Resurge Malware Exploits Ivanti Flaw, Prompting Urgent Patching

A new strain of Resurge malware has been spotted exploiting a recently disclosed vulnerability in Ivanti’s product line, notably affecting Ivanti Endpoint Manager. According to security researchers, attackers can leverage this flaw to gain unauthorised access, potentially enabling remote code execution or privilege escalation. The malware then uses advanced stealth tactics—such as fileless execution and process injection—to maintain persistence on compromised systems. Experts warn that Resurge’s operators appear highly skilled and are adapting their methods rapidly. The article concludes by urging organisations to patch Ivanti software immediately, monitor for suspicious network activity, and strengthen overall cyber defences to prevent similar attacks.

A newly identified Resurge malware variant is actively targeting a vulnerability in Ivanti software, posing a serious threat to companies relying on Ivanti Endpoint Manager. Once attackers exploit the flaw, they can stealthily infiltrate systems, potentially executing code remotely and escalating their privileges.
Security experts note that Resurge displays sophisticated techniques such as fileless execution—where malware hides in system memory—and process injection, enabling it to linger undetected. Its operators appear highly organised, using frequent updates to evade security tools.
What Should You Do?
• Patch Promptly: Apply Ivanti’s latest fixes or mitigation steps as soon as possible.
• Monitor Networks: Watch for unusual behaviour or traffic.
• Adopt Strong Defences: Multi-layered security, real-time monitoring, and employee training can help identify malicious activity before it spreads.
By acting swiftly and staying informed, organisations can reduce the impact of this emerging threat and preserve the integrity of their systems.