Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Ivanti EPMM Security Flaw Exploited by Single IP Source

Ivanti EPMM Security Flaw Exploited by Single IP Source

Posted on February 12, 2026 By CWS

A newly discovered vulnerability in Ivanti Endpoint Manager Mobile (EPMM) is being heavily exploited, with most attempts traced back to a single IP address linked to a bulletproof hosting provider named PROSPERO. According to GreyNoise, a threat intelligence organization, 83% of the 417 exploitation sessions detected between February 1 and 9, 2026, originated from the IP address 193.24.123[.]42.

Exploit Details and Impact

The vulnerability in question, identified as CVE-2026-1281, holds a critical CVSS score of 9.8 and is one of two severe flaws in EPMM. The second flaw, CVE-2026-1340, also presents a risk of unauthenticated remote code execution. Ivanti has acknowledged that a limited number of customers have been affected by these zero-day exploits.

European agencies such as the Dutch Data Protection Authority, the European Commission, and Finland’s Valtori have reported being targeted by threat actors leveraging these vulnerabilities. The exploitation is characterized by the use of over 300 unique user agent strings, indicating automated tools are in play.

Connection to Broader Threat Activities

Further investigation reveals that the same IP address is engaging in attacks on three other CVEs across different software platforms. GreyNoise underscores that the automation of these attacks aligns with practices observed in other cyber threats.

PROSPERO, the hosting service tied to the IP, is linked with Proton66, an autonomous system known for distributing malicious software like GootLoader and Matanbuchus. Approximately 85% of the exploit attempts utilized the domain name system (DNS) to verify vulnerabilities without deploying malware, suggesting a focus on gathering intelligence for potential future attacks.

Protective Measures and Recommendations

In light of these findings, cybersecurity experts recommend that Ivanti EPMM users apply available patches promptly, inspect their Mobile Device Management (MDM) infrastructure, and scrutinize DNS logs for signs of exploitation activities. Monitoring the /mifs/403.jsp path on EPMM systems and blocking PROSPERO’s autonomous system (AS200593) at network perimeters is advised.

GreyNoise highlights the significant risk posed by compromised EPMM systems, which could enable lateral movement within organizational networks, bypassing traditional security measures. Organizations with internet-facing MDM or remote access systems should assume vulnerabilities will be exploited shortly after discovery.

In conclusion, the exploitation of Ivanti EPMM’s vulnerabilities by a single IP address underscores the need for heightened security measures and quick patch management to mitigate potential breaches.

The Hacker News Tags:bulletproof hosting, CVE-2026-1281, Cybersecurity, GreyNoise, initial access broker, Ivanti EPMM, PROSPERO, remote code execution, security flaw, threat intelligence

Post navigation

Previous Post: Hackers Exploit Google Calendar for AI Security Breach
Next Post: Nucleus Secures $20M for Advanced Exposure Management

Related Posts

VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption The Hacker News
TikTok Slammed With €530 Million GDPR Fine for Sending E.U. Data to China TikTok Slammed With €530 Million GDPR Fine for Sending E.U. Data to China The Hacker News
Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control The Hacker News
Android Malware Operations Merge Droppers, SMS Theft, and RAT Capabilities at Scale Android Malware Operations Merge Droppers, SMS Theft, and RAT Capabilities at Scale The Hacker News
Why IT Admins Choose Samsung for Mobile Security Why IT Admins Choose Samsung for Mobile Security The Hacker News
New Android Malware Uses AI for Persistent Threats New Android Malware Uses AI for Persistent Threats The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark