One threat actor responsible for 83% of recent Ivanti RCE attacks

Published: (February 14, 2026 at 11:02 AM EST)
3 min read

Source: Bleeping Computer

Ivanti header image

Overview

Threat intelligence observations show that a single threat actor is responsible for most of the active exploitation of two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE‑2026‑21962 and CVE‑2026‑24061.

Both flaws have been flagged as actively exploited in zero‑day attacks in Ivanti’s security advisory, where the company also announced hotfixes. The vulnerabilities received a critical severity rating and allow an attacker to inject code without authentication, leading to remote code execution (RCE) on vulnerable systems.

Threat Actor Activity

  • GreyNoise identified a single IP address hosted on bullet‑proof infrastructure that accounts for over 83 % of exploitation activity related to the two vulnerabilities.
  • Between February 1–9, GreyNoise observed 417 exploitation sessions from 8 unique source IPs, centered on CVE‑2026‑21962 and CVE‑2026‑24061.
  • The highest‑volume source, 193.24.123.42, is hosted by PROSPERO OOO (AS200593), a bullet‑proof autonomous system used to target various software products.

Attack source IPs – Source: GreyNoise

  • A sharp spike occurred on February 8, with 269 recorded sessions in a single day—almost 13 × the daily average of 22 sessions.
  • Of the 417 sessions, 354 (85 %) used OAST‑style DNS callbacks to verify command‑execution capability, indicating initial‑access broker activity.

Additional Indicators

  • Several published IoCs include IP addresses for Windscribe VPN (185.212.171.0/24), seen in GreyNoise telemetry scanning Oracle WebLogic instances, but not associated with Ivanti exploitation.
  • Researchers note that the PROSPERO OOO IP “is not on widely published IOC lists, meaning defenders blocking only published indicators are likely missing the dominant exploitation source.”

Exploitation Scope

The same IP address simultaneously exploited three additional vulnerabilities:

VulnerabilityProductSessions
CVE‑2026‑21962Oracle WebLogic2,902
CVE‑2026‑24061GNU Inetutils Telnetd497
CVE‑2025‑24799GLPI(not specified)

Exploitation activity appears fully automated, rotating between 300 user agents.

Targeted vulnerabilities – Source: GreyNoise

Mitigation Recommendations

  • Ivanti’s interim fixes for CVE‑2026‑1281 and CVE‑2026‑1340 are not permanent. The company plans to release complete patches in the first quarter of this year with EPMM version 12.8.0.0.

  • Until the full patch is available, it is recommended to use the following RPM packages:

    • RPM 12.x.0.x for EPMM versions 12.5.0.x, 12.6.0.x, and 12.7.0.x
    • RPM 12.x.1.x for EPMM versions 12.5.1.0 and 12.6.1.0

    (See Ivanti’s security advisory for details.)

  • The vendor suggests the most conservative approach: build a replacement EPMM instance and migrate all data. Instructions are available here.

0 views
Back to Blog

Related posts

Read more »