The United States Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical intelligence update detailing the advanced capabilities of RESURGE, a sophisticated malicious implant found compromising Ivanti Connect Secure devices. This advisory highlights RESURGE’s unprecedented ability to remain dormant and evade detection on affected systems, utilizing highly refined network-level evasion and authentication mechanisms to facilitate covert communication with adversary infrastructure. The revelation underscores the enduring threat posed by this implant, which was initially identified following zero-day exploits targeting the critical CVE-2025-0282 vulnerability.
The Strategic Importance of Ivanti Platforms and Initial Compromise
Ivanti Connect Secure devices serve as vital gateways for organizations, providing secure remote access and VPN functionalities. Their placement at the network perimeter makes them high-value targets for state-sponsored adversaries and sophisticated threat actors aiming to establish persistent access to sensitive networks. The initial compromise stemmed from the exploitation of CVE-2025-0282, a critical vulnerability that allowed attackers to breach these perimeter devices without prior warning. A "zero-day" exploit signifies that the vulnerability was exploited before the vendor, in this case Ivanti, had developed or released a patch, leaving defenders highly vulnerable.
Early intelligence, attributed to incident response firm Mandiant, indicated that the CVE-2025-0282 vulnerability had been actively exploited as a zero-day since mid-December 2024. This exploitation was linked to a sophisticated threat actor internally tracked as UNC5221, widely believed to be a state-sponsored entity operating out of China. Such actors are typically characterized by their advanced persistent threat (APT) capabilities, long-term strategic objectives, and a propensity for targeting critical infrastructure, intellectual property, and government networks. The successful exploitation of a zero-day on a widely used enterprise appliance like Ivanti Connect Secure provides an adversary with a significant strategic advantage, enabling deep infiltration and sustained access.
CISA’s initial documentation of RESURGE in March of the preceding year outlined its foundational capabilities, which included survival across system reboots, the creation of webshells for credential theft, the establishment of unauthorized accounts, password resets, and privilege escalation. However, the agency’s latest analysis significantly deepens the understanding of RESURGE’s stealth and persistence mechanisms, elevating concerns regarding its potential for long-term, undetected compromise.
Deep Technical Analysis of RESURGE’s Evasion Tactics
CISA’s updated bulletin provides granular technical insights into RESURGE, identified as a 32-bit Linux Shared Object file named libdsupgrade.so. This implant is far more than a simple backdoor; it embodies a multifaceted threat with rootkit, bootkit, backdoor, dropper, proxying, and tunneling functionalities. Its most distinguishing feature, however, is its passive command-and-control (C2) architecture, which represents a significant departure from conventional malware beaconing.

Instead of actively initiating outbound connections to its C2 server—a common behavior often flagged by network monitoring tools—RESURGE remains dormant, patiently awaiting a highly specific inbound TLS connection. This "wait indefinitely" approach renders traditional network anomaly detection challenging, as the implant generates no suspicious outbound traffic unless specifically activated.
The technical sophistication extends to its interaction with the Ivanti device’s core processes. When loaded under the ‘web’ process, RESURGE employs a highly evasive technique: it hooks the accept() function. In the context of network programming, the accept() function is responsible for accepting incoming network connections. By intercepting this function, RESURGE can inspect incoming TLS packets before they are processed by the legitimate Ivanti web server. This interception allows the malware to clandestinely scrutinize connection attempts for a particular "secret handshake" from a remote attacker, identified through a unique CRC32 TLS fingerprint hashing scheme. If the incoming TLS fingerprint does not match the expected signature, RESURGE seamlessly directs the traffic to the legitimate Ivanti server, ensuring normal operation and preventing suspicion. This selective traffic handling is a cornerstone of its stealth.
Further enhancing its covert operations, the threat actor employs a forged Ivanti certificate. This certificate serves a dual purpose: it acts as a verification mechanism, ensuring the attacker is indeed interacting with the RESURGE implant rather than the legitimate Ivanti web server, and simultaneously aids in evasion by impersonating the authentic server. Crucially, CISA notes that this certificate is used solely for authentication and verification, not for encrypting the communication itself. The fact that this forged certificate is transmitted unencrypted over the internet presents a unique opportunity for defenders. CISA advises that this specific network signature could be leveraged by security teams to detect active compromises and identify dormant RESURGE infections.
