cognitive cybersecurity intelligence

News and Analysis

Search

Hackers Exploiting Cisco ASA Zero-Day to Deploy RayInitiator and LINE VIPER Malware

Hackers Exploiting Cisco ASA Zero-Day to Deploy RayInitiator and LINE VIPER Malware

Cybersecurity authorities are urging organizations to take immediate action following the discovery of a sophisticated espionage campaign targeting Cisco Adaptive Security Appliance (ASA) firewalls.

In a significant update, Cisco and the UK’s National Cyber Security Centre (NCSC) have revealed that a state-sponsored threat actor is exploiting a zero-day vulnerability (CVE-2025-20333) in Cisco ASA 5500-X series devices to deploy advanced malware, execute commands, and exfiltrate sensitive data.

The NCSC has published a detailed analysis of the malware involved, a toolset comprising a bootkit named RayInitiator and a memory-resident payload called LINE VIPER.

The campaign represents a “significant evolution” in tactics compared to previous attacks, demonstrating the actor’s deep expertise and improved operational security.

A Sophisticated and Persistent Threat

The attack begins with the deployment of RayInitiator, a highly persistent, multi-stage bootkit that flashes itself to the device’s Grand Unified Bootloader (GRUB).

This allows the malware to survive system reboots and even firmware upgrades, establishing a permanent foothold on the compromised firewall.

RayInitiator specifically targets Cisco ASA models that lack secure boot technology, many of which are approaching their end-of-life dates. Its primary function is to create a pathway for the main payload.

Once persistence is achieved, the attackers deploy LINE VIPER, a versatile shellcode loader that executes directly in the device’s memory. LINE VIPER grants the threat actor extensive control over the compromised system, with capabilities including:

Command Execution: Running arbitrary commands with the highest privilege level (level 15).ncsc-mar-rayinitiator-line-viper.pdf

Data Exfiltration: Performing covert packet captures of sensitive network traffic, such as RADIUS, LDAP, and TACACS authentication protocols, to harvest credentials.

Defense Evasion: Suppressing specific syslog messages to hide malicious activity from administrators and employing anti-forensics techniques that can reboot the device if a memory dump or certain analysis commands are attempted.

Access Bypass: Maintaining a list of actor-controlled devices to bypass Authentication, Authorization, and Accounting (AAA) checks.

The malware’s command-and-control (C2) communications are heavily encrypted and difficult to detect. The primary method uses HTTPS WebVPN client authentication sessions, with victim-specific tokens and RSA keys securing the connection.

A secondary C2 channel utilizes ICMP requests tunneled within a VPN session, with exfiltrated data sent back over raw TCP packets.

Mitigations

Both Cisco and the NCSC are urging network defenders to address this threat immediately.

In a security advisory, Cisco has provided guidance for remediation and released patches to address the vulnerabilities. Organizations are strongly advised to apply these security updates without delay.

The NCSC calls on administrators using affected products to urgently investigate for signs of compromise, using the YARA rules and detection guidance provided in its malware analysis report.

One key indicator of a LINE VIPER infection is the device rebooting immediately when an administrator attempts to generate a core dump for forensic analysis.

A critical concern highlighted by the NCSC is the use of obsolete hardware. Many of the targeted Cisco ASA 5500-X series models will be out of support in September 2025 and August 2026.

The NCSC strongly recommends that organizations replace or upgrade these end-of-life devices, as they present a significant and inherent security risk. Any suspected compromises should be reported to the NCSC or the appropriate national cybersecurity agency.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post Hackers Exploiting Cisco ASA Zero-Day to Deploy RayInitiator and LINE VIPER Malware appeared first on Cyber Security News.

Source: cybersecuritynews.com –

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts