Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Target Ivanti EPMM Devices with Hidden Backdoors

Hackers Target Ivanti EPMM Devices with Hidden Backdoors

Posted on February 9, 2026 By CWS

Ivanti Endpoint Manager Mobile (EPMM) devices are currently under attack by cybercriminals who are embedding dormant backdoors within these systems. These backdoors can remain inactive for extended periods, posing a significant security threat.

Exploitation of Critical Ivanti Vulnerabilities

Recently, Ivanti disclosed two critical vulnerabilities affecting EPMM—CVE-2026-1281 and CVE-2026-1340. These vulnerabilities involve authentication bypass and remote code execution, impacting different software packages. Despite the distinct packages, the end result is the same: attackers gain unauthenticated access to application-level endpoints.

Ivanti has issued security advisories with mitigation and patching instructions. Nonetheless, cybercriminals began exploiting these vulnerabilities shortly after their disclosure, showcasing the urgency of implementing these security measures.

Mechanism of the Dormant Backdoors

Security firm Defusedcyber observed that successful intrusions often resulted in artifacts being placed at the path /mifs/403.jsp. While the file path is familiar in Ivanti/MobileIron attacks, the payload differs. Instead of using an interactive webshell, attackers transmitted a Base64-encoded Java class file.

This Java class file acts as a dormant in-memory class loader, awaiting activation. This approach allows attackers to establish a presence without immediately executing commands, complicating detection efforts.

Operational Details and Recommendations

The implanted Java class, compiled from Info.java, does not provide typical webshell capabilities like file browsing or command execution. Instead, it waits for an activation request to run additional Java classes directly in memory. This approach minimizes detection by avoiding standard servlet methods.

Defenders should consider any indication of this activity as a potential compromise. Ivanti’s guidance recommends immediate patching of EPMM systems and restarting application servers to clear any in-memory implants. Monitoring logs for specific requests and patterns is crucial for early detection.

Despite the observed deployments, follow-on actions such as the delivery of second-stage classes remain unseen. This suggests a strategy where attackers secure access for future exploitation by different actors.

Conclusion and Future Considerations

The emergence of this threat underscores the importance of timely patching and vigilant monitoring. Organizations relying on Ivanti EPMM must act swiftly to safeguard their systems against these sophisticated attacks. As cyber threats evolve, continuous adaptation of security measures and awareness is vital to protect against future incursions.

For the latest cybersecurity updates, follow us on Google News, LinkedIn, and X. Contact us to share your stories.

Cyber Security News Tags:Backdoor, CVE-2026-1281, CVE-2026-1340, cyber threat, Cybersecurity, dormant backdoor, endpoint security, hacker tactics, IT security, Ivanti EPMM, Java class loader, malware detection, network security, security patch, vulnerability exploitation

Post navigation

Previous Post: China-Linked Group Targets Singapore Telecom in Cyber Attack
Next Post: Node.js-Powered LTX Stealer Targets User Credentials

Related Posts

APT-C-35 Infrastructure Activity Leveraged Using Apache HTTP Response Indicators APT-C-35 Infrastructure Activity Leveraged Using Apache HTTP Response Indicators Cyber Security News
Reddit to Block Internet Archive as AI Companies Have Scraped Data From Wayback Machine Reddit to Block Internet Archive as AI Companies Have Scraped Data From Wayback Machine Cyber Security News
Cloud Atlas Hacker Group Exploiting Office Vulnerabilities to Execute Malicious Code Cloud Atlas Hacker Group Exploiting Office Vulnerabilities to Execute Malicious Code Cyber Security News
INE Security Partners with Abadnet Institute for Cybersecurity Training Programs in Saudi Arabia INE Security Partners with Abadnet Institute for Cybersecurity Training Programs in Saudi Arabia Cyber Security News
Windows 11 New Security Feature Denies Unauthorized Access to System Files Windows 11 New Security Feature Denies Unauthorized Access to System Files Cyber Security News
Threat Actors Leveraging Senior Travel Scams to Deliver Datzbro Malware Threat Actors Leveraging Senior Travel Scams to Deliver Datzbro Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News