Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Target Ivanti EPMM Devices with Hidden Backdoors

Hackers Target Ivanti EPMM Devices with Hidden Backdoors

Posted on February 9, 2026 By CWS

Ivanti Endpoint Manager Mobile (EPMM) devices are currently under attack by cybercriminals who are embedding dormant backdoors within these systems. These backdoors can remain inactive for extended periods, posing a significant security threat.

Exploitation of Critical Ivanti Vulnerabilities

Recently, Ivanti disclosed two critical vulnerabilities affecting EPMM—CVE-2026-1281 and CVE-2026-1340. These vulnerabilities involve authentication bypass and remote code execution, impacting different software packages. Despite the distinct packages, the end result is the same: attackers gain unauthenticated access to application-level endpoints.

Ivanti has issued security advisories with mitigation and patching instructions. Nonetheless, cybercriminals began exploiting these vulnerabilities shortly after their disclosure, showcasing the urgency of implementing these security measures.

Mechanism of the Dormant Backdoors

Security firm Defusedcyber observed that successful intrusions often resulted in artifacts being placed at the path /mifs/403.jsp. While the file path is familiar in Ivanti/MobileIron attacks, the payload differs. Instead of using an interactive webshell, attackers transmitted a Base64-encoded Java class file.

This Java class file acts as a dormant in-memory class loader, awaiting activation. This approach allows attackers to establish a presence without immediately executing commands, complicating detection efforts.

Operational Details and Recommendations

The implanted Java class, compiled from Info.java, does not provide typical webshell capabilities like file browsing or command execution. Instead, it waits for an activation request to run additional Java classes directly in memory. This approach minimizes detection by avoiding standard servlet methods.

Defenders should consider any indication of this activity as a potential compromise. Ivanti’s guidance recommends immediate patching of EPMM systems and restarting application servers to clear any in-memory implants. Monitoring logs for specific requests and patterns is crucial for early detection.

Despite the observed deployments, follow-on actions such as the delivery of second-stage classes remain unseen. This suggests a strategy where attackers secure access for future exploitation by different actors.

Conclusion and Future Considerations

The emergence of this threat underscores the importance of timely patching and vigilant monitoring. Organizations relying on Ivanti EPMM must act swiftly to safeguard their systems against these sophisticated attacks. As cyber threats evolve, continuous adaptation of security measures and awareness is vital to protect against future incursions.

For the latest cybersecurity updates, follow us on Google News, LinkedIn, and X. Contact us to share your stories.

Cyber Security News Tags:Backdoor, CVE-2026-1281, CVE-2026-1340, cyber threat, Cybersecurity, dormant backdoor, endpoint security, hacker tactics, IT security, Ivanti EPMM, Java class loader, malware detection, network security, security patch, vulnerability exploitation

Post navigation

Previous Post: China-Linked Group Targets Singapore Telecom in Cyber Attack
Next Post: Node.js-Powered LTX Stealer Targets User Credentials

Related Posts

UAC‑0099 Tactics, Techniques, Procedures and Attack Methods Unveiled UAC‑0099 Tactics, Techniques, Procedures and Attack Methods Unveiled Cyber Security News
Akira and Lynx Ransomware Attacking Managed Service Providers With Stolen Login Credential and Vulnerabilities Akira and Lynx Ransomware Attacking Managed Service Providers With Stolen Login Credential and Vulnerabilities Cyber Security News
AWS Organizations Mis-scoped Managed Policy Let Hackers To Take Full AWS Organization Control AWS Organizations Mis-scoped Managed Policy Let Hackers To Take Full AWS Organization Control Cyber Security News
Top 20 Most Exploited Vulnerabilities of 2025 Top 20 Most Exploited Vulnerabilities of 2025 Cyber Security News
AI Browsers Present New Security Risks with Prompt Injection AI Browsers Present New Security Risks with Prompt Injection Cyber Security News
Hackers Actively Exploiting Cisco and Citrix 0-Days in the Wild to Deploy Webshell Hackers Actively Exploiting Cisco and Citrix 0-Days in the Wild to Deploy Webshell Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark