Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Target Ivanti EPMM Devices with Hidden Backdoors

Hackers Target Ivanti EPMM Devices with Hidden Backdoors

Posted on February 9, 2026 By CWS

Ivanti Endpoint Manager Mobile (EPMM) devices are currently under attack by cybercriminals who are embedding dormant backdoors within these systems. These backdoors can remain inactive for extended periods, posing a significant security threat.

Exploitation of Critical Ivanti Vulnerabilities

Recently, Ivanti disclosed two critical vulnerabilities affecting EPMM—CVE-2026-1281 and CVE-2026-1340. These vulnerabilities involve authentication bypass and remote code execution, impacting different software packages. Despite the distinct packages, the end result is the same: attackers gain unauthenticated access to application-level endpoints.

Ivanti has issued security advisories with mitigation and patching instructions. Nonetheless, cybercriminals began exploiting these vulnerabilities shortly after their disclosure, showcasing the urgency of implementing these security measures.

Mechanism of the Dormant Backdoors

Security firm Defusedcyber observed that successful intrusions often resulted in artifacts being placed at the path /mifs/403.jsp. While the file path is familiar in Ivanti/MobileIron attacks, the payload differs. Instead of using an interactive webshell, attackers transmitted a Base64-encoded Java class file.

This Java class file acts as a dormant in-memory class loader, awaiting activation. This approach allows attackers to establish a presence without immediately executing commands, complicating detection efforts.

Operational Details and Recommendations

The implanted Java class, compiled from Info.java, does not provide typical webshell capabilities like file browsing or command execution. Instead, it waits for an activation request to run additional Java classes directly in memory. This approach minimizes detection by avoiding standard servlet methods.

Defenders should consider any indication of this activity as a potential compromise. Ivanti’s guidance recommends immediate patching of EPMM systems and restarting application servers to clear any in-memory implants. Monitoring logs for specific requests and patterns is crucial for early detection.

Despite the observed deployments, follow-on actions such as the delivery of second-stage classes remain unseen. This suggests a strategy where attackers secure access for future exploitation by different actors.

Conclusion and Future Considerations

The emergence of this threat underscores the importance of timely patching and vigilant monitoring. Organizations relying on Ivanti EPMM must act swiftly to safeguard their systems against these sophisticated attacks. As cyber threats evolve, continuous adaptation of security measures and awareness is vital to protect against future incursions.

For the latest cybersecurity updates, follow us on Google News, LinkedIn, and X. Contact us to share your stories.

Cyber Security News Tags:Backdoor, CVE-2026-1281, CVE-2026-1340, cyber threat, Cybersecurity, dormant backdoor, endpoint security, hacker tactics, IT security, Ivanti EPMM, Java class loader, malware detection, network security, security patch, vulnerability exploitation

Post navigation

Previous Post: China-Linked Group Targets Singapore Telecom in Cyber Attack
Next Post: Node.js-Powered LTX Stealer Targets User Credentials

Related Posts

System Admins Beware! Weaponized Putty Ads in Bing Installs Remote Access Tools System Admins Beware! Weaponized Putty Ads in Bing Installs Remote Access Tools Cyber Security News
Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux Cyber Security News
CISA Warns of Federal Agencies Not Fully Patching Actively Exploited Cisco ASA or Firepower Devices CISA Warns of Federal Agencies Not Fully Patching Actively Exploited Cisco ASA or Firepower Devices Cyber Security News
OpenAI Unveils EVMbench for Smart Contract Security OpenAI Unveils EVMbench for Smart Contract Security Cyber Security News
YouTube Down for Users Globally – Google Confirms Outage YouTube Down for Users Globally – Google Confirms Outage Cyber Security News
Synology BeeStation 0-Day Vulnerability Let Remote Attackers Execute Arbitrary Code Synology BeeStation 0-Day Vulnerability Let Remote Attackers Execute Arbitrary Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark