APT Group Exploits Zero-Day Vulnerabilities in Ivanti’s EPMM Product, Compromises Norwegian Government Networks

In recent months, a zero-day vulnerability in Ivanti’s Endpoint Manager Mobile (EPMM) product has been extensively exploited by an advanced persistent threat (APT) group. Since April 2023, this APT group has been taking advantage of the vulnerability, compromising several Norwegian organizations and even gaining access to and compromising a Norwegian government agency’s network.

Discovery of Attacks

The cyberattacks involving the exploitation of the zero-day vulnerability, known as CVE-2023-35078, came to light on July 24, when Norwegian authorities announced that a dozen government ministries had fallen victim to a targeted cyberattack. During the investigation, Ivanti confirmed that CVE-2023-35078 could be paired with another vulnerability, tracked as CVE-2023-35081, to bypass authentication and access control list (ACL) restrictions.

APT group exploitation

According to an advisory published by the Cybersecurity and Infrastructure Security Agency (CISA) and the National Cyber Security Centre – Norway (NCSC-NO), the APT group had been exploiting CVE-2023-35078 as a zero-day vulnerability since at least April 2023. Their primary objectives were to gather critical information from various Norwegian organizations and compromise the network of a government agency.

Chaining of vulnerabilities

The chaining of the two EPMM vulnerabilities allows hackers to gain privileged access to the system and execute uploaded files, including the deployment of malicious webshells. Moreover, the attacker employed compromised small office/home office (SOHO) routers, specifically highlighting Asus routers, as a proxy to obfuscate their activities and further enhance their access and control.

Concerns of widespread exploitation

CISA and NCSC-NO have expressed grave concerns about the potential for widespread exploitation of both vulnerabilities in government and private sector networks. This is because Mobile Device Management (MDM) systems, like EPMM, provide elevated access to thousands of mobile devices, making them an attractive target for malicious actors seeking to compromise sensitive data and gain unauthorized control.

Advisory and Mitigations

In response to these critical vulnerabilities, CISA and NCSC-NO have issued an advisory containing detailed information and resources to enable organizations to protect themselves. Their advisory includes indicators of compromise (IoCs), instructions for determining vulnerabilities, incident response steps, and recommended mitigations. It is essential for organizations to swiftly apply the provided mitigations and stay vigilant in monitoring their systems.

Future Exploitation Possibilities

Given the vast number of potentially vulnerable systems and the availability of proof-of-concept (PoC) code for the vulnerabilities, there is a heightened risk of further exploitation. The APT group’s success, combined with the increasing availability of PoC code, poses a significant threat to organizations that have not yet addressed the vulnerabilities in their EPMM installations. Urgent action must be taken to patch and secure all affected systems.

EPMM Overview

Endpoint Manager Mobile (formerly known as MobileIron Core) is a powerful mobile management software engine used by IT teams to set policies for mobile devices, applications, and content. It simplifies device management and enhances security. However, like any technology, vulnerabilities can emerge that require prompt attention to prevent exploitation and subsequent compromise.

The recent exploitation of these zero-day vulnerabilities in Ivanti’s EPMM product by an APT group serves as a stark reminder of the evolving threat landscape and the need for constant vigilance. Organizations must prioritize patch management, vulnerability identification, and robust security measures. By promptly addressing vulnerabilities, staying informed of emerging threats, and implementing recommended mitigations, organizations can significantly minimize the risk of falling victim to sophisticated cyber attacks.

Explore more

How Can MRP and MPS Optimize Your Supply Chain in D365?

Introduction Imagine a manufacturing operation where every order is fulfilled on time, inventory levels are perfectly balanced, and production schedules run like clockwork, all without excessive costs or last-minute scrambles. This scenario might seem like a distant dream for many businesses grappling with supply chain complexities. Yet, with the right tools in Microsoft Dynamics 365 Business Central, such efficiency is

Streamlining ERP Reporting in Dynamics 365 BC with FYIsoft

In the fast-paced realm of enterprise resource planning (ERP), financial reporting within Microsoft Dynamics 365 Business Central (BC) has reached a pivotal moment where innovation is no longer optional but essential. Finance professionals are grappling with intricate data sets spanning multiple business functions, often bogged down by outdated tools and cumbersome processes that fail to keep up with modern demands.

Top Digital Marketing Trends Shaping the Future of Brands

In an era where digital interactions dominate consumer behavior, brands face an unprecedented challenge: capturing attention in a crowded online space where billions of interactions occur daily. Imagine a scenario where a single misstep in strategy could mean losing relevance overnight, as competitors leverage cutting-edge tools to engage audiences in ways previously unimaginable. This reality underscores a critical need for

Microshifting Redefines the Traditional 9-to-5 Workday

Imagine a workday where logging in at 6 a.m. to tackle critical tasks, stepping away for a midday errand, and finishing a project after dinner feels not just possible, but encouraged. This isn’t a far-fetched dream; it’s the reality for a growing number of employees embracing a trend known as microshifting. With 65% of office workers craving more schedule flexibility

Boost Employee Engagement with Attention-Grabbing Tactics

Introduction to Employee Engagement Challenges and Solutions Imagine a workplace where half the team is disengaged, merely going through the motions, while productivity stagnates and innovative ideas remain unspoken. This scenario is all too common, with studies showing that a significant percentage of employees worldwide lack a genuine connection to their roles, directly impacting retention, creativity, and overall performance. Employee