Connectwise, Software Developer for Screenconnect, showed that it was a cyber-fad sacrifice that, accordingly, was committed by an actor at the threat of a nation-state.
“Recently Connectwise learned about suspicious activity in our environment, which we believe – Note In short counseling on May 28, 2025.
The company said Google Mandiant was engaged in the Medical Medical Check in the incident and that it reported to all the victims. For the first time reported CRN.
However, this did not reveal the exact number of clients who were affected by the hacking when this happened or the actor’s identity is threatened.
It is worth noting that the company at the end of April 2025 secured Cve-2025-3935 (CVSS assessment: 8.1), high-speed vulnerability in Screenconnect 25.2.3 and previously that can be used to injegle the ViewState injection using Publicly Reveal Microsoft Microsoft. disclosed Earlier in this February.
The problem was solved in the Screenconnect version 25.2.4. Considering this, it is now unknown whether the cyber is a car with the exploitation of vulnerability.
Connectwise said it has implemented enhanced monitoring and curing in its terms to prevent similar attacks in the future.
“We did not observe any additional suspicious activity in any case of customers,” he added, saying that he was closely monitoring the situation.
At the beginning of 2024, Disadvantages of security The Connectwise Screenconnect (CVE-2010-1708 and CVE-2014-1709) were used in both cybercrime and nation-state actors, including from those China. North Koreaand Russiato deliver various harmful useful loads.