Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructure
    Cybersecurity

    83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructure

    adminBy adminFebruary 12, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructure
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ravie LakshmananFeb 12, 2026Vulnerability / Network Security

    A significant chunk of the exploitation attempts targeting a newly disclosed security flaw in Ivanti Endpoint Manager Mobile (EPMM) can be traced back to a single IP address on bulletproof hosting infrastructure offered by PROSPERO.

    Threat intelligence firm GreyNoise said it recorded 417 exploitation sessions from 8 unique source IP addresses between February 1 and 9, 2026. An estimated 346 exploitation sessions have originated from 193.24.123[.]42, accounting for 83% of all attempts.

    The malicious activity is designed to exploit CVE-2026-1281 (CVSS scores: 9.8), one of the two critical security vulnerabilities in EPMM, along with CVE-2026-1340 that could be exploited by an attacker to achieve unauthenticated remote code execution. Late last month, Ivanti acknowledged it’s aware of a “very limited number of customers” who were impacted following the zero-day exploitation of the issues.

    Since then, multiple European agencies, including the Netherlands’ Dutch Data Protection Authority (AP), Council for the Judiciary, the European Commission, and Finland’s Valtori, have disclosed that they were targeted by unknown threat actors using the vulnerabilities.

    Further analysis has revealed that the same host has been simultaneously exploiting three other CVEs across unrelated software –

    “The IP rotates through 300+ unique user agent strings spanning Chrome, Firefox, Safari, and multiple operating system variants,” GreyNoise said. “This fingerprint diversity, combined with concurrent exploitation of four unrelated software products, is consistent with automated tooling.”

    It’s worth noting that PROSPERO is assessed to be linked to another autonomous system called Proton66, which has a history of distributing desktop and Android malware like GootLoader, Matanbuchus, SpyNote, Coper (aka Octo), and SocGholish.

    GreyNoise also pointed out that 85% of the exploitation sessions beaconed home via the domain name system (DNS) to confirm “this target is exploitable” without deploying any malware or exfiltrating data.

    The disclosure comes days after Defused Cyber reported a “sleeper shell” campaign that deployed a dormant in-memory Java class loader to compromised EPMM instances at the path “/mifs/403.jsp.” The cybersecurity company said the activity is indicative of initial access broker tradecraft, where threat actors establish a foothold to sell or hand off access later for financial gain.

    “That pattern is significant,” it noted. “OAST [out-of-band application security testing] callbacks indicate the campaign is cataloging which targets are vulnerable rather than deploying payloads immediately. This is consistent with initial access operations that verify exploitability first and deploy follow-on tooling later.”

    Ivanti EPMM users are recommended to apply the patches, audit internet-facing Mobile Device Management (MDM) infrastructure, review DNS logs for OAST-pattern callbacks, and monitor for the /mifs/403.jsp path on EPMM instances, and block PROSPERO’s autonomous system (AS200593) at the network perimeter level.

    “EPMM compromise provides access to device management infrastructure for entire organizations, creating a lateral movement platform that bypasses traditional network segmentation,” GreyNoise said. “Organizations with internet-facing MDM, VPN concentrators, or other remote access infrastructure should operate under the assumption that critical vulnerabilities face exploitation within hours of disclosure.”

    Bulletproof EPMM Exploits Hosting infrastructure Ivanti linked single
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleGoogle outlines AI-powered, agent-driven future for shopping and ads in 2026
    Next Article XClub 5.1.8.2.2 APK Download by Transsion Holdings
    admin
    • Website

    Related Posts

    Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

    March 3, 2026

    Fig Security emerges from stealth with $38 million to resilience-proof enterprise security

    March 3, 2026

    Pro-Russia actors team with Iran-linked hackers in attacks

    March 3, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

    March 3, 2026

    Fig Security emerges from stealth with $38 million to resilience-proof enterprise security

    March 3, 2026

    EFF to Supreme Court: Shut Down Unconstitutional Geofence Searches

    March 3, 2026

    SEO’s 5 Stages of Grief (And How to Adapt to AI SEO)

    March 3, 2026
    Categories
    • Blogging (32)
    • Cybersecurity (582)
    • Privacy & Online Earning (83)
    • SEO & Digital Marketing (364)
    • Tech Tools & Mobile / Apps (717)
    • WiFi / Internet & Networking (103)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

    March 3, 2026

    Fig Security emerges from stealth with $38 million to resilience-proof enterprise security

    March 3, 2026

    EFF to Supreme Court: Shut Down Unconstitutional Geofence Searches

    March 3, 2026
    Most Popular
    • Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
    • Fig Security emerges from stealth with $38 million to resilience-proof enterprise security
    • EFF to Supreme Court: Shut Down Unconstitutional Geofence Searches
    • SEO’s 5 Stages of Grief (And How to Adapt to AI SEO)
    • I finally have full control of my Bambu Lab printer, but it meant ditching Bambu’s cloud
    • Pro-Russia actors team with Iran-linked hackers in attacks
    • 8 Best Student Checking Accounts of March 2026
    • Builderius WordPress Page Builder Integrates Claude AI
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.