Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Global nuclear capacity to increase by 2050

83% of Ivanti EPMM exploits are linked to a single IP on Bulletproof hosting infrastructure

Fixes zero-day exploit affecting Apple, iOS, macOS, and Apple devices

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » 83% of Ivanti EPMM exploits are linked to a single IP on Bulletproof hosting infrastructure
Identity

83% of Ivanti EPMM exploits are linked to a single IP on Bulletproof hosting infrastructure

userBy userFebruary 12, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananFebruary 12, 2026Vulnerability/Network Security

A significant portion of exploitation attempts targeting newly revealed security flaws in Ivanti Endpoint Manager Mobile (EPMM) can be traced back to a single IP address on the bulletproof hosting infrastructure provided by PROSPERO.

Threat intelligence firm GreyNoise announced that it recorded 417 exploit sessions from eight unique source IP addresses between February 1 and 9, 2026. An estimated 346 exploit sessions originated from 193.24.123.[.]42 cases, representing 83% of all attempts.

This malicious activity is designed to exploit one of the two critical security vulnerabilities in EPMM: CVE-2026-1281 (CVSS score: 9.8) and CVE-2026-1340, which can be exploited by attackers to achieve unauthenticated remote code execution. Late last month, Ivanti acknowledged that it was aware of a “very limited number of customers” who were affected by the zero-day exploit in question.

Since then, several European institutions, including the Dutch Data Protection Authority (AP) in the Netherlands, the Council of Justice, the European Commission, and Finland’s Valtri, have revealed that they were targeted by unknown attackers who exploited this vulnerability.

Further analysis revealed that the same host was simultaneously exploiting three other CVEs across unrelated software.

“IP rotates over 300 unique user agent strings across Chrome, Firefox, Safari, and multiple operating system variants,” GreyNoise said. “This fingerprint diversity, coupled with the simultaneous exploitation of four unrelated software products, is consistent with an automated tool.”

It is worth noting that PROSPERO is believed to be linked to another autonomous system called Proton66, which has a history of distributing desktop and Android malware such as GootLoader, Matanbuchus, SpyNote, Coper (aka Octo), and SocGholish.

GreyNoise also noted that 85% of exploit sessions sent a beacon via Domain Name System (DNS) to confirm that “this target is exploitable” without deploying malware or exfiltrating data.

This disclosure comes days after Defused Cyber ​​reported a “sleeper shell” campaign that deploys a dormant in-memory Java class loader on compromised EPMM instances located at the path “/mifs/403.jsp.” The cybersecurity firm said this activity is indicative of the modus operandi of an initial access broker, establishing a foothold for threat actors to later sell or transfer access for financial gain.

“The pattern is significant,” the magazine noted. “Aust” [out-of-band application security testing] The callback indicates that the campaign is cataloging vulnerable targets rather than immediately deploying the payload. This is consistent with early access operations that first verify exploitability and later introduce subsequent tools. ”

Ivanti EPMM users are encouraged to patch and audit their internet-facing mobile device management (MDM) infrastructure, review DNS logs for OAST pattern callbacks, monitor the /mifs/403.jsp path on EPMM instances, and block PROSPERO’s Autonomous System (AS200593) at the network perimeter level.

“A compromise of EPMM provides access to device management infrastructure across an organization, creating a lateral movement platform that bypasses traditional network segmentation,” GreyNoise said. “Organizations that deploy Internet-facing MDM, VPN concentrators, or other remote access infrastructure should operate under the assumption that critical vulnerabilities can be exploited within hours of disclosure.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleFixes zero-day exploit affecting Apple, iOS, macOS, and Apple devices
Next Article Global nuclear capacity to increase by 2050
user
  • Website

Related Posts

Fixes zero-day exploit affecting Apple, iOS, macOS, and Apple devices

February 12, 2026

First malicious Outlook add-in discovered that steals over 4,000 Microsoft credentials

February 11, 2026

APT36 and SideCopy launch cross-platform RAT campaign against Indian companies

February 11, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Global nuclear capacity to increase by 2050

83% of Ivanti EPMM exploits are linked to a single IP on Bulletproof hosting infrastructure

Fixes zero-day exploit affecting Apple, iOS, macOS, and Apple devices

xAI publicly announces its interplanetary ambitions

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.