Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Your fitbit sleep score just worse – why is this good news here

    August 5, 2025

    My Go -TU LLM Tool dropped a super simple Mac and PC app for the local AI – why should you try it

    August 5, 2025

    The base network is suffering from 1 downtime since 2023, prevents operations for 29 minutes

    August 5, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Ivanti EPMM defect was exploited by Chinese hackers for violation of government
    Security

    Ivanti EPMM defect was exploited by Chinese hackers for violation of government

    PineapplesUpdateBy PineapplesUpdateMay 24, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Ivanti EPMM defect was exploited by Chinese hackers for violation of government
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ivanti EPMM defect was exploited by Chinese hackers for violation of government

    Chinese hackers are exploiting a remote code execution defects at the Ivanti & Point Manager Mobile (EPMM) to dissolve high-profile organizations worldwide.

    The defect is identified as CVE-2025–4428 and a high-seriousness score is obtained.

    The issue can be availed to remotely execute the code at the EPMM version 12.5.0.0 and through the first specially designed API requests.

    Ivanti revealed simultaneous defects with an authentication bypass (CVE-2025-4427) and patched both of them on 13 May 2025, given that both issues were first exploited against “very limited number of customers”.

    Tomorrow, Eclectic researcher Arda Buukkaya CVE-2025-4428 reported to be exploited extensively in the wild since 15 May, and attributed them to high confidence for the UNC52221 activity cluster.

    The special threat group is considered a ivit specialist, who regularly exploits zero-day weaknesses in firm’s products, such as safe in January and again in April 2025.

    The researcher confirmed this to Bleepingcomputer. He commented on the deep knowledge of the hackers about the Ivanti system, saying that they know which files keep the information required for the next stage of the attack, such as Cleartext MySQL credentials, and especially to target them.

    Exposed cleartext credentials
    Exposed cleartext credentials
    Source: Eclecticiq

    The latest UNC5221 exploitation campaign has targeted institutions:

    • Britain national healthcare institute
    • National Health Service/Pharma provider in North America
    • American medical equipment manufacturer
    • Municipal agencies in Scandinavia and UK
    • German federal research institute
    • German telecommunication giants and IT assistant
    • US-based cyber security firm
    • Major American Food distributor
    • Irish aerospace leasing firm
    • German industrial manufacturer
    • Japanese motor vehicle electronics and powertrain supplier
    • American firearm
    • South Korean Multinational Commercial and Consumer Bank

    These were confirmed, as clarified by reverse shells, data exfIs/database exports, frequent malware injections and misuse of internal office 365 tokens and LDAP configurations.

    CVE-2025-4428 request to trigger exploitation
    CVE-2025-4428 request to trigger exploitation
    Source: Eclecticiq

    Büyükkaya told Bleepingcomputer that the danger was most likely in spying on the actor, which was monitoring high-value targets related to strategic interests.

    The danger actor performed host hosions by running a system command to collect details about devices, users, networks and configuration files before leaving the crystyloder payload from an AWS S3 bucket.

    Sleep on the target
    Sleep on the target
    Source: Eclecticiq

    The output of those commands was temporarily saved.

    This indicates real -time data exfoliation, possibly through HTTP GET requests, followed by deformation evidence.

    The EclecticIQ report also notes that the latest attacks by UNC5221 reported the link of the Linux backdoor ‘Auto-Rang’ for the first time by Unit 42 of Palo Alto Network in February, but without a clear atribution at that time.

    The latest attacks indicate that Chinese spy groups continue to target the network circumference equipment for early access to target organizations.

    The exploitation of Eclecticiq began two days after public disclosure, highlighting the criticism of implementing security updates as soon as possible.


    Red Report 2025

    Based on the analysis of 14M malicious tasks, search for the top 10 MITERAT & CK techniques behind the 93% attacks and how to defend them against them.

    Chinese defect EPMM exploited government hackers Ivanti violation
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleDecentralization Telecom Benefits Small Businesses & Telcos – Web 3 Execution
    Next Article This small SSD lets you remove your data with one click forever, but can you rely on yourself not to misuse it?
    PineapplesUpdate
    • Website

    Related Posts

    Security

    This Palm -Acar’s power bank can charge many devices at once – and I am for all the price.

    August 5, 2025
    Security

    Android gets patches for exploited Qualcomm defects in attacks

    August 5, 2025
    Security

    5 hard truth of a career in cyber security – and how to navigate them

    August 5, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    Your fitbit sleep score just worse – why is this good news here

    August 5, 2025

    My Go -TU LLM Tool dropped a super simple Mac and PC app for the local AI – why should you try it

    August 5, 2025

    The base network is suffering from 1 downtime since 2023, prevents operations for 29 minutes

    August 5, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.