Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Alarming Surge in Exploits Targeting Ivanti 0-Day Vulnerability

Alarming Surge in Exploits Targeting Ivanti 0-Day Vulnerability

Posted on February 12, 2026 By CWS

The cybersecurity landscape is witnessing a significant increase in attacks aimed at the Ivanti Endpoint Manager Mobile (EPMM) systems, exploiting a critical 0-day vulnerability known as CVE-2026-1281. Identified by Shadowserver on February 9, 2026, this vulnerability has been targeted by over 28,300 unique IP addresses, marking it as one of the most extensive attacks on enterprise mobile management this year.

Understanding the CVE-2026-1281 Vulnerability

CVE-2026-1281 is a severe pre-authentication code injection flaw with a CVSS score of 9.8. This vulnerability allows attackers to execute remote code without authentication on EPMM systems. The root cause is improper input validation in a Bash handler located at the /mifs/c/appstore/fob/ endpoint, which attackers exploit to run malicious commands via URL parameters.

The geographic distribution of these attacks is notably concentrated, with approximately 72% originating from the United States, followed by the United Kingdom and Russia. Additional attack sources include Iraq, Spain, Poland, France, Italy, Germany, and Ukraine, albeit in smaller numbers.

Coordinated Cyber Attacks Unveiled

Research by GreyNoise and Defused highlights a sophisticated element in these attacks, where an initial access broker is deploying “sleeper” webshells on compromised EPMM systems. This strategy, involving more than 80% of the attack activity traced back to a single IP using bulletproof hosting, suggests a well-coordinated effort to maintain persistent access for future exploitation by other malicious actors.

This method contrasts with typical opportunistic attacks, as the backdoors remain inactive until needed, allowing attackers extensive control over corporate mobile systems, including deploying additional payloads and facilitating lateral network movement.

Response and Mitigation Efforts

Ivanti disclosed CVE-2026-1281 alongside another vulnerability on January 29, 2026, acknowledging limited in-the-wild exploitation. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) responded by adding this vulnerability to its Known Exploited Vulnerabilities list, emphasizing its threat level with a rapid three-day remediation requirement.

Shadowserver is actively sharing attacker IP data through its honeypot HTTP scanner events reporting system, filtered for CVE-2026-1281. Organizations can access this intelligence at shadowserver.org to identify and block malicious sources. Ivanti has released temporary RPM patches, with a permanent fix planned for version 12.8.0.0 by Q1 2026.

Future Implications and Recommendations

Security teams overseeing EPMM deployments should immediately implement available patches, monitor for compromise indicators like unexpected webshells, and review access logs for unusual requests to the vulnerable endpoint. With the potential for significant control over enterprise mobile infrastructures, this vulnerability underscores the critical need for prompt and effective cybersecurity measures.

For ongoing updates, follow us on Google News, LinkedIn, and X. Contact us to feature your cybersecurity stories.

Cyber Security News Tags:0-day vulnerability, CISA, CVE-2026-1281, Cybersecurity, Defused, GreyNoise, Ivanti EPMM, remote code execution, Shadowserver, threat intelligence

Post navigation

Previous Post: VoidLink Framework Enables Dynamic Linux Tool Deployment
Next Post: Malicious Outlook Add-In Exploits Supply Chain Flaws

Related Posts

Authentication Coercion Attack Tricks Windows Machines into Revealing Credentials to Attack-controlled Servers Authentication Coercion Attack Tricks Windows Machines into Revealing Credentials to Attack-controlled Servers Cyber Security News
PipeMagic Malware Mimic as ChatGPT App Exploits Windows Vulnerability to Deploy Ransomware PipeMagic Malware Mimic as ChatGPT App Exploits Windows Vulnerability to Deploy Ransomware Cyber Security News
Chrome Emergency Update to Patch Multiple Vulnerabilities that Enable Remote Code Execution Chrome Emergency Update to Patch Multiple Vulnerabilities that Enable Remote Code Execution Cyber Security News
Chinese Hackers Use Rootkit to Hide ToneShell Malware Activity Chinese Hackers Use Rootkit to Hide ToneShell Malware Activity Cyber Security News
OpenAI’s New Aardvark GPT-5 Agent that Detects and Fixes Vulnerabilities Automatically OpenAI’s New Aardvark GPT-5 Agent that Detects and Fixes Vulnerabilities Automatically Cyber Security News
Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Severe Fiber v2 Vulnerability in Go Risks Security Breaches
  • Malicious Outlook Add-In Exploits Supply Chain Flaws
  • Alarming Surge in Exploits Targeting Ivanti 0-Day Vulnerability
  • VoidLink Framework Enables Dynamic Linux Tool Deployment
  • Massive Cyberattack Targets Trusted Platforms with Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Severe Fiber v2 Vulnerability in Go Risks Security Breaches
  • Malicious Outlook Add-In Exploits Supply Chain Flaws
  • Alarming Surge in Exploits Targeting Ivanti 0-Day Vulnerability
  • VoidLink Framework Enables Dynamic Linux Tool Deployment
  • Massive Cyberattack Targets Trusted Platforms with Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark