Hackers Exploiting Ivanti EPMM Devices to Deploy Dormant Backdoors

0
9

Hackers are actively exploiting Ivanti Endpoint Manager Mobile (EPMM) appliances to plant “dormant” backdoors that can sit unused for days or weeks.

Ivanti recently disclosed two critical EPMM flaws, CVE-2026-1281 and CVE-2026-1340, spanning authentication bypass and remote code execution in different packages (aftstore and appstore).

While the packages differ, defenders face the same practical impact: unauthenticated access to application-level endpoints. Ivanti has published mitigation and patching guidance in its security advisory, but exploitation in the wild followed shortly after disclosure.

Across observed intrusions by Defusedcyber tied to this latest wave, successful exploitation consistently resulted in a dropped artifact at the path /mifs/403.jsp. The filename and location are not new in Ivanti/MobileIron targeting; what’s different is the payload’s purpose.

Instead of deploying an interactive webshell capable of command execution, the attackers delivered a Base64-encoded Java class file via HTTP parameters. Each decoded payload contained valid Java bytecode (the CAFEBABE class header), functioning as a dormant in-memory class loader rather than an immediately usable backdoor.

This distinction matters operationally: traditional webshell hunting often keys on follow-on commands and filesystem artifacts. Here, the attacker’s workflow prioritized “land and confirm,” not “land and operate.”

The implanted class has been observed as base.Info (compiled from Info.java). It does not expose file browsing, command execution, or a typical operator console. Instead, it waits for a later “activation” request that delivers a second Java class, which the loader then runs directly in memory.

Notably, the loader uses equals(Object) as an entry point rather than standard servlet methods like doGet or doPost, a choice that can reduce friction with simplistic detections.

It extracts HttpServletRequest and HttpServletResponse from the supplied object (with fallbacks for PageContext and servlet wrapper/facade patterns), increasing portability across Java web container implementations.

When triggered, the loader checks for an HTTP parameter named k0f53cf964d387. If present, it strips a two-character prefix, Base64-decodes the remaining value into raw bytes, and reflectively calls ClassLoader#defineClass to load the second-stage class without writing to disk.

The loader instantiates the resulting class with basic host context and returns the class’s toString() output to the requester, wrapped in fixed delimiters (3cd3d and e60537) and served as text/html—a format that is easy for automated tooling to parse. For Base64 decoding, it supports both java.util.Base64 (Java 8+) and sun.misc.BASE64Decoder for older JVMs.

Before handing off control, the loader fingerprints the host (for example, user.dir, filesystem roots, OS name, and username) and passes that data to the second-stage class likely to help an operator quickly orient on a target later.

Across all observed cases by Defusedcyber, the loader was deployed and verified, but did not observe follow-on requests supplying a second-stage class. That “implant now, operate later” pattern aligns with initial access broker behavior, where one actor establishes dependable access at scale and another actor later monetizes or weaponizes it from a different infrastructure.

Shadowserver observed that attackers deploy a webshell on Ivanti EPMM devices, possibly exploiting CVE-2026-1281 Vulnerability. According to the scans, 56 IPs were found compromised.

Defenders should treat any evidence of this activity as a compromise or attempted compromise, especially if there is no immediate post-exploitation.

  • Patch EPMM immediately per Ivanti guidance, then restart affected application servers to flush in-memory implants (critical because the loader never needs to touch disk)
  • Review logs for requests to /mifs/403.jsp, especially with the parameter k0f53cf964d387 (example pattern: GET /mifs/403.jsp?...k0f53cf964d387=<2 chars><base64>)
  • Hunt for responses containing the delimiter pair 3cd3d and e60537
  • Treat detections as time-sensitive, even if the environment appears “stable”; the access may simply be unactivated

Indicators of Compromise

Artifact Details

Field Value
Class Name base[.]Info
Source File Info[.]java
SHA-256 097b051c9c9138ada0d2a9fb4dfe463d358299d4bd0e81a1db2f69f32578747a

Network IOCs – Source IP Addresses

IP Address Organization ASN
104.219.171[.]96 Datacamp Limited AS212238
108.64.229[.]100 AT&T Enterprises, LLC AS7018
115.167.65[.]16 NTT America, Inc. AS2914
138.36.92[.]162 HOSTINGFOREX S.A. AS265645
146.103.53[.]35 Datacamp Limited AS212238
148.135.183[.]63 Datacamp Limited AS212238
151.247.221[.]59 Datacamp Limited AS212238
166.0.83[.]171 UK Dedicated Servers Limited AS42831
172.59.92[.]152 T-Mobile USA, Inc. AS21928
185.240.120[.]91 Datacamp Limited AS212238
185.239.140[.]40 Datacamp Limited AS212238
194.35.226[.]128 LeaseWeb Netherlands B.V. AS60781
193.41.68[.]58 LeaseWeb Netherlands B.V. AS60781
77.78.79[.]243 SPCom s.r.o. AS204383
62.84.168[.]208 Hydra Communications Ltd AS25369
45.66.95[.]235 Hydra Communications Ltd AS25369
46.34.44[.]66 Liberty Global Europe Holding B.V. AS6830

Detection Patterns

Indicator Type Pattern
File Path /mifs/403[.]jsp
HTTP Parameter k0f53cf964d387
Response Delimiters 3cd3d and e60537
Request Pattern GET /mifs/403.jsp?...k0f53cf964d387=<2 chars><base64>
Java Class Header CAFEBABE (in Base64-decoded payload)

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post Hackers Exploiting Ivanti EPMM Devices to Deploy Dormant Backdoors appeared first on Cyber Security News.

– Read more