Subscribe

Social Media Links

Insights

 | 4 minute read

Ankura CTIX FLASH Update – February 3, 2026

Malware Activity

Data Theft, Social Engineering, and Malicious Apps

Recent reports highlight a surge in sophisticated cyberattacks involving data theft, social engineering, and malware. The hacking group ShinyHunters, along with similar threat actors, uses fake phone calls (vishing) and impersonation of IT staff to trick employees into revealing login details and multi-factor authentication codes. These attackers gain access to cloud services like Google Drive and Microsoft 365, then move laterally to steal or delete sensitive information, often engaging in extortion by leaking data. Meanwhile, a new Android malware campaign exploits trusted platforms like Hugging Face to host malicious APK files, which disguise themselves as legitimate security apps. Once installed, these apps use device permissions to monitor activity, capture data, and mimic banking apps to steal financial information. Experts warn users to avoid third-party app stores, scrutinize app permissions, and enable stronger security measures such as hardware security keys and vigilant monitoring to defend against these evolving threats. CTIX analysts will continue to report on the latest malware strains and attack methodologies.


Threat Actor Activity

Notepad++ Supply Chain Attack Targeted Update Feature to Deliver Malware, Suspected State-Sponsored Hackers


Vulnerabilities

Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Prompting Emergency Mitigations and Federal Action

Ivanti disclosed and patched two (2) critical zero-day vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM),

and , both unauthenticated remote code execution (RCE) flaws with CVSS scores of 9.8 that were actively exploited prior to public disclosure. Affecting multiple EPMM 12.5.x–12.7.x releases, the vulnerabilities stem from code-injection issues in the In-House Application Distribution and Android File Transfer Configuration features and allow attackers to execute arbitrary code, access highly sensitive data stored on the appliance (including administrator and user credentials, device identifiers, network details, and potentially location data), and make configuration changes that could facilitate persistence or lateral movement. Ivanti released temporary RPM-based hotfixes that require no downtime but do not persist across version upgrades, with a permanent fix scheduled for EPMM later in Q1 2026, while acknowledging a limited number of confirmed compromises and limited visibility into attacker TTPs. Detection guidance centers on identifying anomalous 404 responses to specific endpoints in Apache access logs, though Ivanti warned attackers may delete local logs post-compromise, recommending off-device log review where possible. Rather than attempting cleanup, Ivanti advises organizations to treat suspected compromises as full incidents, restore from known-good backups or rebuild appliances, reset credentials, and replace certificates, while also reviewing Ivanti Sentry systems for potential downstream impact. The U.S. Cybersecurity and Infrastructure Security Agency (CISA)added to its Known Exploited Vulnerabilities (KEV) catalog, mandating federal agencies remediate by no later than February 1, 2026. Independent research by watchTowr Labs confirmed the flaws are exploitable over HTTP via crafted GET requests abusing app store-related Bash scripts, reinforcing warnings that patching alone may be insufficient for internet-exposed EPMM instances. CTIX analysts urge any affected administrators to follow Ivanti’s guidance to investigate potential compromises.

📧 Never Miss a Briefing

Stay informed and secure. Subscribe to Ankura’s Cyber Flash Update, a bi-weekly briefing curated by our top cybersecurity experts. Receive timely insights on emerging threats, vulnerabilities and malicious actors to keep your systems secure. 

Join the Cyber Flash Update community today.

© Copyright 2026. The views expressed herein are those of the author(s) and not necessarily the views of Ankura Consulting Group, LLC., its management, its subsidiaries, its affiliates, or its other professionals. Ankura is not a law firm and cannot provide legal advice.

Let’s Connect

We solve problems by operating as one firm to deliver for our clients. Where others advise, we solve. Where others consult, we partner.

I’m interested in
I need help with