Following successful fingerprint validation and authentication via the forged certificate, the threat actor establishes a secure remote access channel to the implant using a Mutual TLS (mTLS) session, encrypted with the Elliptic Curve protocol. CISA’s static analysis indicates that RESURGE dynamically requests the remote actor’s Elliptic Curve key for encryption and validates it against a hard-coded Elliptic Curve Certificate Authority (CA) key. This use of strong, cryptographically secure mTLS communication, combined with its ability to mimic legitimate TLS/SSH traffic, allows RESURGE to achieve an unparalleled level of stealth and persistence, making it exceptionally difficult to detect through standard network monitoring and forensic techniques.
Ancillary Malware and Boot-Level Persistence
The CISA analysis also sheds light on two additional critical components associated with the RESURGE implant, underscoring the comprehensive nature of the adversary’s toolkit.

One such file is liblogblock.so, identified as a variant of the SpawnSloth malware. Its primary function is log tampering. By manipulating system logs, SpawnSloth effectively erases traces of malicious activity, making incident response and forensic investigations significantly more challenging. This capability is vital for maintaining long-term persistence, as it conceals the attacker’s presence and actions, allowing them to operate undisturbed for extended periods.
The third analyzed file, dsmain, is a kernel extraction script. This script ingeniously embeds the open-source ‘extract_vmlinux.sh’ script and a collection of essential Unix/Linux utilities from BusyBox. The core function of dsmain is to enable RESURGE to decrypt, modify, and subsequently re-encrypt coreboot firmware images. Coreboot is an open-source project that provides a fast and secure boot firmware for various computing devices. By manipulating the coreboot firmware, dsmain grants RESURGE boot-level persistence, meaning the malware can survive even severe system resets or re-installations that typically wipe software-level infections. This level of compromise is extremely difficult to remediate, often requiring specialized hardware forensics and re-flashing of firmware.
Implications and Future Outlook
CISA’s updated analysis unequivocally states that RESURGE possesses the capability to remain latent on systems indefinitely, activating only when a remote actor attempts to establish a connection. This dormant state makes it an "active threat" that could be present and undetected on Ivanti Connect Secure devices across numerous organizations. The implications of such a stealthy, persistent, and deeply embedded threat are profound:
- Undetected Long-Term Espionage: The ability to remain dormant and evade detection facilitates long-term espionage, data exfiltration, and intelligence gathering without immediate discovery.
- Challenges for Remediation: Traditional remediation efforts, such as patching or system reboots, may not be sufficient to remove a boot-level persistent malware. Full forensic imaging, firmware integrity verification, and potentially hardware replacement might be necessary.
- Trust Erosion: Compromise at the firmware level erodes trust in the fundamental security of the device itself, raising questions about the integrity of the entire system.
- Supply Chain Risk: If such implants can be introduced during manufacturing or through supply chain compromises, it presents an even broader threat landscape.
To counter this sophisticated threat, CISA strongly recommends that system administrators meticulously utilize the updated Indicators of Compromise (IoCs) provided in their advisory. However, a more comprehensive defense strategy extends beyond mere IoC scanning:
- Proactive Threat Hunting: Organizations must engage in proactive threat hunting, leveraging network and host-based telemetry to look for subtle anomalies, especially those related to TLS fingerprints and certificate anomalies as highlighted by CISA.
- Enhanced Network Traffic Analysis: Deep packet inspection and TLS decryption should be employed where feasible and legally permissible, specifically looking for the forged Ivanti certificate and unusual mTLS connection patterns.
- Firmware Integrity Verification: Implementing robust firmware integrity checks and secure boot mechanisms is crucial to detect and prevent manipulation of the coreboot firmware. Regular validation against known good firmware images is essential.
- Out-of-Band Patching and Monitoring: Given the nature of zero-day exploits and sophisticated implants, organizations should prepare for out-of-band patching and continuous monitoring of critical perimeter devices.
- Zero Trust Architecture: Adopting a Zero Trust security model, which assumes no user or device can be inherently trusted, can help contain the impact of a breach even if an Ivanti device is compromised.
- Forensic Readiness: Maintaining a high level of forensic readiness, including detailed logging and system snapshots, will be vital for post-compromise analysis and eradication.
- Collaboration and Intelligence Sharing: Continued collaboration between government agencies like CISA and the private sector is paramount for rapid intelligence sharing and developing effective countermeasures against evolving threats like RESURGE.
The RESURGE malware represents a significant evolution in adversary tactics, pushing the boundaries of stealth and persistence. Its ability to lie dormant and leverage advanced evasion techniques demands a heightened level of vigilance and a multi-layered, proactive security posture from all organizations relying on Ivanti Connect Secure devices. The fight against such sophisticated threats necessitates not just reactive patching but a fundamental shift towards deep system integrity verification and advanced threat hunting methodologies.







