Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Attacks on Palo Alto PAN-OS Global Protect Login Portals Surge from 2,200 IPs

Posted on October 8, 2025October 8, 2025 By CWS

A large escalation in assaults focusing on Palo Alto Networks PAN-OS GlobalProtect login portals, with over 2,200 distinctive IP addresses conducting reconnaissance operations as of October 7, 2025. 

This represents a big surge from the preliminary 1,300 IPs noticed simply days earlier, marking the very best scanning exercise recorded previously 90 days in keeping with GreyNoise Intelligence monitoring.

The reconnaissance marketing campaign started with a pointy 500% enhance in scanning exercise on October 3, 2025, when researchers noticed roughly 1,300 distinctive IP addresses probing Palo Alto login portals. 

This preliminary surge already represented the most important burst of scanning exercise in three months, with each day volumes beforehand not often exceeding 200 IPs in the course of the previous 90-day interval.

2,200 IPs Scan Palo Portals

Palo Alto PAN-OS GlobalProtect Login Portals Surge

The escalating assault marketing campaign demonstrates subtle coordination throughout geographically distributed infrastructure. 

GreyNoise evaluation reveals that 91% of the malicious IP addresses are geolocated to the US, with extra clusters concentrated in the UK, the Netherlands, Canada, and Russia. 

Safety researchers have recognized roughly 12% of all ASN11878 subnets allotted to scanning Palo login portals, indicating vital infrastructure dedication to this operation.

The assault methodology suggests risk actors are systematically iterating by giant credential databases, with login try patterns indicating automated brute-force operations towards GlobalProtect SSL VPN portals. 

Tempo of Palo Alto distinctive login makes an attempt

GreyNoise has printed a complete dataset containing distinctive usernames and passwords from Palo login makes an attempt noticed in the course of the previous week, enabling safety groups to evaluate potential credential publicity.

Technical evaluation reveals that 93% of collaborating IP addresses had been labeled as suspicious, whereas 7% acquired malicious designations. 

1,285 Distinctive IPs probing Palo Alto login portals

The scanning exercise reveals distinct regional clustering patterns with separate TCP fingerprints, suggesting a number of coordinated risk teams working concurrently.

Safety researchers have recognized potential correlations between the Palo Alto scanning surge and concurrent reconnaissance operations focusing on Cisco ASA units. 

Each assault campaigns share dominant TCP fingerprints linked to infrastructure within the Netherlands, together with comparable regional clustering behaviors and tooling traits.

The cross-technology focusing on suggests a broader reconnaissance marketing campaign towards enterprise distant entry options. 

Concurrent surges noticed throughout a number of distant entry service platforms, although the precise relationship between these actions stays underneath investigation.

The focused nature of those assaults is clear from their concentrate on GreyNoise’s emulated Palo Alto profiles, together with GlobalProtect and PAN-OS programs. 

This precision signifies attackers probably derived goal lists from public reconnaissance platforms akin to Shodan or Censys, or performed their very own fingerprinting operations to determine susceptible Palo Alto units.

Safety groups ought to implement speedy defensive measures, together with IP blocklisting of identified malicious addresses, enhanced monitoring of GlobalProtect portal authentication logs, and implementation of extra entry controls for distant VPN connections.

Cyber Consciousness Month Supply: Upskill With 100+ Premium Cybersecurity Programs From EHA’s Diamond Membership: Be a part of At the moment

Cyber Security News Tags:Alto, Attacks, Global, IPs, Login, Palo, PANOS, Portals, Protect, Surge

Post navigation

Previous Post: Exploitation of Oracle EBS Zero-Day Started 2 Months Before Patching
Next Post: CISA Warns of Zimbra Collaboration Suite (ZCS) XSS Zero-Day Vulnerability Actively Exploited in Attacks

Related Posts

Microsoft Releases Emergency Fix for BitLocker Recovery Issue Cyber Security News
Hackers Exploiting Libraesva Email Security Gateway Vulnerability to Inject Malicious Commands Cyber Security News
Silver Fox Hackers Using Weaponized Google Translate Tools to Deploy Windows Malware Cyber Security News
BitLocker Encryption Bypassed in Minutes Using Bitpixie Vulnerability Cyber Security News
Top 10 Best Model Context Protocol (MCP) Servers in 2025 Cyber Security News
Chrome V8 JavaScript Engine Vulnerability Let Attackers Execute Remote Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Multiple BIND 9 DNS Vulnerabilities Enable Cache Poisoning and Denial Of Service Attacks
  • Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw
  • Critical Lanscope Endpoint Manager Bug Exploited in Ongoing Cyberattacks, CISA Confirms
  • Hackers Weaponizing OAuth Applications for Persistent Cloud Access Even After Password Reset
  • Critical Vulnerability in MCP Server Platform Exposes 3,000 Servers and Thousands of API Keys

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Multiple BIND 9 DNS Vulnerabilities Enable Cache Poisoning and Denial Of Service Attacks
  • Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw
  • Critical Lanscope Endpoint Manager Bug Exploited in Ongoing Cyberattacks, CISA Confirms
  • Hackers Weaponizing OAuth Applications for Persistent Cloud Access Even After Password Reset
  • Critical Vulnerability in MCP Server Platform Exposes 3,000 Servers and Thousands of API Keys

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News