Article Details

Scrape Timestamp (UTC): 2025-01-13 10:35:39.441

Source: https://www.theregister.com/2025/01/13/nominet_ivanti_zero_day/

Original Article Text

Click to Toggle View

Nominet probes network intrusion linked to Ivanti zero-day exploit. Unauthorized activity detected, but no backdoors found. UK domain registrar Nominet is investigating a potential intrusion into its network related to the latest Ivanti zero-day exploits. Nominet told customers via an email sent on January 8, which was seen by The Register: "We became aware of suspicious activity on our network late last week. The entry point was through third-party VPN software supplied by Ivanti that enables our people to access systems remotely." Domain registration and management systems continue to operate as normal "The unauthorized intrusion into our network exploited a zero-day vulnerability," the email added. At present, Nominet said there is no evidence to suggest that its data has been stolen or leaked, nor have any backdoors or other forms of unauthorized access into its network been identified. "Aided by external experts, our investigation continues, and we have put additional safeguards in place, including restricted access to our systems from VPN," it said. "Domain registration and management systems continue to operate as normal." The top-level domain registrar looks after more than 11 million .uk domains and others such as .wales, .pharmacy, and .career. It previously delivered the UK National Cyber Security Centre's Protective Domain Name Service (PDNS) before that contract was awarded to Cloudflare in April last year. Nominet said its ongoing investigations have now been communicated to customers, members, and the relevant authorities, including the NCSC. "We will update you when our investigation concludes, or as necessary," it told customers via the email. All signs point to Nominet being the first organization to be publicly identified as a victim of the ongoing exploitation of CVE-2025-0282, the zero-day vulnerability affecting Ivanti Connect Secure, Policy Secure, and Neurons for ZTA gateways. Ivanti and Mandiant, the threat intel giant drafted in to help manage the analysis of the issues, jointly disclosed the vulnerability on Wednesday. The pair noted that attacks using the vulnerability had been observed as far back as December but neither specified any victims nor the sectors they were in. The revelation comes almost exactly a year after a similar zero-day hit the same Ivanti products in January 2024.  The company's investigators linked the latest exploits to the activity cluster they track as UNC5337, a group with known ties to UNC5221, the culprits behind last year's attacks. Security outfit Volexity previously said that UNC5221 appears to have a China nexus, but Mandiant said there wasn't enough data to confirm attribution. The information being communicated from Mandiant's investigation is that successful exploits lead to the deployment of previously known malware families (Spawn), as well as novel strains never seen before, now tracked as Dryhook and Phasejam. Mandiant warned: "Defenders should be prepared for widespread, opportunistic exploitation, likely targeting credentials and the deployment of web shells to provide future access." Ivanti released patches for vulnerable Connect Secure versions at the time of the zero-day disclosure, but Policy Secure and Neurons for ZTA Gateways, both of which are also affected by the two new vulnerabilities, will have to wait until January 21 for their fixes. The vendor came under fire last year for stalling on patch development, leaving customers without a fix for weeks, supplying only a mitigation that wasn't totally effective in all cases.  The zero-day exploitation was thought to have affected thousands of organizations in 2024, including Fortune 500 companies. "Ivanti has made available patches to address this vulnerability which we are implementing," said Nominet. "Those also using Ivanti's VPN services are encouraged to patch their software immediately."

Daily Brief Summary

CYBERCRIME // Nominet Investigates Network Breach Linked to Ivanti Zero-Day

Nominet, a UK domain registrar, is currently investigating unauthorized access to its network, exploiting a zero-day vulnerability in Ivanti's VPN software.

Despite the intrusion, no evidence of data theft, leaks, or backdoors has been reported; domain systems remain fully operational.

Nominet has engaged external cybersecurity experts to assist with their ongoing investigation and has implemented heightened security measures, including restricted VPN access.

The zero-day vulnerability, identified as CVE-2025-0282, has been actively exploited since December and affects various Ivanti products, with patches now being rolled out.

This incident is part of a series of attacks by the threat actor group UNC5337, linked to another group with a potential connection to China, known as UNC5221.

Mandiant, assisting Ivanti in the vulnerability analysis, has observed the deployment of both known and new malware types, indicating a significant cybersecurity threat.

Nominet has advised all users of Ivanti's affected software to apply the available patches immediately to mitigate potential risks.