Vulnerability Management, Threat Intelligence

Escalating attacks against Ivanti VPN appliances expected

(Ivanti)

Organizations using Ivanti Connect Secure and Pulse Secure VPN systems have been urged to update their instances following a ninefold increase in suspicious IP scanning activity recorded on April 18, The Register reports. Of the 1,004 unique IPs that scanned Ivanti VPN appliances, 878 were either "suspicious" or "malicious," according to a report from GreyNoise. "While no specific CVEs have been tied to this scanning activity yet, spikes like this often precede active exploitation. GreyNoise has previously observed similar patterns in the lead-up to the public discovery of new vulnerabilities," said the cybersecurity firm, which recommended increased vigilance of suspicious login activity and enhanced remediation efforts. Such findings come as Japan's Computer Emergency Response Team reported attacks exploiting the critical Ivanti Connect Secure zero-day, tracked as CVE-2025-0282, have been deployed to facilitate compromise with the DslogdRAT malware. Additional investigation is needed to establish an association between the attacks and China-linked UNC5221's intrusions against Connect Secure instances earlier this year, said JPCERT.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds