Connect with us

Security

The Dominance of a Single Threat Actor in Ivanti RCE Attacks

Published

on

One Threat Actor Responsible for 83% of Recent Ivanti RCE Attacks

Recent threat intelligence indicates that a single threat actor is behind the majority of active exploitation of critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), specifically CVE-2026-21962 and CVE-2026-24061.

These vulnerabilities have been actively exploited in zero-day attacks, prompting Ivanti to issue security advisories and provide hotfixes to address the issues.

Both vulnerabilities have been classified as critical, allowing attackers to execute code without authentication, potentially leading to remote code execution (RCE) on vulnerable systems.

Wiz

An IP address hosted on bulletproof infrastructure has been identified as the source of over 83% of exploitation activities related to these vulnerabilities, according to GreyNoise, a threat-focused internet intelligence company.

Between February 1st and 9th, GreyNoise observed 417 exploitation sessions originating from 8 unique source IP addresses, primarily targeting CVE-2026-21962 and CVE-2026-24061.

On February 8, a significant spike occurred with 269 recorded sessions in a single day, nearly 13 times the daily average. The majority of the exploitation sessions utilized OAST-style DNS callbacks to validate command execution capability, indicating initial access broker activity.

Interestingly, while some indicators of compromise (IoCs) include IP addresses associated with Windscribe VPN, no Ivanti exploitation activity was detected. This suggests that defenders relying solely on published indicators may overlook the primary source of exploitation.

The identified IP address was not limited to targeting Ivanti, as it also exploited vulnerabilities in Oracle WebLogic, GNU Inetutils Telnetd, and GLPI simultaneously.

While Ivanti has released fixes for CVE-2026-1281 and CVE-2026-1340, the company plans to issue complete patches with the release of EPMM version 12.8.0.0 in the first quarter of this year.

See also  Concealed Threat: Russian Hackers Exploit Hyper-V to Disguise Malware in Linux Virtual Machines

Until then, users are advised to utilize specific RPM packages based on their EPMM versions and consider building a replacement instance for enhanced security.

Targeted vulnerabilities
Targeted vulnerabilities
Source: GreyNoise

Analysis of the exploitation activity reveals a highly automated process utilizing a variety of user agents and focusing on multiple vulnerabilities across different software products.

tines

Modern IT infrastructure moves faster than manual workflows can handle.

Discover how your team can reduce delays, improve reliability, and scale workflows with automated responses in the new Tines guide.

Trending