ConnectWise, the developer of distant entry and help software program ScreenConnect, has disclosed that it was the sufferer of a cyber assault that it stated was seemingly perpetrated by a nation-state risk actor.
“ConnectWise just lately realized of suspicious exercise inside our surroundings that we imagine was tied to a complicated nation-state actor, which affected a really small variety of ScreenConnect clients,” the corporate stated in a quick advisory on Might 28, 2025.
The corporate stated it has engaged the providers of Google Mandiant to conduct a forensic probe into the incident and that it has notified all affected clients. The incident was first reported by CRN.
Nevertheless, it didn’t reveal the precise variety of clients who have been impacted by the hack, when it occurred, or the identification of the risk actor behind it.
It is price noting that the corporate, in late April 2025, patched CVE-2025-3935 (CVSS rating: 8.1), a high-severity vulnerability in ScreenConnect variations 25.2.3 and earlier that might be exploited for ViewState code injection assaults utilizing publicly disclosed ASP.NET machine keys – a method Microsoft disclosed earlier this February.
The problem was addressed in ScreenConnect model 25.2.4. That stated, it is at the moment not recognized if the cyber assault is linked to the exploitation of the vulnerability.
ConnectWise stated it has applied enhanced monitoring and hardening measures throughout its setting to stop such assaults from taking place once more sooner or later.
“We’ve not noticed any additional suspicious exercise in any buyer cases,” it added, stating it is intently monitoring the scenario.
In early 2024, safety flaws in ConnectWise ScreenConnect software program (CVE-2024-1708 and CVE-2024-1709) have been exploited by each cybercrime and nation-state risk actors, together with these from China, North Korea, and Russia, to ship quite a lot of malicious payloads.