Thursday, May 8, 2025
HomeCyber Security NewsMassive Brute Force Attack Launched With 2.8 Million IPs To Hack VPN...

Massive Brute Force Attack Launched With 2.8 Million IPs To Hack VPN & Firewall Logins

Published on

SIEM as a Service

Follow Us on Google News

Massive brute force attacks targeting VPNs and firewalls have surged in recent weeks, with cybercriminals using as many as 2.8 million unique IP addresses daily to conduct relentless login attempts.

The Shadowserver Foundation, a nonprofit cybersecurity organization, has confirmed this alarming trend through data collected from its global honeypot infrastructure.

These attacks primarily target devices from high-profile vendors such as Palo Alto Networks, Ivanti, and SonicWall.

- Advertisement - Google News

In a recent update shared via Shadowserver’s official account on X, researchers highlighted a significant rise in web login brute-forcing activity aimed at edge devices.

The attacks focus on exploiting vulnerabilities in internet-facing devices, attempting to breach systems via weak or default login credentials.

Shadowserver noted that over 1 million of the source IPs involved in these attacks originated from Brazil, underscoring the global nature of the threat.

Further details were made available in their “Honeypot HTTP Scanner Events” report, which actively monitors such malicious activities.

Widespread Impact on Critical Infrastructure

Edge devices like VPN appliances and firewalls are critical components for securing networks, particularly for enterprises and organizations.

These systems are often exposed to the internet and therefore become high-value targets for threat actors looking to gain unauthorized access to sensitive data or infiltrate corporate networks.

The scale of the current attack campaign is unprecedented. With millions of IP addresses involved, these attacks are likely being conducted by large-scale botnets comprising compromised devices around the globe.

 A successful intrusion could potentially lead to ransomware attacks, data theft, or disruption of critical services.

Experts strongly recommend that organizations take immediate action to protect their networks. Suggested steps include:

  • Use strong, unique passwords for VPN and firewall logins.
  • Enable multi-factor authentication (MFA) to limit unauthorized access.
  • Update and patch all devices regularly, as unpatched vulnerabilities are common attack vectors for brute-force campaigns.
  • Monitor network traffic for suspicious activity and block IPs identified as malicious.

Organizations can also subscribe to Shadowserver’s free daily reports, which include details of observed attacks and source IPs.

This proactive sharing of data enables affected networks to take action and mitigate risks.

As cyberattacks continue to grow in volume and sophistication, the importance of securing edge devices has never been more critical.

This incident serves as a stark reminder that no organization can afford to overlook the basics of cybersecurity hygiene.

Are you from SOC/DFIR Team? - Join 500,000+ Researchers to Analyze Cyber Threats with ANY.RUN Sandbox - Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Microsoft Bookings Vulnerability Allows Unauthorized Changes to Meeting Details

Security researchers have uncovered a significant vulnerability in Microsoft Bookings, the scheduling tool integrated...

Nmap 7.96 Released with Enhanced Scanning Capabilities and Updated Libraries

The popular network mapping and security auditing tool Nmap has released version 7.96, featuring...

Cisco IOS XE Vulnerability Allows Attackers to Gain Elevated Privileges

Cisco has issued an urgent security advisory (ID: cisco-sa-iosxe-privesc-su7scvdp) following the discovery of multiple...

Cisco IOS, XE, and XR Vulnerability Allows Remote Device Reboots

 Cisco has issued an urgent security advisory (cisco-sa-twamp-kV4FHugn) warning of a critical vulnerability in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Microsoft Bookings Vulnerability Allows Unauthorized Changes to Meeting Details

Security researchers have uncovered a significant vulnerability in Microsoft Bookings, the scheduling tool integrated...

Nmap 7.96 Released with Enhanced Scanning Capabilities and Updated Libraries

The popular network mapping and security auditing tool Nmap has released version 7.96, featuring...

Cisco IOS XE Vulnerability Allows Attackers to Gain Elevated Privileges

Cisco has issued an urgent security advisory (ID: cisco-sa-iosxe-privesc-su7scvdp) following the discovery of multiple...