Sunday, April 6, 2025
HomeCVE/vulnerabilityHackers Exploiting Vulnerabilities in SonicWall, Zoho, F5 & Ivanti Systems

Hackers Exploiting Vulnerabilities in SonicWall, Zoho, F5 & Ivanti Systems

Published on

SIEM as a Service

Follow Us on Google News

A surge in cyber activity targeting critical edge technologies and management tools, including SonicWall, Zoho, F5, Ivanti, and other systems, has been flagged by cybersecurity intelligence firm GreyNoise.

The sudden spike in probing and exploitation attempts highlights an alarming trend: Hackers are increasingly targeting vulnerabilities in widely used systems, potentially exposing businesses to significant threats.

Significant Spike in Cyber Activity

GreyNoise telemetry identified an unprecedented rise in activity targeting these technologies, signaling that threat actors will likely conduct reconnaissance or actively exploit unpatched vulnerabilities.

- Advertisement - Google News

SonicWall and F5, known for their critical network and application delivery systems, along with Zoho, a popular enterprise IT tool, and Ivanti, which specializes in unified endpoint management, appear to be primary targets.

Edge systems like Zyxel and Linksys were also observed under scrutiny, underscoring that both critical infrastructure and internal IT management systems are at risk.

GreyNoise’s findings hint at the possibility of coordinated attacks or opportunistic exploitation campaigns by cybercriminals or advanced persistent threat (APT) groups.

Implications for Cybersecurity

The observed activity raises concerns about the security posture of businesses relying on these technologies.

For organizations, the risks are twofold: edge technologies directly face the internet and are vulnerable to external attacks, while internal systems like Ivanti and Zoho, if breached, can provide attackers with deeper access to networks.

Cybersecurity experts warn that this spike is likely just the beginning. Threat actors often capitalize on unpatched systems or newly-disclosed vulnerabilities to infiltrate networks, steal sensitive data, or deploy ransomware.

GreyNoise’s Recommendations

To mitigate potential threats, GreyNoise has outlined critical measures that organizations should implement immediately:

1. Patch Management: Ensure all systems are running the most up-to-date security patches. Unpatched vulnerabilities often serve as the entry point for attackers.

2. Network Monitoring: Analyze network traffic closely, specifically logs from March 28, for unusual patterns. Retroactive monitoring can help identify any signs of compromise during the activity spike.

3. Threat Intelligence Tools: Use real-time threat intelligence platforms such as the GreyNoise Visualizer. Organizations can search targeted vulnerabilities (CVEs) and block malicious IP addresses based on telemetry data.

The exploitation attempts underline the need for businesses to adopt proactive security measures. With the interconnected nature of edge and internal management systems, a single vulnerability can act as the gateway to widespread damage.

Organizations must stay vigilant, conduct regular risk assessments, and ensure robust cyber defenses to counter emerging threats.

Cybersecurity experts reiterate that the best protection lies in staying one step ahead of attackers—by patching systems promptly, investing in threat intelligence, and fostering a culture of awareness.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Hack The box “Ghost” Challenge Cracked – A Detailed Technical Exploit

Cybersecurity researcher "0xdf" has cracked the "Ghost" challenge on Hack The Box (HTB), a...

Sec-Gemini v1 – Google’s New AI Model for Cybersecurity Threat Intelligence

Google has unveiled Sec-Gemini v1, an AI model designed to redefine cybersecurity operations by...

U.S. Secures Extradition of Rydox Cybercrime Marketplace Admins from Kosovo in Major International Operation

The United States has successfully extradited two Kosovo nationals, Ardit Kutleshi, 26, and Jetmir...

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hack The box “Ghost” Challenge Cracked – A Detailed Technical Exploit

Cybersecurity researcher "0xdf" has cracked the "Ghost" challenge on Hack The Box (HTB), a...

Sec-Gemini v1 – Google’s New AI Model for Cybersecurity Threat Intelligence

Google has unveiled Sec-Gemini v1, an AI model designed to redefine cybersecurity operations by...

U.S. Secures Extradition of Rydox Cybercrime Marketplace Admins from Kosovo in Major International Operation

The United States has successfully extradited two Kosovo nationals, Ardit Kutleshi, 26, and Jetmir...