Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Ivanti EPMM Security Flaw Exploited by Single IP Source

Ivanti EPMM Security Flaw Exploited by Single IP Source

Posted on February 12, 2026 By CWS

A newly discovered vulnerability in Ivanti Endpoint Manager Mobile (EPMM) is being heavily exploited, with most attempts traced back to a single IP address linked to a bulletproof hosting provider named PROSPERO. According to GreyNoise, a threat intelligence organization, 83% of the 417 exploitation sessions detected between February 1 and 9, 2026, originated from the IP address 193.24.123[.]42.

Exploit Details and Impact

The vulnerability in question, identified as CVE-2026-1281, holds a critical CVSS score of 9.8 and is one of two severe flaws in EPMM. The second flaw, CVE-2026-1340, also presents a risk of unauthenticated remote code execution. Ivanti has acknowledged that a limited number of customers have been affected by these zero-day exploits.

European agencies such as the Dutch Data Protection Authority, the European Commission, and Finland’s Valtori have reported being targeted by threat actors leveraging these vulnerabilities. The exploitation is characterized by the use of over 300 unique user agent strings, indicating automated tools are in play.

Connection to Broader Threat Activities

Further investigation reveals that the same IP address is engaging in attacks on three other CVEs across different software platforms. GreyNoise underscores that the automation of these attacks aligns with practices observed in other cyber threats.

PROSPERO, the hosting service tied to the IP, is linked with Proton66, an autonomous system known for distributing malicious software like GootLoader and Matanbuchus. Approximately 85% of the exploit attempts utilized the domain name system (DNS) to verify vulnerabilities without deploying malware, suggesting a focus on gathering intelligence for potential future attacks.

Protective Measures and Recommendations

In light of these findings, cybersecurity experts recommend that Ivanti EPMM users apply available patches promptly, inspect their Mobile Device Management (MDM) infrastructure, and scrutinize DNS logs for signs of exploitation activities. Monitoring the /mifs/403.jsp path on EPMM systems and blocking PROSPERO’s autonomous system (AS200593) at network perimeters is advised.

GreyNoise highlights the significant risk posed by compromised EPMM systems, which could enable lateral movement within organizational networks, bypassing traditional security measures. Organizations with internet-facing MDM or remote access systems should assume vulnerabilities will be exploited shortly after discovery.

In conclusion, the exploitation of Ivanti EPMM’s vulnerabilities by a single IP address underscores the need for heightened security measures and quick patch management to mitigate potential breaches.

The Hacker News Tags:bulletproof hosting, CVE-2026-1281, Cybersecurity, GreyNoise, initial access broker, Ivanti EPMM, PROSPERO, remote code execution, security flaw, threat intelligence

Post navigation

Previous Post: Hackers Exploit Google Calendar for AI Security Breach
Next Post: Nucleus Secures $20M for Advanced Exposure Management

Related Posts

Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories The Hacker News
What the Next Wave of AI Cyberattacks Will Look Like — And How to Survive What the Next Wave of AI Cyberattacks Will Look Like — And How to Survive The Hacker News
Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware The Hacker News
OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities The Hacker News
From MCPs and Tool Access to Shadow API Key Sprawl From MCPs and Tool Access to Shadow API Key Sprawl The Hacker News
Researchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell Researchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News