News: 1770648637

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Dutch data watchdog snitches on itself after getting caught in Ivanti zero-day attacks

(2026/02/09)


The Dutch Data Protection Authority (AP) says it was one of the many organizations popped when attackers raced to exploit recent Ivanti vulnerabilities as zero-days.

Justice secretary Arno Rutte and secretary for kingdom relations Eddie van Marum co-authored a [1]letter to the Dutch parliament, confirming that an attack involving January's Ivanti Endpoint Manager Mobile (EPMM) bugs led to a data breach.

The attack took place on January 29, the letter confirmed, and affected employees of both the AP and the Council for the Judiciary (RVDR).

[2]

Attackers may have accessed personal data including names, business email addresses, and phone numbers.

[3]

[4]

The senior ministers did not comment on the scale of the breach in terms of specific numbers, but said all of the affected individuals have been informed directly.

And to whom does a country's data protection authority report itself in such cases? The answer is its data protection officer, in this instance, while the AP's usual staff are looking into the breach at RVDR, which reported itself to the authority as normal.

[5]

While those investigations remain ongoing, the country's cybersecurity agency (NCSC-NL) is keeping tabs on the [6]Ivanti EPMM vulnerabilities (CVE-2026-1281 and CVE-2026-1340) and working with partners to understand additional threats the vulnerabilities present.

The Dutch office of the CIO (CIO Rijk) is also examining whether there is a broader risk to the central government, the letter stated.

The US Cybersecurity and Infrastructure Security Agency (CISA) confirmed CVE-2026-1281 (9.8) was exploited in the wild by adding it to the [7]Known Exploited Vulnerability (KEV) list shortly after initial disclosure.

[8]

Ivanti's security advisory at the time stated: "We are aware of a very limited number of customers whose solution has been exploited at the time of disclosure."

However, warnings from outside sources suggested the attacks could be more frequent than the vendor's "very limited" phrasing would suggest.

In its own warning about the Ivanti bugs, the UK's National Health Service (NHS) highlighted that EPMM devices are exposed to the web by design, making them ripe targets for attackers.

[9]January blues return as Ivanti coughs up exploited EPMM zero-days

[10]Ivanti EPMM holes let miscreants plant shady listeners, CISA says

[11]Ivanti makes dedicated fans of Chinese spies who just can't resist attacking its buggy kit

[12]'Ongoing' Ivanti hijack bug exploitation reaches clouds

It said: "Edge devices like EPMM are internet-facing by design and are highly attractive targets to attackers, and there are an increasing number of edge device vulnerabilities disclosed each year that are rapidly exploited by attackers.

"The NHS England National CSOC assesses it is highly likely vulnerabilities discovered in edge devices will continue to be exploited as zero-day vulnerabilities, or shortly after vendor disclosure."

Benjamin Harris, CEO at watchTowr, also said around the time of the bugs' disclosure that EPMM devices are often used by high-value organizations, according to intel gleaned from the company's own customer base.

"While patches are available from Ivanti, applying patches will not be enough. Threat actors have been exploiting these vulnerabilities as zero-days, and organizations that are, as of disclosure, exposing vulnerable instances to the internet must consider them compromised, tear down infrastructure, and instigate incident response processes." ®

Get our [13]Tech Resources



[1] https://www.tweedekamer.nl/kamerstukken/brieven_regering/detail?id=2026D05964&did=2026D05964

[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aYoStRGB8DOhkrG6Qf_ASgAAARQ&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aYoStRGB8DOhkrG6Qf_ASgAAARQ&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aYoStRGB8DOhkrG6Qf_ASgAAARQ&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aYoStRGB8DOhkrG6Qf_ASgAAARQ&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[6] https://www.theregister.com/2026/01/30/ivanti_epmm_zero_days/

[7] https://www.theregister.com/2026/02/03/greynoise_cisa_ransomware_gripe/

[8] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aYoStRGB8DOhkrG6Qf_ASgAAARQ&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[9] https://www.theregister.com/2026/01/30/ivanti_epmm_zero_days/

[10] https://www.theregister.com/2025/09/19/cisa_ivanti_bugs_exploited/

[11] https://www.theregister.com/2025/05/23/ivanti_chinese_spies_attack/

[12] https://www.theregister.com/2025/05/21/ivanti_rce_attacks_ongoing/

[13] https://whitepapers.theregister.com/



It is not enough to have a good mind. The main thing is to use it well.
-- Rene Descartes