Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Actively Exploiting AI Deployments

Hackers Actively Exploiting AI Deployments

Posted on January 9, 2026January 9, 2026 By CWS

Safety researchers have recognized over 91,000 assault classes focusing on AI infrastructure between October 2025 and January 2026, exposing systematic campaigns towards giant language mannequin deployments.

GreyNoise’s Ollama honeypot infrastructure captured 91,403 assault classes throughout this era, revealing two distinct menace campaigns. The findings corroborate and prolong earlier analysis from Defused on AI system focusing on.

The primary marketing campaign exploited server-side request forgery vulnerabilities to power servers into making outbound connections to attacker-controlled infrastructure.

Attackers focused Ollama’s mannequin pull performance by injecting malicious registry URLs and manipulating Twilio SMS webhook MediaUrl parameters.

SSRF Enumeration (Supply: Greynoise)

The marketing campaign ran from October 2025 by January 2026, with a dramatic spike over Christmas, 1,688 classes in simply 48 hours.

Attackers used ProjectDiscovery’s OAST infrastructure to verify profitable exploitation through callback validation.

Fingerprinting revealed a single JA4H signature showing in 99% of assaults, indicating shared automation tooling possible based mostly on Nuclei.

Whereas 62 supply IPs unfold throughout 27 nations have been noticed, constant fingerprints counsel VPS-based infrastructure fairly than a botnet.

GreyNoise assesses this as possible grey-hat operations by bug bounty hunters, although the dimensions and timing increase moral considerations.

Enumeration Marketing campaign: Constructing Goal Lists

Beginning December 28, 2025, two IPs launched methodical probes of 73+ LLM mannequin endpoints, producing 80,469 classes in eleven days.

This systematic reconnaissance sought misconfigured proxy servers which may expose entry to business APIs.

The assaults examined OpenAI-compatible and Google Gemini codecs throughout each main mannequin household: OpenAI GPT-4o, Anthropic Claude, Meta Llama 3.x, DeepSeek-R1, Google Gemini, Mistral, Alibaba Qwen, and xAI Grok.

Check queries remained intentionally innocuous, with “hello” showing 32,716 occasions and “What number of states are there in the USA?” showing 27,778 occasions, possible aiming to fingerprint fashions with out triggering safety alerts.

The infrastructure factors to skilled menace actors: 45.88.186.70 (AS210558, 1337 Companies GmbH): 49,955 classes 204.76.203.125 (AS51396, Pfcloud UG): 30,514 classes

Each IPs have intensive histories of CVE exploitation, with over 4 million mixed sensor hits throughout greater than 200 vulnerabilities, together with CVE-2025-55182 and CVE-2023-1389.

Block these community indicators:

JA4HDomainsIPspo11nn060000…*.oast.dwell, *.oast.me, *.oast.on-line, *.oast.professional, *.oast.enjoyable, *.oast.website, *.oast.today45.88.186.70, 204.76.203.125, 134.122.136.119, 134.122.136.96, 112.134.208.214, 146.70.124.188, 146.70.124.165

Enable Ollama to make outbound connections solely to permitted addresses. Block all different outgoing site visitors so attackers can’t use it for SSRF callbacks.

Eighty thousand enumeration requests symbolize a major funding. Risk actors don’t map infrastructure at this scale with out plans to use it.

When you’re working uncovered LLM endpoints, you’re possible already on somebody’s goal checklist.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Actively, Deployments, Exploiting, Hackers

Post navigation

Previous Post: FBI Warns North Korean Hackers Using Malicious QR Codes in Spear-Phishing
Next Post: New Ghost Tapped Attack Uses Your Android Device to Drain Your Bank Account

Related Posts

WordPress Theme RCE Vulnerability Actively Exploited to Take Full Site Control WordPress Theme RCE Vulnerability Actively Exploited to Take Full Site Control Cyber Security News
New Report Uncover That Chinese Hackers Attempted To Compromise SentinelOne’s Own Servers New Report Uncover That Chinese Hackers Attempted To Compromise SentinelOne’s Own Servers Cyber Security News
New KimJongRAT Stealer Using Weaponized LNK File to Deploy Powershell Based Dropper New KimJongRAT Stealer Using Weaponized LNK File to Deploy Powershell Based Dropper Cyber Security News
Allianz Life Data Breach Exposes Personal Records of 1.5 Million Users Allianz Life Data Breach Exposes Personal Records of 1.5 Million Users Cyber Security News
Remcos RAT C2 Activity Mapped Along with The Ports Used for Communications Remcos RAT C2 Activity Mapped Along with The Ports Used for Communications Cyber Security News
Microsoft Anti-Spam Bug Blocks Users From Opening URLs in Exchange Online and Teams Microsoft Anti-Spam Bug Blocks Users From Opening URLs in Exchange Online and Teams Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News