the first time by Unit 42 of Palo Alto Network in February, but without a clear atribution at that time.

    The latest attacks indicate that Chinese spy groups continue to target the network circumference equipment for early access to target organizations.

    The exploitation of Eclecticiq began two days after public disclosure, highlighting the criticism of implementing security updates as soon as possible.


    Red Report 2025

    Based on the analysis of 14M malicious tasks, search for the top 10 MITERAT & CK techniques behind the 93% attacks and how to defend them against them.

    Chinese defect EPMM exploited government hackers Ivanti violation
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleDecentralization Telecom Benefits Small Businesses & Telcos – Web 3 Execution
    Next Article This small SSD lets you remove your data with one click forever, but can you rely on yourself not to misuse it?
    PineapplesUpdate
    • Website

    Related Posts

    Security

    Remove project directors presented as malicious NPM package utilities

    June 8, 2025
    Security

    Supply series attacks Glustac NPM package with 960K weekly download

    June 7, 2025
    Security

    Exploitation of Critical Round Cube webmail as hacker taking intly

    June 7, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025594 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025536 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025465 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Meta delay entrusts ‘Bhamoth’ AI model, Openi and Google more than one more head start

    May 16, 20250 Views

    Filecoin, Lockheed Martin Test IPFS in space

    May 16, 20250 Views

    The new coding agent of Chatgpt is very big, even if you are not a programmer

    May 16, 20250 Views
    Our Picks

    5 shows like ‘Big Mouth’ on Netflix to stream now that animated show is over

    June 8, 2025

    Tedhar CEO Paolo Ardoino says ‘No need is needed’

    June 8, 2025

    What is MicroSD Express? Everything You Need To Know

    June 8, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.