Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Ivanti EPMM Security Flaw Exploited by Single IP Source

Ivanti EPMM Security Flaw Exploited by Single IP Source

Posted on February 12, 2026 By CWS

A newly discovered vulnerability in Ivanti Endpoint Manager Mobile (EPMM) is being heavily exploited, with most attempts traced back to a single IP address linked to a bulletproof hosting provider named PROSPERO. According to GreyNoise, a threat intelligence organization, 83% of the 417 exploitation sessions detected between February 1 and 9, 2026, originated from the IP address 193.24.123[.]42.

Exploit Details and Impact

The vulnerability in question, identified as CVE-2026-1281, holds a critical CVSS score of 9.8 and is one of two severe flaws in EPMM. The second flaw, CVE-2026-1340, also presents a risk of unauthenticated remote code execution. Ivanti has acknowledged that a limited number of customers have been affected by these zero-day exploits.

European agencies such as the Dutch Data Protection Authority, the European Commission, and Finland’s Valtori have reported being targeted by threat actors leveraging these vulnerabilities. The exploitation is characterized by the use of over 300 unique user agent strings, indicating automated tools are in play.

Connection to Broader Threat Activities

Further investigation reveals that the same IP address is engaging in attacks on three other CVEs across different software platforms. GreyNoise underscores that the automation of these attacks aligns with practices observed in other cyber threats.

PROSPERO, the hosting service tied to the IP, is linked with Proton66, an autonomous system known for distributing malicious software like GootLoader and Matanbuchus. Approximately 85% of the exploit attempts utilized the domain name system (DNS) to verify vulnerabilities without deploying malware, suggesting a focus on gathering intelligence for potential future attacks.

Protective Measures and Recommendations

In light of these findings, cybersecurity experts recommend that Ivanti EPMM users apply available patches promptly, inspect their Mobile Device Management (MDM) infrastructure, and scrutinize DNS logs for signs of exploitation activities. Monitoring the /mifs/403.jsp path on EPMM systems and blocking PROSPERO’s autonomous system (AS200593) at network perimeters is advised.

GreyNoise highlights the significant risk posed by compromised EPMM systems, which could enable lateral movement within organizational networks, bypassing traditional security measures. Organizations with internet-facing MDM or remote access systems should assume vulnerabilities will be exploited shortly after discovery.

In conclusion, the exploitation of Ivanti EPMM’s vulnerabilities by a single IP address underscores the need for heightened security measures and quick patch management to mitigate potential breaches.

The Hacker News Tags:bulletproof hosting, CVE-2026-1281, Cybersecurity, GreyNoise, initial access broker, Ivanti EPMM, PROSPERO, remote code execution, security flaw, threat intelligence

Post navigation

Previous Post: Hackers Exploit Google Calendar for AI Security Breach
Next Post: Nucleus Secures $20M for Advanced Exposure Management

Related Posts

Reynolds Ransomware Uses Vulnerable Driver to Bypass Security Reynolds Ransomware Uses Vulnerable Driver to Bypass Security The Hacker News
Researchers Expose PWA JavaScript Attack That Redirects Users to Adult Scam Apps Researchers Expose PWA JavaScript Attack That Redirects Users to Adult Scam Apps The Hacker News
Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack The Hacker News
U.S. Charges Yemeni Hacker Behind Black Kingdom Ransomware Targeting 1,500 Systems U.S. Charges Yemeni Hacker Behind Black Kingdom Ransomware Targeting 1,500 Systems The Hacker News
Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication The Hacker News
FBI Alerts Law Firms to Luna Moth’s Stealth Phishing Campaign FBI Alerts Law Firms to Luna Moth’s Stealth Phishing Campaign The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News