Description |
This article explains how Lacework FortiCNAPP can help detect post-exploitation behaviors following the exploitation of Ivanti Cloud Services Appliance (CSA) vulnerabilities (CVE-2024-9379, CVE-2024-9380, CVE-2024-9381). Although "Cloud" is in the name, Ivanti CSA is a perimeter authentication appliance rather than a cloud-native service. As a result, Lacework does not directly detect the initial exploitation of Ivanti CSA. However, if attackers use Ivanti CSA as an entry point to pivot into cloud environments, Lacework can identify post-compromise behaviors such as credential theft, privilege escalation, and lateral movement. |
Scope |
Attackers exploiting Ivanti CSA vulnerabilities may:
Lacework FortiCNAPP detects these post-exploitation behaviors using composite alerts that correlate multiple signals within cloud environments. |
Solution |
Detecting Post-Exploitation with Lacework FortiCNAPP Alerts (see next table) |
Additional Resources |
https://www.fortiguard.com/outbreak-alert/ivanti-csa-zero-day-attack
https://www.ivanti.com/blog/october-2024-security-update https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-022a |
Lacework composite alerts help detect attacker activity in cloud environments:
Threat Type | Lacework FortiCNAPP Alert | Description |
Unusual IAM Role Assumptions (Stolen Credentials) | Potentially Compromised AWS Keys | Detects anomalous use of AWS IAM credentials |
Potentially Compromised Azure Identity | Detects unexpected Azure identity usage | |
Potentially Compromised Google Cloud Identity | Detects unauthorized access to Google Cloud identities | |
AWS: Anomalous API Activity (Privilege Escalation, Cloud Modifications) |
|
Identifies API activity indicative of an attack on AWS |
Azure: Anomalous API Activity (Privilege Escalation, Cloud Modifications) |
New Azure API Failed with Error New Azure API Call Invoked by User Accessed Resource for the First Time |
Identifies API activity indicative of an attack on Azure |
Google Cloud: Anomalous API Activity (Privilege Escalation, Cloud Modifications) | Identifies API activity indicative of an attack on Google Cloud |
1) Apply Ivanti's security patches to mitigate initial exploitation
2) Monitor IAM & API activity logs for unusual access in AWS, Azure, and Google Cloud
3) Use Lacework FortiCNAPP anomaly detection to spot attack behavior across cloud environments
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.