CISA Warns RESURGE Malware Can Remain Dormant on Ivanti EPMM Devices

Related

Cybersecurity Leaders to Watch: Louisiana Healthcare

Louisiana’s healthcare sector depends on cybersecurity leaders who can...

Anthropic Unveils Claude Mythos to Find Critical Software Flaws Before Attackers Do

What happened Anthropic unveiled Claude Mythos Preview as the model...

Microsoft Commits $10 Billion to Expand AI and Cybersecurity Infrastructure in Japan

What happened Microsoft announced a $10 billion investment to expand...

Share

What happened

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned that threat actors are deploying a malware variant known as RESURGE against vulnerable Ivanti Endpoint Manager Mobile (EPMM) devices, where the malware can lay dormant for weeks before activating to execute commands and facilitate broader compromise. The advisory noted that adversaries have exploited critical EPMM vulnerabilities including CVE-2026-1281 and CVE-2026-24061 to initially access systems, then install RESURGE components that await specific triggers before conducting malicious activity such as downloading additional payloads, establishing persistence, and evading detection. CISA added the vulnerabilities and abuse techniques to its Known Exploited Vulnerabilities catalog and highlighted that RESURGE’s delayed activation behavior makes it harder to detect and remediate in enterprise environments.

Who is affected

Organizations running vulnerable versions of Ivanti Endpoint Manager Mobile (EPMM) are affected, as attackers can exploit known critical flaws to install dormant RESURGE malware that may activate later to execute further malicious actions.

Why CISOs should care

The warning illustrates how malware can lie dormant on enterprise management infrastructure, complicating detection and enabling threat actors to extend their foothold before carrying out additional operations.

3 practical actions

  1. Apply Ivanti EPMM patches immediately. Update to fixed versions that address critical vulnerabilities exploited to install RESURGE.
  2. Audit device management telemetry. Look for indicators of dormant malware and unusual callbacks before activation.
  3. Monitor for activation triggers. Detect anomalous behavior or scheduled tasks that could indicate RESURGE activation attempts.

Check out more malware news and analysis.