Dutch Authorities Confirm Ivanti Zero-Day Exploit Exposed Employee Contact Data
嗯,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头,直接写描述就行。首先,我需要仔细阅读文章,理解主要信息。 文章主要讲的是荷兰的数据保护机构和司法委员会遭受了网络攻击,这些攻击利用了Ivanti Endpoint Manager Mobile的漏洞。此外,欧盟委员会和芬兰的Valtori也报告了类似的安全事件,涉及员工数据泄露。攻击者可能利用了零日漏洞,导致大量数据被访问。 接下来,我需要将这些信息浓缩到100字以内。重点包括荷兰、欧盟和芬兰的机构受到攻击,利用Ivanti EPMM漏洞,员工数据泄露,以及零日漏洞的影响。 最后,确保语言简洁明了,不使用复杂的术语,并且直接描述事件。这样用户就能快速了解文章的核心内容。 </think> 荷兰数据保护机构和司法委员会遭网络攻击,利用Ivanti EPMM漏洞,员工工作数据被泄露。欧盟委员会和芬兰Valtori也报告类似事件,涉及员工姓名、邮箱、电话等信息。攻击或与零日漏洞相关,影响可能波及5万政府员工。 2026-2-10 08:22:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Data Breach / Vulnerability

The Netherlands' Dutch Data Protection Authority (AP) and the Council for the Judiciary confirmed both agencies (Rvdr) have disclosed that their systems were impacted by cyber attacks that exploited the recently disclosed security flaws in Ivanti Endpoint Manager Mobile (EPMM), according to a notice sent to the country's parliament on Friday.

"On January 29, the National Cyber Security Center (NCSC) was informed by the supplier of vulnerabilities in EPMM," the Dutch authorities said. "EPMM is used to manage mobile devices, apps, and content, including their security."

"It is now known that work-related data of AP employees, such as names, business email addresses, and telephone numbers, have been accessed by unauthorized persons."

The development comes as the European Commission also revealed that its central infrastructure managing mobile devices "identified traces" of a cyber attack that may have resulted in access to names and mobile numbers of some of its staff members. The Commission said the incident was contained within nine hours, and that no compromise of mobile devices was detected.

"The Commission takes seriously the security and resilience of its internal systems and data and will continue to monitor the situation," it added. "It will take all necessary measures to ensure the security of its systems."

Although the name of the vendor was specified and no details were shared on how the attackers managed to gain access, it's suspected to be linked to malicious activity exploiting flaws in Ivanti EPMM.

Finland's state information and communications technology provider, Valtori, also disclosed a breach that exposed work-related details of up to 50,000 government employees. The incident, identified on January 30, 2026, targeted a zero-day vulnerability in the mobile device management service.

The agency said it installed the corrective patch on January 29, 2026, the same day Ivanti released fixes for CVE-2026-1281 and CVE-2026-1340 (CVSS scores: 9.8), which could be exploited by an attacker to achieve unauthenticated remote code execution. Ivanti has revealed that the vulnerabilities have been exploited as zero-days.

The attacker is said to have gained access to information used in operating the service, including names, work email addresses, phone numbers, and device details.

"Investigations have shown that the management system did not permanently delete removed data but only marked it as deleted," it said "As a result, device and user data belonging to all organizations that have used the service during its lifecycle may have been compromised. In certain cases, a single mobile device may have multiple users."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/dutch-authorities-confirm-ivanti-zero.html
如有侵权请联系:admin#unsafe.sh