Back to Intelligence

Unmasking the RESURGE Implant: How CISA's New Alert Changes the Game for Ivanti Connect Secure

SA
Security Arsenal Team
March 1, 2026
5 min read

The perimeter has shifted. For years, organizations have treated their VPN concentrators as trusted gateways. However, a new advisory from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) shatters that illusion, revealing that a sophisticated malware strain known as RESURGE has been burrowing into Ivanti Connect Secure devices, lying in wait like a digital time bomb.

As we analyze the intelligence surrounding CVE-2025-0282, it becomes clear that this isn't just another software bug; it is a strategic campaign by threat actors to maintain persistence within the networks of high-value targets. Here is what you need to know to protect your infrastructure.

The Threat Landscape: Why CVE-2025-0282 Matters

At the heart of this alert is CVE-2025-0282, a critical zero-day vulnerability affecting Ivanti Connect Secure (formerly Pulse Secure) and Policy Secure gateways. This vulnerability allows attackers to bypass authentication and execute arbitrary code on the appliance.

What makes this specific situation alarming is the usage of the RESURGE malware implant. Unlike opportunistic ransomware that makes its presence known immediately by encrypting files, RESURGE is designed for stealth. It acts as a persistent backdoor, allowing attackers to move laterally across the network, exfiltrate data, or deploy further payloads—all while the device appears to function normally.

Deep Dive: The Mechanics of RESURGE

RESURGE is a memory-resident implant designed to survive standard reboots and software updates. When an attacker exploits CVE-2025-0282, they inject the malware into the running processes of the Ivanti device.

The "dormant" nature of this malware is its most dangerous feature. CISA reports indicate that RESURGE can lie inactive for extended periods, only activating to receive commands from a Command and Control (C2) server. This makes detection incredibly difficult, as traditional file-based antivirus scans often miss memory-only artifacts.

Key Tactics, Techniques, and Procedures (TTPs) associated with this threat include:

  • Web Shell Deployment: Attackers often drop web shells to regain access if the initial exploit is patched.
  • Credential Harvesting: The malware targets the device's memory to extract session cookies and authentication tokens.
  • Traffic Masquerading: C2 traffic is often designed to blend in with legitimate administrative SSL traffic, bypassing basic firewall rules.

Threat Hunting: Detecting the Undetectable

Given the sophistication of RESURGE, standard monitoring is insufficient. Security teams must assume breach and actively hunt for indicators of compromise (IoCs). Below are specific queries and scripts to aid in your investigation.

1. Hunting for Suspicious Processes via Sentinel (KQL)

If you are forwarding Ivanti logs to Microsoft Sentinel, use this KQL query to identify processes spawned by the web server components that are indicative of web shell activity or unusual execution chains.

Script / Code
DeviceProcessEvents
| where InitiatingProcessFileName hasAny ("httpd", "tomcat", "java")
| where ProcessFileName !in~ ("httpd", "java", "sh", "bash", "perl") 
| where ProcessCommandLine contains "-c" or ProcessCommandLine contains "curl"
| project Timestamp, DeviceName, AccountName, ProcessFileName, ProcessCommandLine, InitiatingProcessFileName
| extend HuntName = "Ivanti_RESURGE_Process_Anomaly"

2. Integrity Verification via Bash

Since Ivanti appliances are Linux-based, you can use the native package manager to verify the integrity of critical system binaries. A compromised system will often show modified files in the web components. Run the following command directly on the appliance CLI:

Script / Code
rpm -Va | grep -E "^..5.*bin/.*|^..5.*sbin/.*|^..5.*lib/.*"

This command lists any files where the size, digest, or permissions differ from the originally installed package database.

3. Scanning for Known Persistence Mechanisms

Attackers often use cron jobs or modified systemd services to maintain persistence. Use the following grep command to check for suspicious entries:

Script / Code
grep -Ri "curl.*http" /etc/cron* /var/spool/cron/* 2>/dev/null

Mitigation and Remediation Strategy

Detecting RESURGE is only half the battle. Remediation requires a scorched-earth approach because the malware is designed to survive simple patching.

  1. Immediate Patching: Apply the relevant out-of-band patches provided by Ivanti for CVE-2025-0282 immediately. However, do not stop there.

  2. Factory Reset is Mandatory: CISA warns that patching alone may not remove active malware infections. You must perform a factory reset on the appliance to ensure all memory-resident artifacts are wiped.

  3. Credential Rotation: Assume that credentials stored on or passed through the device are compromised. Rotate all administrative credentials and user VPN credentials immediately.

  4. Threat Hunt: Before restoring from a backup, ensure the backup was created before the initial compromise window (often months ago).

Conclusion

The emergence of the RESURGE malware highlights a critical shift in cyber warfare targeting edge devices. We can no longer view VPN concentrators as "set it and forget it" appliances. They are high-value targets that require the same level of rigorous monitoring and incident response capability as our domain controllers.

At Security Arsenal, we are actively monitoring this situation and updating our threat intelligence feeds to detect RESURGE activity across our client base. If you suspect your Ivanti infrastructure may be compromised, do not wait for the alert to trigger.

Related Resources

Security Arsenal Incident Response Services AlertMonitor Platform Book a SOC Assessment incident-response Intel Hub

incident-responseransomwareforensicsivanticisazero-daythreat-huntingsoc

Is your security operations ready?

Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.