Built For & By Cyber Security Professionals
HomeCyber AttacksIvanti EPMM Exploitation: Single Bulletproof IP Driving Attacks While IOC Lists Mislead
Ivanti EPMM Exploitation: Single Bulletproof IP Driving Attacks While IOC Lists Mislead

Ivanti EPMM Exploitation: Single Bulletproof IP Driving Attacks While IOC Lists Mislead

Spread the word

The cybersecurity community is facing a stark reminder of how fast attackers move and how fragile IOC‑based defenses can be. In February 2026, GreyNoise observed active exploitation of Ivanti Endpoint Manager Mobile (EPMM) vulnerabilities. Shockingly, 83% of attacks came from one bulletproof IP address—yet this IP was missing from widely circulated IOC lists. Instead, defenders were blocking VPN exit nodes and compromised residential routers that showed no Ivanti activity.

This blog dives into the technical details, exploitation timeline, and why organizations must rethink their reliance on IOCs for defense.

 

The Vulnerabilities

Two critical Ivanti EPMM flaws were disclosed on January 29, 2026:

That same day:

  • Ivanti published its advisory.
  • CISA added CVE‑2026‑1281 to the Known Exploited Vulnerabilities catalog with a three‑day remediation deadline.
  • Dutch authorities confirmed compromise of government systems.
  • Proof‑of‑concept code appeared on GitHub.

By the time most organizations saw the advisory, exploitation was already underway.

The Observations

Between February 1–9, It was recorded with 417 exploitation sessions from 8 IPs. One IP dominated:

  • 193[.]24[.]123[.]42 (AS200593, PROSPERO OOO): 346 sessions (83%), hosted on bulletproof infrastructure.
  • Other IPs: 71 sessions combined, spread across Netherlands, US, and Hong Kong.

On February 8, activity spiked to 269 sessions in a single day—13× the prior daily average.

Multi‑CVE Exploitation

The dominant IP was not Ivanti‑specific. It simultaneously exploited multiple CVEs:

CVE Target Software Sessions
CVE‑2026‑21962 Oracle WebLogic 2,902
CVE‑2026‑24061 GNU Inetutils Telnetd 497
CVE‑2026‑1281 Ivanti EPMM 346
CVE‑2025‑24799 GLPI IT Asset Management 200

This breadth of exploitation, combined with rotating user agents, indicates automated tooling rather than manual attacks.

IOC Misalignment

Widely shared IOCs pointed elsewhere:

  • Windscribe VPN exit nodes: 29,588 sessions in 30 days, 99% targeting Oracle WebLogic, zero Ivanti exploitation.
  • Compromised residential router in Sweden: No GreyNoise sessions, suggesting targeted use only.

Defenders blocking only these IOCs risked missing the true exploitation source.

Tradecraft: Initial Access Broker Behavior

It was found 85% of payloads used DNS callbacks (OAST) to verify exploitability without deploying malware. Defused Cyber corroborated with reports of sleeper shells at /mifs/403.jsp, consistent with initial access broker tradecraft: catalog vulnerable systems, establish footholds, and monetize later.

Strategic Implications

  • IOC confidence problem: Shared VPN IPs carry high false‑positive risk; bulletproof hosting IPs show concentrated malicious activity.
  • Compressed exploitation timeline: Same‑day disclosure, government compromise, and proof‑of‑concept release left no buffer for weekend patch cycles.
  • MDM platforms as critical infrastructure: Compromise of EPMM provides organization‑wide device management access, akin to domain controllers.

Recommendations

For Security Leadership

  • Audit whether MDM infrastructure is internet‑facing.
  • Enrich IOC workflows with infrastructure context before blocklisting.
  • Investigate if Ivanti EPMM was unpatched during the exposure window.

For Security Operations

  • Block AS200593 (PROSPERO OOO) at the perimeter.
  • Review DNS logs for OAST callbacks.
  • Monitor for /mifs/403.jsp sleeper shells.
  • Restart EPMM servers to clear in‑memory implants.

For Administrators

  • Patch CVE‑2026‑1281 and CVE‑2026‑1340 immediately.
  • Investigate for compromise indicators: unexpected files, anomalous DNS activity, unauthorized device enrollments.
  • Restrict internet access to EPMM where feasible.

Conclusion

The Ivanti EPMM exploitation campaign demonstrates that not all IOCs are created equal. Shared VPN nodes may look threatening but carry high false‑positive risk, while bulletproof hosting infrastructure often represents the true source of exploitation. Defenders must move beyond blind IOC ingestion and adopt context‑aware strategies that prioritize infrastructure type, observed behavior, and exploitation concentration.

Follow Us On – X.comTelegram, LinkedIN, Discord Server,

 

For The Latest Updates, Vulnerability Insights, Security News, Cyberattack Scoops And Cybersecurity Best Practices Delivered Straight To Your Inbox – Subscribe To Our Newsletter