Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Ivanti EPMM exploitation: Researchers warn of “sleeper” webshells
    Cybersecurity

    Ivanti EPMM exploitation: Researchers warn of “sleeper” webshells

    adminBy adminFebruary 11, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Ivanti EPMM exploitation: Researchers warn of "sleeper" webshells
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A massive wave of exploitation attempts has followed the disclosure of CVE-2026-1281, a critical pre-authentication Ivanti EPMM vulnerability, the Shadowserver Foundation has warned.

    Some of it is automated scanning for vulnerable systems, but according to Greynoise and Defused, a suspected initial access broker has been prepping unpatched instances with a “sleeper” webshell for follow-on exploitation by other threat actors.

    “On February 9, Defused Cyber reported a campaign deploying dormant in-memory Java class loaders to compromised EPMM instances at the path /mifs/403.jsp. The implants require a specific trigger parameter to activate, and no follow-on exploitation was observed at the time of their report,” Greynoise noted.

    From their own vantage point – Greynoise sensors placed in data center networks and public IP space that passively observe unsolicited internet traffic around the world – the company spotted exploitation sessons that involved payloads that “phone home via DNS to confirm “this target is exploitable.”

    “They do not deploy malware. They do not exfiltrate data. They verify access,” Greynoise researchers noted. “This is consistent with initial access operations that verify exploitability first and deploy follow-on tooling later.”

    CVE-2026-1281 exploitation picks up steam

    Ivanti disclosed CVE-2026-1281 and CVE-2026-1340, two code injection vulnerabilities in its Endpoint Manager Mobile solution, on January 29, 2026, and said that they were aware of in-the-wild exploitation. CISA added CVE-2026-1281 to its Known Exploited Vulnerabilities catalog on the same day.

    The company provided a temporary fix for the flaws (and fixed them with a patch and security updates on February 4), but on January 30, watchTowr researchers released their analysis of one of the patches.

    It was revealed last week that the Dutch Data Protection Authority (AP) and the Council for the Judiciary (Rvdr) have had their EPMM instances breached on or before January 29, likely via CVE-2026-1281, and that the European Commission’s mobile device management platform was hacked (though the solution remains unnamed).

    Another confirmed victim is Valtori, Finland’s central government ICT service center.

    Ivanti, with the help of the Dutch National Cyber Security Center (NCSC-NL) has released a detection script to help customers find evidence of exploitation in their Ivanti EPMM environment. NCSC-NL warned that all organizations using Ivanti EPMM should assume they’ve been compromised and mount a forensic investigation to check.

    Defused Cyber has shared log indicators and indicators of compromise and has advised organizations to patch their Ivanti EPMM instance, restart application servers to flush in-memory implants, and review access logs with the provided indicators.

    Subscribe to our breaking news e-mail alert to never miss out on the latest breaches, vulnerabilities and cybersecurity threats. Subscribe here!

    EPMM exploitation Ivanti researchers sleeper warn webshells
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleChatGPT Has 12% of Google’s Search Volume but Google Sends 190x More Traffic to Websites
    Next Article Why your ‘2TB’ drive only shows 1.8TB
    admin
    • Website

    Related Posts

    Data Breach at Tennessee Hospital Affects 337,000

    April 17, 2026

    [Webinar] Find and Eliminate Orphaned Non-Human Identities in Your Environment

    April 17, 2026

    CISA cancels prestigious summer internships, citing government shutdown

    April 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Taylor Sheridan’s next Paramount movie is based on a video game, not Yellowstone

    April 17, 2026

    Data Breach at Tennessee Hospital Affects 337,000

    April 17, 2026

    Gen Z Workers Pick Human-Only Output Over AI-Assisted

    April 17, 2026

    The USB trick that bypasses your smart TV’s 100Mbps Ethernet limit

    April 17, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,355)
    • Privacy & Online Earning (170)
    • SEO & Digital Marketing (832)
    • Tech Tools & Mobile / Apps (1,621)
    • WiFi / Internet & Networking (227)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Taylor Sheridan’s next Paramount movie is based on a video game, not Yellowstone

    April 17, 2026

    Data Breach at Tennessee Hospital Affects 337,000

    April 17, 2026

    Gen Z Workers Pick Human-Only Output Over AI-Assisted

    April 17, 2026
    Most Popular
    • Taylor Sheridan’s next Paramount movie is based on a video game, not Yellowstone
    • Data Breach at Tennessee Hospital Affects 337,000
    • Gen Z Workers Pick Human-Only Output Over AI-Assisted
    • The USB trick that bypasses your smart TV’s 100Mbps Ethernet limit
    • Firefox Nightly for Developers 151.0a1 APK Download by Mozilla
    • [Webinar] Find and Eliminate Orphaned Non-Human Identities in Your Environment
    • ChatGPT citations reward ranking and precision over length: Study
    • Moto G Stylus 2026 vs. Samsung Galaxy S26 Ultra: Two styluses, two price points
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.