Friday, April 4, 2025
HomeCyber Security NewsHackers Deploy 24,000 IPs to Breach Palo Alto Networks GlobalProtect

Hackers Deploy 24,000 IPs to Breach Palo Alto Networks GlobalProtect

Published on

SIEM as a Service

Follow Us on Google News

A wave of malicious activity targeting Palo Alto Networks PAN-OS GlobalProtect portals has been observed, with nearly 24,000 unique IPs attempting unauthorized access over the past 30 days. 

This coordinated effort, flagged by cybersecurity firm GreyNoise, highlights the growing sophistication of attackers probing network defenses as a precursor to potential exploitation.

GreyNoise detected the surge starting on March 17, 2025, peaking at nearly 20,000 unique IP addresses per day.

While the activity tapered off by March 26, it revealed consistent patterns, with the majority of IP addresses classified as suspicious (23,800) and a smaller subset deemed outright malicious (154).

Key Observations
Key Observations

Bob Rudis, VP of Data Science at GreyNoise, noted this trend aligns with historical patterns linked to the emergence of new vulnerabilities:

“Over the past 18 to 24 months, we’ve observed deliberate targeting of older vulnerabilities, often followed by the discovery of new exploits within weeks.”

Organizations relying on Palo Alto Networks products are urged to secure their login portals immediately, as attackers may be preparing for exploitation.

Key Observations

GreyNoise identified several significant elements in the breach attempt:

Source and Destination Analysis

  • Source Countries: The majority of traffic originated from the United States (16,249) and Canada (5,823), with additional activity from Finland, the Netherlands, and Russia.
  • Destination Countries: Overwhelmingly targeted systems in the United States (23,768), followed by smaller volumes aimed at the UK, Ireland, Russia, and Singapore.

This global activity underscores a coordinated operation spanning multiple regions.

Top Contributors & Toolkit Indicators

A notable portion of traffic was traced back to 3xK Tech GmbH, responsible for 20,010 IPs under ASN200373.

Other contributors included PureVoltage Hosting Inc., Fast Servers Pty Ltd., and Oy Crea Nova Hosting Solution Ltd.

Three JA4h hashes associated with the login scanner tool were identified:

  • po11nn11enus_967778c7bec7_000000000000
  • po11nn09enus_fb8b2e7e6287_000000000000
  • po11nn060000_c4f66731b00d_000000000000

These hashes indicate a planned and systematic approach to breaching the portals using specialized connection tools.

The incident draws parallels to the 2024 espionage campaign targeting perimeter devices, as reported by Cisco Talos.

Although the methods differ, both events emphasize the critical need for organizations to monitor and defend edge devices.

Recommendations for Organizations

Experts have urged businesses to act swiftly:

  1. Audit March Logs: Review activity for unusual access attempts.
  2. Perform Threat Hunts: Analyze systems for potential compromises or suspicious processes.
  3. Block Malicious IPs: Use actionable intelligence to minimize exposure.

In light of the probing behavior, ensuring robust defenses around exposed Palo Alto Networks portals is essential to thwart future exploitation attempts.

The rise in coordinated attacks against critical network systems serves as a stark reminder of the importance of proactive cybersecurity measures in a constantly evolving threat landscape.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Hackers Exploit Fast Flux to Evade Detection and Obscure Malicious Servers

Cybersecurity agencies worldwide have issued a joint advisory warning against the growing threat posed...

Oracle Reports Data Breach, Initiates Client Notifications

Oracle Corporation has confirmed a data breach involving its older Gen 1 servers, marking...

Vite Development Server Flaw Allows Attackers Bypass Path Restrictions

A critical security vulnerability, CVE-2025-31125, has been identified in the Vite development server.Due to improper...

New Android Spyware Tricks Users by Demanding Passwords for Uninstallation

A newly identified Android spyware app is elevating its tactics to remain hidden and...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Exploit Fast Flux to Evade Detection and Obscure Malicious Servers

Cybersecurity agencies worldwide have issued a joint advisory warning against the growing threat posed...

Oracle Reports Data Breach, Initiates Client Notifications

Oracle Corporation has confirmed a data breach involving its older Gen 1 servers, marking...

Vite Development Server Flaw Allows Attackers Bypass Path Restrictions

A critical security vulnerability, CVE-2025-31125, has been identified in the Vite development server.Due to improper...