Spike in Palo Alto Networks scanner activity suggests imminent cyber threats

This post was originally published on Security Affairs. It can be found here.

Hackers are scanning for vulnerabilities in Palo Alto Networks GlobalProtect portals, likely preparing for targeted attacks.

Researchers at the threat intelligence firm GreyNoise warn of hackers that are scanning for vulnerabilities in Palo Alto Networks GlobalProtect portals, likely preparing for targeted attacks, warns threat intelligence firm GreyNoise.

GreyNoise reports that over 24,000 unique IP addresses have attempted to access GlobalProtect portals, indicating a coordinated effort to identify vulnerabilities. From March 17 to 26, activity surged with nearly 20,000 IPs scanning logins daily. GreyNoise identified around 23,000 suspicious IPs and 150 known malicious ones, suggesting a potential targeted attack.

“GreyNoise has observed a significant surge in login scanning activity targeting Palo Alto Networks PAN-OS GlobalProtect portals. Over the last 30 days, nearly 24,000 unique IP addresses have attempted to access these portals.” reads the report published by GreyNoise. “The pattern suggests a coordinated effort to probe network defenses and identify exposed or vulnerable systems, potentially as a precursor to targeted exploitation.”

The experts believe that this activity is part of a reconnaissance effort to test network defenses, potentially paving the way for future attacks. GreyNoise recommends that organizations using Palo Alto Networks products should take steps to secure their login portals. 

A large portion of traffic is linked to 3xK Tech GmbH (20,010 IPs) under ASN200373, with contributions from PureVoltage Hosting Inc., Fast Servers Pty Ltd., and Oy Crea Nova Hosting. GreyNoise identified three JA4h hashes related to a login scanner tool. The activity originates mainly from the U.S. (16,249 IPs) and Canada (5,823 IPs), targeting primarily the U.S. (23,768), followed by the U.K., Ireland, Russia, and Singapore.

The researchers also observed scans that are targeting GlobalProtect portals and other PAN-OS appliances like PAN-OS Crawler, similar to threats identified by Cisco Talos in April last year, which targeted Cisco appliances, Microsoft Exchange servers, and edge devices from various vendors.

“Given the unusual nature of this activity, organizations with exposed Palo Alto Networks systems should review their March logs and consider performing a detailed threat hunt on running systems to identify any signs of compromise.” GreyNoise concludes.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, GreyNoise)

This post was originally published on this site

Forum Search

Partners & Sponsors
  • University of Baltimore
  • Towson University
  • Bureau of Justice Assistance
  • National Science Foundation
LATEST FORUM POSTS
Test post2

Test Post2

By Demo User12, 1 year ago

Finding internships

Hello, Has anyone here secured any forensic related internships for 2024? I'm collecting some data and wanted to know what...

By AP Malla, 1 year ago

Beginner network forensic investigation

How should I approach network forensic? Would you recommend learning tools like WireShark?

By AP Malla, 1 year ago

Cyber Forensic Employment: High level guidelines

Understand the Basics: Know the Field: Cyber forensics involves investigating digital crimes, analyzing electronic data, and recovering hidden, deleted, or...

By AP Malla, 1 year ago

LATEST POSTS