Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Microsoft Confirms Windows 11 Update Fails With Error 0x800f0922
May 18, 2026
Critical Windows ‘MiniPlasma’ Zero-Day Grants SYSTEM Access
May 18, 2026
Critical WordPress Plugin Flaw Allows Authentication Bypass Attacks
May 18, 2026
Home/CyberSecurity News/Hackers Exploit Ivanti EPMM to Deploy Dormant Exploiting Devices
CyberSecurity News

Hackers Exploit Ivanti EPMM to Deploy Dormant Exploiting Devices

Ivanti Endpoint Manager Mobile (EPMM) appliances are currently experiencing active exploitation by hackers. Threat actors are planting “dormant” backdoors into these systems, designed to...

Emy Elsamnoudy
Emy Elsamnoudy
February 9, 2026 3 Min Read
5 0

Ivanti Endpoint Manager Mobile (EPMM) appliances are currently experiencing active exploitation by hackers. Threat actors are planting “dormant” backdoors into these systems, designed to remain unused for days or weeks.

Ivanti recently disclosed two critical EPMM flaws, CVE-2026-1281 and CVE-2026-1340, spanning authentication bypass and remote code execution in different packages (aftstore and appstore).

While the packages differ, defenders face the same practical impact: unauthenticated access to application-level endpoints. Ivanti has published mitigation and patching guidance in its security advisory, but exploitation in the wild followed shortly after disclosure.

Across observed intrusions by Defusedcyber tied to this latest wave, successful exploitation consistently resulted in a dropped artifact at the path /mifs/403.jsp. The filename and location are not new in Ivanti/MobileIron targeting; what’s different is the payload’s purpose.

Instead of deploying an interactive webshell capable of command execution, the attackers delivered a Base64-encoded Java class file via HTTP parameters. Each decoded payload contained valid Java bytecode (the CAFEBABE class header), functioning as a dormant in-memory class loader rather than an immediately usable backdoor.

This distinction matters operationally: traditional webshell hunting often keys on follow-on commands and filesystem artifacts. Here, the attacker’s workflow prioritized “land and confirm,” not “land and operate.”

The implanted class has been observed as base.Info (compiled from Info.java). It does not expose file browsing, command execution, or a typical operator console. Instead, it waits for a later “activation” request that delivers a second Java class, which the loader then runs directly in memory.

Notably, the loader uses equals(Object) as an entry point rather than standard servlet methods like doGet or doPost, a choice that can reduce friction with simplistic detections.

It extracts HttpServletRequest and HttpServletResponse from the supplied object (with fallbacks for PageContext and servlet wrapper/facade patterns), increasing portability across Java web container implementations.

When triggered, the loader checks for an HTTP parameter named k0f53cf964d387. If present, it strips a two-character prefix, Base64-decodes the remaining value into raw bytes, and reflectively calls ClassLoader#defineClass to load the second-stage class without writing to disk.

The loader instantiates the resulting class with basic host context and returns the class’s toString() output to the requester, wrapped in fixed delimiters (3cd3d and e60537) and served as text/html—a format that is easy for automated tooling to parse. For Base64 decoding, it supports both java.util.Base64 (Java 8+) and sun.misc.BASE64Decoder for older JVMs.

Before handing off control, the loader fingerprints the host (for example, user.dir, filesystem roots, OS name, and username) and passes that data to the second-stage class likely to help an operator quickly orient on a target later.

Across all observed cases by Defusedcyber, the loader was deployed and verified, but did not observe follow-on requests supplying a second-stage class. That “implant now, operate later” pattern aligns with initial access broker behavior, where one actor establishes dependable access at scale and another actor later monetizes or weaponizes it from a different infrastructure.

Shadowserver observed that attackers deploy a webshell on Ivanti EPMM devices, possibly exploiting CVE-2026-1281 Vulnerability. According to the scans, 56 IPs were found compromised.

We have started to report webshells (or other exploitation artifacts) found on Ivanti EPMM devices, likely compromised via CVE-2026-1281. 56 IPs found on 2026-02-06

Data in https://t.co/D1KZAGvNIZ

Tree Map view: https://t.co/AbPACMBpR9

Thank you to @NCA_KSA for the heads up! pic.twitter.com/jsbbqNSkz5

— The Shadowserver Foundation (@Shadowserver) February 7, 2026

Defenders should treat any evidence of this activity as a compromise or attempted compromise, especially if there is no immediate post-exploitation.

  • Patch EPMM immediately per Ivanti guidance, then restart affected application servers to flush in-memory implants (critical because the loader never needs to touch disk)
  • Review logs for requests to /mifs/403.jsp, especially with the parameter k0f53cf964d387 (example pattern: GET /mifs/403.jsp?...k0f53cf964d387=<2 chars><base64>)
  • Hunt for responses containing the delimiter pair 3cd3d and e60537
  • Treat detections as time-sensitive, even if the environment appears “stable”; the access may simply be unactivated

Indicators of Compromise

Artifact Details

Field Value
Class Name base[.]Info
Source File Info[.]java
SHA-256 097b051c9c9138ada0d2a9fb4dfe463d358299d4bd0e81a1db2f69f32578747a

Network IOCs – Source IP Addresses

IP Address Organization ASN
104.219.171[.]96 Datacamp Limited AS212238
108.64.229[.]100 AT&T Enterprises, LLC AS7018
115.167.65[.]16 NTT America, Inc. AS2914
138.36.92[.]162 HOSTINGFOREX S.A. AS265645
146.103.53[.]35 Datacamp Limited AS212238
148.135.183[.]63 Datacamp Limited AS212238
151.247.221[.]59 Datacamp Limited AS212238
166.0.83[.]171 UK Dedicated Servers Limited AS42831
172.59.92[.]152 T-Mobile USA, Inc. AS21928
185.240.120[.]91 Datacamp Limited AS212238
185.239.140[.]40 Datacamp Limited AS212238
194.35.226[.]128 LeaseWeb Netherlands B.V. AS60781
193.41.68[.]58 LeaseWeb Netherlands B.V. AS60781
77.78.79[.]243 SPCom s.r.o. AS204383
62.84.168[.]208 Hydra Communications Ltd AS25369
45.66.95[.]235 Hydra Communications Ltd AS25369
46.34.44[.]66 Liberty Global Europe Holding B.V. AS6830

Detection Patterns

Indicator Type Pattern
File Path /mifs/403[.]jsp
HTTP Parameter k0f53cf964d387
Response Delimiters 3cd3d and e60537
Request Pattern GET /mifs/403.jsp?...k0f53cf964d387=<2 chars><base64>
Java Class Header CAFEBABE (in Base64-decoded payload)

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitHackerPatchSecurityVulnerability

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

Discord Age-Restricts User Access to Key Features Soon

Next Post

DPRK IT Workers Impersonate via LinkedIn for Impersonating Individuals

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Grafana Labs Security Breach: Hackers Accessed GitHub Code
May 17, 2026
First Public macOS M5 Kernel Exploit Developed Apple Prepared
May 17, 2026
Pwn2Own Day 2: Microsoft Exchange, Win Windows Cursor
May 16, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us