83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructure
嗯,用户让我用中文帮他总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要仔细阅读这篇文章,理解主要内容。 文章主要讲的是Ivanti EPMM的一个安全漏洞被利用的情况。攻击者来自一个特定的IP地址,使用了PROSPERO的服务器。GreyNoise监测到很多次攻击尝试,大部分来自同一个IP。这个漏洞评分很高,CVSS 9.8分,属于严重漏洞。 此外,攻击者还利用了其他软件的漏洞,比如Oracle和GNU的软件。他们使用了多种用户代理字符串来掩盖攻击行为。PROSPERO还与分发恶意软件有关联。 总结的时候要抓住关键点:Ivanti EPMM漏洞、攻击来源、高CVSS评分、多软件漏洞利用、自动化工具、PROSPERO关联以及建议措施。 接下来,我要把这些信息浓缩到100字以内,确保内容准确且简洁。不需要用“这篇文章总结”这样的开头,直接描述内容即可。 最后检查一下字数和内容是否符合要求。 </think> Ivanti EPMM的两个关键漏洞CVE-2026-1281和CVE-2026-1340被广泛利用,其中大部分攻击来自一个特定IP地址。攻击者同时针对其他软件漏洞展开攻击,并使用自动化工具掩盖痕迹。建议用户修补漏洞、审计MDM基础设施并阻止相关服务器连接以防范风险。 2026-2-12 07:32:0 Author: thehackernews.com(查看原文) 阅读量:1 收藏

Vulnerability / Network Security

A significant chunk of the exploitation attempts targeting a newly disclosed security flaw in Ivanti Endpoint Manager Mobile (EPMM) can be traced back to a single IP address on bulletproof hosting infrastructure offered by PROSPERO.

Threat intelligence firm GreyNoise said it recorded 417 exploitation sessions from 8 unique source IP addresses between February 1 and 9, 2026. An estimated 346 exploitation sessions have originated from 193.24.123[.]42, accounting for 83% of all attempts.

The malicious activity is designed to exploit CVE-2026-1281 (CVSS scores: 9.8), one of the two critical security vulnerabilities in EPMM, along with CVE-2026-1340 that could be exploited by an attacker to achieve unauthenticated remote code execution. Late last month, Ivanti acknowledged it's aware of a "very limited number of customers" who were impacted following the zero-day exploitation of the issues.

Since then, multiple European agencies, including the Netherlands' Dutch Data Protection Authority (AP), Council for the Judiciary, the European Commission, and Finland's Valtori, have disclosed that they were targeted by unknown threat actors using the vulnerabilities.

Further analysis has revealed that the same host has been simultaneously exploiting three other CVEs across unrelated software -

"The IP rotates through 300+ unique user agent strings spanning Chrome, Firefox, Safari, and multiple operating system variants," GreyNoise said. "This fingerprint diversity, combined with concurrent exploitation of four unrelated software products, is consistent with automated tooling."

It's worth noting that PROSPERO is assessed to be linked to another autonomous system called Proton66, which has a history of distributing desktop and Android malware like GootLoader, Matanbuchus, SpyNote, Coper (aka Octo), and SocGholish.

GreyNoise also pointed out that 85% of the exploitation sessions beaconed home via the domain name system (DNS) to confirm "this target is exploitable" without deploying any malware or exfiltrating data.

The disclosure comes days after Defused Cyber reported a "sleeper shell" campaign that deployed a dormant in-memory Java class loader to compromised EPMM instances at the path "/mifs/403.jsp." The cybersecurity company said the activity is indicative of initial access broker tradecraft, where threat actors establish a foothold to sell or hand off access later for financial gain.

"That pattern is significant," it noted. "OAST [out-of-band application security testing] callbacks indicate the campaign is cataloging which targets are vulnerable rather than deploying payloads immediately. This is consistent with initial access operations that verify exploitability first and deploy follow-on tooling later."

Ivanti EPMM users are recommended to apply the patches, audit internet-facing Mobile Device Management (MDM) infrastructure, review DNS logs for OAST-pattern callbacks, and monitor for the /mifs/403.jsp path on EPMM instances, and block PROSPERO's autonomous system (AS200593) at the network perimeter level.

"EPMM compromise provides access to device management infrastructure for entire organizations, creating a lateral movement platform that bypasses traditional network segmentation," GreyNoise said. "Organizations with internet-facing MDM, VPN concentrators, or other remote access infrastructure should operate under the assumption that critical vulnerabilities face exploitation within hours of disclosure."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/83-of-ivanti-epmm-exploits-linked-to.html
如有侵权请联系:admin#unsafe.sh