Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Microsoft Fixes Six Zero Day Vulnerability in February Patch Tuesday

February 11, 2026

Learn What to Build, Buy, and Automate

February 11, 2026

Singapore Takes Down Chinese Hackers Targeting Telco Networks

February 11, 2026
Facebook X (Twitter) Instagram
Wednesday, February 11
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»European Governments Breached in Zero-Day Attacks Targeting Ivanti
News

European Governments Breached in Zero-Day Attacks Targeting Ivanti

Team-CWDBy Team-CWDFebruary 10, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Several European government institutions appear to have been targeted in a coordinated campaign designed to steal data on mobile users, it has emerged.

First reported late last week, the incidents occurred at the European Commission, the Finnish government, and at least two Dutch government agencies. Tens of thousands of users may have had their personal details exposed.

Only the Dutch authorities named the likely target – Ivanti Endpoint Manager Mobile (EPMM) – which has previously been compromised by likely Chinese state actors in attacks on the Norwegian government.

However, the timing would suggest a link between all three breaches.

Read more on Ivanti EPMM: Two Ivanti Zero-Days Actively Exploited in the Wild

The European Commission released a brief statement on Friday February 6 explaining that its “central infrastructure managing mobile devices” had discovered signs of a breach on January 30. This “may have resulted in access to staff names and mobile numbers of some of its staff members,” it added.

“The commission’s swift response ensured the incident was contained and the system cleaned within nine hours,” the statement continued. “No compromise of mobile devices was detected.”

Also on February 6, the Dutch justice and security secretary explained in an official letter to parliament that the Council for the Judiciary (Rvdr) and the Dutch Data Protection Authority (AP) had been caught in a similar breach.

It claimed that the country’s National Cyber Security Centre was told by Ivanti on January 29 about vulnerabilities in EPMM.

“It has now been revealed that work-related data of AP employees, such as name, business email address, and telephone number, has been accessed by unauthorized persons,” the letter continued.

“Immediately after the incident was discovered, measures were taken. In addition, employees of the AP and the Rvdr have been notified.”

Finally, an update from Finnish government ICT centre Valtori on February 6 explained that it discovered a breach on January 30 affecting the “mobile device management service” it provides to agencies.

“The attacker gained access to information used in operating the service, including names, work email addresses, phone numbers, and device details,” it explained. “A user’s precise location cannot be determined based on this data. According to current information, no data stored directly on the mobile devices themselves has been compromised.”

Valtori claimed that as many as 50,000 government workers may have had their details exposed in this way – nearly two-thirds of the total number of central government employees in the country.

Ivanti Zero Days Cause Havoc Again

Ivanti released patches for two critical (CVSS 9.8) zero-day bugs in EPMM on January 29, noting: “We are aware of a very limited number of customers whose solution has been exploited at the time of disclosure.”

CVE-2026-1281 and CVE-2026-1340 are described as code injection flaws which could allow attackers to achieve unauthenticated remote code execution.

Ross Filipek, CISO at Corsica Technologies, warned that the threat actors may use the information they compromised to launch follow-on spearphishing attacks, in order to gain deeper access into internal systems.

“Social engineering campaigns targeting government officials have grown in popularity over the last several months,” he added. “UK parliamentarians were subject to Russian spear phishing attacks this past December which aimed to establish stealthy continuous monitoring of government activity.”

Keeper Security CISO, Shane Barney, said that attacks on device management systems can carry “disproportionate risk,” even when the initial impact appears limited.

“The fact that these flaws can be exploited without authentication changes how organizations should respond. Patching addresses the vulnerability, but it does not restore trust,” he continued.

“Once a privileged control plane is exposed, organizations need to reassess credentials, keys and administrative permissions that depend on it. The objective is not just to remove the flaw, but to reestablish confidence in how access is granted and exercised.”

Cequence Security CISO, Randolph Barr, warned that if a threat actor were able to access an EPMM server, they could push malicious configuration changes, alter authentication settings or manipulate device certificates. 

“The other important point is that EPMM is typically deployed on-prem or in customer-managed private cloud environments,” he added. “That actually gives security teams more control than many SaaS platforms. With the right architecture and access controls, organizations can materially reduce their exposure and limit blast radius.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNotepad++ Hosting Breach Attributed to China-Linked Lotus Blossom Hacking Group
Next Article Mozilla Adds One-Click Option to Disable Generative AI Features in Firefox
Team-CWD
  • Website

Related Posts

News

Microsoft Fixes Six Zero Day Vulnerability in February Patch Tuesday

February 11, 2026
News

Learn What to Build, Buy, and Automate

February 11, 2026
News

Singapore Takes Down Chinese Hackers Targeting Telco Networks

February 11, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

It’s all fun and games until someone gets hacked

September 26, 2025

Find your weak spots before attackers do

November 21, 2025

The WhatsApp screen-sharing scam you didn’t see coming

November 6, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.