Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Human-Centric
Beyond the Click: A Human-Centric Approach to Phishing Defense
April 30, 2026
Qilin Ransomware Lists RDP Auth History on Enumerates Authentication
April 30, 2026
Phoenix PhaaS Fuels Brand Smishing in Finance Platform Drives
April 30, 2026
Home/CyberSecurity News/Ivanti EPMM RCE Vulnerability Under Active Exploitation
CyberSecurity News

Ivanti EPMM RCE Vulnerability Under Active Exploitation

A critical remote code execution (RCE) flaw in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-1281, is currently under active exploitation. Threat intelligence from GreyNoise indicates...

Sarah simpson
Sarah simpson
February 16, 2026 2 Min Read
0 0

A critical remote code execution (RCE) flaw in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-1281, is currently under active exploitation. Threat intelligence from GreyNoise indicates that 83% of observed attacks originate from a single IP address: 193[.]24[.]123[.]42.

This IP is registered to PROSPERO OOO (AS200593) and labeled as “bulletproof” hosting by Censys. Surprisingly, this IP was missing from many early indicators of compromise (IOCs) shared with defenders.

Ivanti EPMM Exploitation (source : greynoise)
Ivanti EPMM Exploitation (source: Greynoise)

Two Critical Vulnerabilities Under Active Attack

CVE-2026-1281 (CVSS 9.8) allows unauthenticated attackers to execute system commands by abusing Bash arithmetic expansion in backend file-delivery scripts.

A second flaw, CVE-2026-1340 (also CVSS 9.8), enables similar code execution in another EPMM component.

On January 29, Ivanti released its advisory. Soon after, the Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2026-1281 to its Known Exploited Vulnerabilities catalog.

Dutch authorities later confirmed breaches at the Dutch Data Protection Authority (AP) and the Council for the Judiciary (RVDR), indicating that attacks were already underway before many organizations had patched.

Between February 1 and 9, GreyNoise recorded 417 exploitation sessions from eight IPs. On February 8 alone, 269 sessions were observed, about 13 times the earlier daily average.

IPs target other vulnerabilities (source : greynoise)
IPs target other vulnerabilities (source: Greynoise)

The main IP, 193[.]24[.]123[.]42, is also linked to attacks on Oracle WebLogic Server, GNU Inetutils telnetd, and GLPI. The attacker rotates hundreds of user-agent strings, suggesting automated mass exploitation.

IOC Gaps and Infrastructure Risks

Some widely shared IOCs did not match Ivanti exploitation data. For example, Windscribe VPN exit nodes on M247 infrastructure generated heavy traffic, but none targeted Ivanti EPMM.

Another IOC pointed to a residential router used only for limited activity. Organizations that blocked only those VPN or residential IPs, but not AS200593, may have missed the main threat source.

Tiering model (source : greynoise)
Tiering model (source: Greynoise)

About 85% of payloads used DNS callbacks to confirm code execution instead of immediately dropping malware. This behavior matches initial access broker tactics.

Reports also describe “sleeper” webshells at /mifs/403.jsp that stay dormant until triggered. This means even patched systems could remain compromised if attackers gained access before remediation.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachCVECybersecurityExploitMalwarePatchSecurityThreatVulnerability

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Joomla Novarain/Tassos Framework SQLi Vulnerabilities Enables

Next Post

Noodlophile Malware Evolves: Fake Job Post Creators Tactics

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
FBI & CISA Release Zero Trust Guide for Released Principles
April 30, 2026
Google Gemini CLI Flaws Allow Remote Code Execution on Hosts
April 30, 2026
Jenkins Fixes High-Severity Plugin Flaws: Patches Including
April 30, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us