Names | GIFTEDVISITOR | |
Category | Malware | |
Type | Backdoor | |
Description | (Volexity) The attacker also modified another inbuilt component of Ivanti Connect Secure named visits.py adding a webshell component Volexity refers to as GIFTEDVISITOR. The code in this function is called whenever users access /api/v1/cav/client/visits. The modification to this code was to add the following additional code to the handler for POST requests. | |
Information | <https://www.volexity.com/blog/2024/01/10/active-exploitation-of-two-zero-day-vulnerabilities-in-ivanti-connect-secure-vpn/> <https://www.volexity.com/blog/2024/01/15/ivanti-connect-secure-vpn-exploitation-goes-global/> | |
MITRE ATT&CK | <https://attack.mitre.org/software/S1115> |
Last change to this tool card: 27 August 2024
Download this tool card in JSON format
Previous: Gh0stCringe RAT
Next: Gigabud
Changed | Name | Country | Observed | ||
APT groups | |||||
UNC5221, UTA0178 | [Unknown] | 2023 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |