Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

URL has been copied successfully!
Surge in threat actors scanning Juniper, Cisco, and Palo Alto Networks devices
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Surge in threat actors scanning Juniper, Cisco, and Palo Alto Networks devices

Scanning for Palo Alto Networks portals: Meanwhile, researchers at GreyNoise this week reported seeing a recent significant surge in login scanning activity targeting Palo Alto Networks PAN-OS GlobalProtect portals. GlobalProtect is an endpoint application that allows employees to access a company’s resources remotely.Over the last 30 days, nearly 24,000 unique IP addresses have attempted to access these portals, the researchers said. “The pattern suggests a co-ordinated effort to probe network defenses and identify exposed or vulnerable systems, potentially as a precursor to targeted exploitation,” they said, suggesting a threat actor has discovered a new vulnerability.The report doesn’t say if the scanning was accompanied by login attempts.Most of the traffic came from the United States (16,249 IP addresses) and Canada (5,823), followed by Finland, Netherlands, and Russia. However, threat actors are known to disguise their bases by leveraging compromised servers in other countries.The overwhelming majority of traffic targeted systems in the United States (23,768), with smaller volumes directed toward the United Kingdom, Ireland, Russia, and Singapore. The spike began on March 17, the report says, with activity peaking at nearly 20,000 unique IPs per day and remaining steady until March 26 before tapering off. Most of the activity is suspicious, with a smaller subset flagged as malicious.”The consistency of this activity suggests a planned approach to testing network defenses,” says the report, “potentially paving the way for exploitation. Organizations using Palo Alto Networks products should take steps to secure their login portals,” the researchers said.

First seen on csoonline.com

Jump to article: www.csoonline.com/article/3953828/surge-in-threat-actors-scanning-juniper-cisco-and-palo-alto-networks-devices.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link