Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Ivanti EPMM Exploited by Single IP with RCE Vulnerability

Ivanti EPMM Exploited by Single IP with RCE Vulnerability

Posted on February 16, 2026 By CWS

A major security flaw in Ivanti Endpoint Manager Mobile (EPMM), identified as CVE-2026-1281, is currently being exploited at a significant rate. Recent data from GreyNoise indicates that a staggering 83% of these attacks can be traced back to a single IP address: 193[.]24[.]123[.]42.

Primary Exploiting IP and Its Characteristics

The IP in question is associated with PROSPERO OOO (AS200593) and has been characterized as offering “bulletproof” hosting by Censys. It is noteworthy that this IP was absent from several of the initial indicators of compromise (IOCs) provided to cybersecurity defenders.

The exploitation of Ivanti EPMM is predominantly driven by this IP, which underscores the need for vigilance among organizations using the affected software.

Understanding the Vulnerabilities

The critical vulnerability, CVE-2026-1281, has a CVSS score of 9.8 and allows unauthorized attackers to execute commands by manipulating Bash arithmetic expansion within backend scripts. In addition to this, another vulnerability, CVE-2026-1340, presents a similar risk in a different component of the EPMM system.

On January 29, Ivanti issued a security advisory regarding these vulnerabilities. Shortly thereafter, the Cybersecurity and Infrastructure Security Agency (CISA) included CVE-2026-1281 in its catalog of Known Exploited Vulnerabilities, highlighting the urgency of addressing these issues.

Impact and Patterns of Attack

Between February 1 and 9, GreyNoise recorded 417 distinct exploitation attempts involving eight different IP addresses. Notably, February 8 saw 269 exploitation sessions, markedly higher than the preceding daily averages.

The primary IP, 193[.]24[.]123[.]42, has also been implicated in attacks on Oracle WebLogic Server, GNU Inetutils telnetd, and GLPI. The use of numerous user-agent strings suggests a strategy of automated mass exploitation.

Challenges in Detection and Mitigation

Many shared IOCs did not align with data on Ivanti exploitation. For example, although Windscribe VPN exit nodes generated significant traffic, they did not target Ivanti EPMM specifically. Similarly, a residential router was identified with limited activity.

Organizations focusing on blocking only these VPN or residential IPs may overlook the primary threat source, which is the AS200593 network.

Furthermore, approximately 85% of observed payloads employed DNS callbacks for code execution confirmation without immediately deploying malware. This behavior aligns with tactics used by initial access brokers, suggesting a sophisticated level of threat.

Additionally, “sleeper” webshells located at /mifs/403.jsp might persist undetected in systems even after patching, if attackers had prior access.

Stay informed on the latest cybersecurity developments by following us on Google News, LinkedIn, and X. For those interested in sharing their stories, please get in touch with us.

Cyber Security News Tags:CISA, CVE-2026-1281, Cybersecurity, Dutch authorities, GreyNoise, Ivanti EPMM, Oracle WebLogic Server, PROSPERO OOO, RCE vulnerability, single IP attack

Post navigation

Previous Post: CISA Faces Challenges Amid DHS Shutdown
Next Post: ZeroDayRAT Spyware Threatens Android and iOS Security

Related Posts

Chinese APT Hackers Exploit Router Vulnerabilities to Infiltrate Enterprise Environments Chinese APT Hackers Exploit Router Vulnerabilities to Infiltrate Enterprise Environments Cyber Security News
New ZuRu Malware Variant Attacking macOS Users Via Weaponized Termius App New ZuRu Malware Variant Attacking macOS Users Via Weaponized Termius App Cyber Security News
Top 10 High-Risk Vulnerabilities Of 2025 that Exploited in the Wild Top 10 High-Risk Vulnerabilities Of 2025 that Exploited in the Wild Cyber Security News
Hackers Exploiting RMM Tools LogMeIn and PDQ Connect to Deploy Malware as a Normal Program Hackers Exploiting RMM Tools LogMeIn and PDQ Connect to Deploy Malware as a Normal Program Cyber Security News
Moltbook AI Vulnerability Exposes Email Addresses, Login Tokens, and API Keys Moltbook AI Vulnerability Exposes Email Addresses, Login Tokens, and API Keys Cyber Security News
Microsoft Enhances Windows Security by Turning Off File Previews for Downloads Microsoft Enhances Windows Security by Turning Off File Previews for Downloads Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • LockBit 5.0 Targets Multiple Systems with Enhanced Ransomware
  • Cloud Password Managers Face Security Challenges
  • Noodlophile Malware Uses Fake Jobs to Evade Security
  • Infostealer Targets OpenClaw AI, Exposes Security Flaws
  • AI Assistants Vulnerable to Hidden Memory Manipulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • LockBit 5.0 Targets Multiple Systems with Enhanced Ransomware
  • Cloud Password Managers Face Security Challenges
  • Noodlophile Malware Uses Fake Jobs to Evade Security
  • Infostealer Targets OpenClaw AI, Exposes Security Flaws
  • AI Assistants Vulnerable to Hidden Memory Manipulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News