Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Ivanti EPMM Exploited by Single IP with RCE Vulnerability

Ivanti EPMM Exploited by Single IP with RCE Vulnerability

Posted on February 16, 2026 By CWS

A major security flaw in Ivanti Endpoint Manager Mobile (EPMM), identified as CVE-2026-1281, is currently being exploited at a significant rate. Recent data from GreyNoise indicates that a staggering 83% of these attacks can be traced back to a single IP address: 193[.]24[.]123[.]42.

Primary Exploiting IP and Its Characteristics

The IP in question is associated with PROSPERO OOO (AS200593) and has been characterized as offering “bulletproof” hosting by Censys. It is noteworthy that this IP was absent from several of the initial indicators of compromise (IOCs) provided to cybersecurity defenders.

The exploitation of Ivanti EPMM is predominantly driven by this IP, which underscores the need for vigilance among organizations using the affected software.

Understanding the Vulnerabilities

The critical vulnerability, CVE-2026-1281, has a CVSS score of 9.8 and allows unauthorized attackers to execute commands by manipulating Bash arithmetic expansion within backend scripts. In addition to this, another vulnerability, CVE-2026-1340, presents a similar risk in a different component of the EPMM system.

On January 29, Ivanti issued a security advisory regarding these vulnerabilities. Shortly thereafter, the Cybersecurity and Infrastructure Security Agency (CISA) included CVE-2026-1281 in its catalog of Known Exploited Vulnerabilities, highlighting the urgency of addressing these issues.

Impact and Patterns of Attack

Between February 1 and 9, GreyNoise recorded 417 distinct exploitation attempts involving eight different IP addresses. Notably, February 8 saw 269 exploitation sessions, markedly higher than the preceding daily averages.

The primary IP, 193[.]24[.]123[.]42, has also been implicated in attacks on Oracle WebLogic Server, GNU Inetutils telnetd, and GLPI. The use of numerous user-agent strings suggests a strategy of automated mass exploitation.

Challenges in Detection and Mitigation

Many shared IOCs did not align with data on Ivanti exploitation. For example, although Windscribe VPN exit nodes generated significant traffic, they did not target Ivanti EPMM specifically. Similarly, a residential router was identified with limited activity.

Organizations focusing on blocking only these VPN or residential IPs may overlook the primary threat source, which is the AS200593 network.

Furthermore, approximately 85% of observed payloads employed DNS callbacks for code execution confirmation without immediately deploying malware. This behavior aligns with tactics used by initial access brokers, suggesting a sophisticated level of threat.

Additionally, “sleeper” webshells located at /mifs/403.jsp might persist undetected in systems even after patching, if attackers had prior access.

Stay informed on the latest cybersecurity developments by following us on Google News, LinkedIn, and X. For those interested in sharing their stories, please get in touch with us.

Cyber Security News Tags:CISA, CVE-2026-1281, Cybersecurity, Dutch authorities, GreyNoise, Ivanti EPMM, Oracle WebLogic Server, PROSPERO OOO, RCE vulnerability, single IP attack

Post navigation

Previous Post: CISA Faces Challenges Amid DHS Shutdown
Next Post: ZeroDayRAT Spyware Threatens Android and iOS Security

Related Posts

As Third-Party Vulnerabilities Rise, CISOs Accelerate Push for Security Modernization   As Third-Party Vulnerabilities Rise, CISOs Accelerate Push for Security Modernization   Cyber Security News
Fake Captcha Ecosystem Exploits Trusted Web Infrastructure to Deliver Malware Fake Captcha Ecosystem Exploits Trusted Web Infrastructure to Deliver Malware Cyber Security News
Huge Wave of Malicious Efimer Malicious Script Attack Users via WordPress Sites, Malicious Torrents, and Email Huge Wave of Malicious Efimer Malicious Script Attack Users via WordPress Sites, Malicious Torrents, and Email Cyber Security News
GPT-5 Jailbreaked With Echo Chamber and Storytelling Attacks GPT-5 Jailbreaked With Echo Chamber and Storytelling Attacks Cyber Security News
China’s Vulnerability Databases Impact Global Security China’s Vulnerability Databases Impact Global Security Cyber Security News
Critical Cybersecurity Threats: PayPal, Chrome, BeyondTrust Critical Cybersecurity Threats: PayPal, Chrome, BeyondTrust Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Exploit Trusted Platforms to Target Philippine Bank Users
  • China-Linked TA416 Intensifies Cyber Attacks on Europe
  • Urgent Security Alert: Thousands of F5 BIG-IP Devices at Risk
  • Microsoft Reveals Cookie-Based PHP Web Shell Threats
  • Social Engineering Attack Compromises Popular Axios Library

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Exploit Trusted Platforms to Target Philippine Bank Users
  • China-Linked TA416 Intensifies Cyber Attacks on Europe
  • Urgent Security Alert: Thousands of F5 BIG-IP Devices at Risk
  • Microsoft Reveals Cookie-Based PHP Web Shell Threats
  • Social Engineering Attack Compromises Popular Axios Library

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark