Subscribe

Social Media Links

Insights

 | 3 minute read

Ankura CTIX FLASH Update – March 3, 2026

Malware Activity

Emerging Threats and Vulnerabilities in Modern Technology 


Threat Actor Activity

Look into Cyber Operations Amid US-Israel-Iran Conflict 


Vulnerabilities

CISA Details RESURGE Implant Used in Ivanti Zero-Day Exploitation

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released updated technical details on RESURGE, a stealthy malicious implant deployed in zero-day attacks exploiting CVE-2025-0282 in Ivanti Connect Secure devices, which Mandiant attributes to a China-linked threat actor tracked as UNC5221 since mid-December 2024. The primary component, a 32-bit Linux shared object file (libdsupgrade.so), functions as a passive command-and-control (C2) implant with rootkit, bootkit, backdoor, proxying, and tunneling capabilities, designed to evade detection by waiting indefinitely for specially crafted inbound TLS connections rather than beaconing outward. It hooks the web server’s accept() function to inspect TLS traffic using CRC32-based fingerprinting, forwarding legitimate traffic to the Ivanti server while intercepting attacker connections authenticated via a forged Ivanti certificate. Although the fake certificate is not used for encryption, it enables authentication and impersonation, and because it is transmitted unencrypted, it may serve as a detectable network signature. Once validated, attackers establish encrypted mutual TLS sessions using elliptic curve cryptography, with the implant verifying keys against a hard-coded EC certificate authority. Additional components include a SpawnSloth variant (liblogblock.so) for log tampering and a kernel extraction script (dsmain) enabling firmware decryption and modification for boot-level persistence. CTIX analysts warn that RESURGE can remain dormant and undetected until activated by a remote operator, posing an ongoing risk, and urges administrators to use updated indicators of compromise to identify and remediate infections.

📧 Never Miss a Briefing

Stay informed and secure. Subscribe to Ankura’s Cyber Flash Update, a bi-weekly briefing curated by our top cybersecurity experts. Receive timely insights on emerging threats, vulnerabilities and malicious actors to keep your systems secure. 

Join the Cyber Flash Update community today.

© Copyright 2026. The views expressed herein are those of the author(s) and not necessarily the views of Ankura Consulting Group, LLC., its management, its subsidiaries, its affiliates, or its other professionals. Ankura is not a law firm and cannot provide legal advice.

Let’s Connect

We solve problems by operating as one firm to deliver for our clients. Where others advise, we solve. Where others consult, we partner.

I’m interested in
I need help with