Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Target Ivanti EPMM Devices with Hidden Backdoors

Hackers Target Ivanti EPMM Devices with Hidden Backdoors

Posted on February 9, 2026 By CWS

Ivanti Endpoint Manager Mobile (EPMM) devices are currently under attack by cybercriminals who are embedding dormant backdoors within these systems. These backdoors can remain inactive for extended periods, posing a significant security threat.

Exploitation of Critical Ivanti Vulnerabilities

Recently, Ivanti disclosed two critical vulnerabilities affecting EPMM—CVE-2026-1281 and CVE-2026-1340. These vulnerabilities involve authentication bypass and remote code execution, impacting different software packages. Despite the distinct packages, the end result is the same: attackers gain unauthenticated access to application-level endpoints.

Ivanti has issued security advisories with mitigation and patching instructions. Nonetheless, cybercriminals began exploiting these vulnerabilities shortly after their disclosure, showcasing the urgency of implementing these security measures.

Mechanism of the Dormant Backdoors

Security firm Defusedcyber observed that successful intrusions often resulted in artifacts being placed at the path /mifs/403.jsp. While the file path is familiar in Ivanti/MobileIron attacks, the payload differs. Instead of using an interactive webshell, attackers transmitted a Base64-encoded Java class file.

This Java class file acts as a dormant in-memory class loader, awaiting activation. This approach allows attackers to establish a presence without immediately executing commands, complicating detection efforts.

Operational Details and Recommendations

The implanted Java class, compiled from Info.java, does not provide typical webshell capabilities like file browsing or command execution. Instead, it waits for an activation request to run additional Java classes directly in memory. This approach minimizes detection by avoiding standard servlet methods.

Defenders should consider any indication of this activity as a potential compromise. Ivanti’s guidance recommends immediate patching of EPMM systems and restarting application servers to clear any in-memory implants. Monitoring logs for specific requests and patterns is crucial for early detection.

Despite the observed deployments, follow-on actions such as the delivery of second-stage classes remain unseen. This suggests a strategy where attackers secure access for future exploitation by different actors.

Conclusion and Future Considerations

The emergence of this threat underscores the importance of timely patching and vigilant monitoring. Organizations relying on Ivanti EPMM must act swiftly to safeguard their systems against these sophisticated attacks. As cyber threats evolve, continuous adaptation of security measures and awareness is vital to protect against future incursions.

For the latest cybersecurity updates, follow us on Google News, LinkedIn, and X. Contact us to share your stories.

Cyber Security News Tags:Backdoor, CVE-2026-1281, CVE-2026-1340, cyber threat, Cybersecurity, dormant backdoor, endpoint security, hacker tactics, IT security, Ivanti EPMM, Java class loader, malware detection, network security, security patch, vulnerability exploitation

Post navigation

Previous Post: China-Linked Group Targets Singapore Telecom in Cyber Attack
Next Post: Node.js-Powered LTX Stealer Targets User Credentials

Related Posts

EU Parliament Disables AI on Devices Due to Security Risks EU Parliament Disables AI on Devices Due to Security Risks Cyber Security News
BlackSuit Ransomware’s Data Leak and Negotiation Portal Seized BlackSuit Ransomware’s Data Leak and Negotiation Portal Seized Cyber Security News
Russian Cybercrime Market Hub Transferring from RDP Access to Malware Stealer Logs to Access Russian Cybercrime Market Hub Transferring from RDP Access to Malware Stealer Logs to Access Cyber Security News
Ubiquiti UniFi Protect Camera Vulnerability Allows Remote Code Execution Ubiquiti UniFi Protect Camera Vulnerability Allows Remote Code Execution Cyber Security News
UTG-Q-1000 Group Weaponizing Subsidy Schemes to Exfiltrate Sensitive Data UTG-Q-1000 Group Weaponizing Subsidy Schemes to Exfiltrate Sensitive Data Cyber Security News
Microsoft Security Keys May Require PIN After Recent Windows Updates Microsoft Security Keys May Require PIN After Recent Windows Updates Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark