Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch

Posted on May 28, 2025May 28, 2025 By CWS

Might 28, 2025Ravie LakshmananNetwork Safety / Vulnerability

Cybersecurity researchers have disclosed particulars of a coordinated cloud-based scanning exercise that focused 75 distinct “publicity factors” earlier this month.
The exercise, noticed by GreyNoise on Might 8, 2025, concerned as many as 251 malicious IP addresses which might be all geolocated to Japan and hosted by Amazon.
“These IPs triggered 75 distinct behaviors, together with CVE exploits, misconfiguration probes, and recon exercise,” the menace intelligence agency stated. “All IPs had been silent earlier than and after the surge, indicating momentary infrastructure rental for a single operation.”

The scanning efforts have been discovered to have focused a big selection of applied sciences from Adobe ColdFusion, Apache Struts, Apache Tomcat, Drupal, Elasticsearch, and Oracle WebLogic, amongst others.
The opportunistic operation ranged from exploitation makes an attempt for recognized CVEs to probes for misconfigurations and different weak factors in net infrastructure, indicating that the menace actors had been wanting indiscriminately for any vulnerable system

Adobe ColdFusion — CVE-2018-15961 (Distant code execution)
Apache Struts — CVE-2017-5638 (OGNL injection)
Atlassian Confluence — CVE-2022-26134 (OGNL Injection)
Bash — CVE-2014-6271 (Shellshock)
Elasticsearch — CVE-2015-1427 (Groovy sandbox bypass and distant code execution)
CGI script scanning
Setting variable publicity
Git config crawlers
Shell add checks, and
WordPress creator checks

An attention-grabbing facet is that the broad-spectrum scan was lively solely on Might 8, with no noticeable change within the exercise earlier than or after the date.
GreyNoise stated 295 IP addresses had been scanned for CVE-2018-15961, 265 IPs for Apache Struts, and 260 IPs for CVE-2015-1427. Out of those, 262 IPs overlapped between ColdFusion and Struts and 251 IPs overlapped throughout all of the three vulnerability scans.
“This degree of overlap factors to a single operator or toolset deployed throughout many momentary IPs — an more and more widespread sample in opportunistic however orchestral scanning,” GreyNoise stated.
To mitigate the exercise, organizations are required to dam the malicious IP addresses instantly, though it bears noting that follow-up exploitation might emanate from totally different infrastructures.

Discovered this text attention-grabbing? Comply with us on Twitter  and LinkedIn to learn extra unique content material we submit.

The Hacker News Tags:AmazonHosted, ColdFusion, Elasticsearch, Exploit, IPs, Scan, Struts, Targeting

Post navigation

Previous Post: Apple Blocks $9 Billion in Fraud Over 5 Years Amid Rising App Store Threats
Next Post: $223 Million Stolen in Cetus Protocol Hack

Related Posts

Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers The Hacker News
Google Warns of Scattered Spider Attacks Targeting IT Support Teams at U.S. Insurance Firms The Hacker News
Blind Eagle Uses Proton66 Hosting for Phishing, RAT Deployment on Colombian Banks The Hacker News
Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hardcoded Credentials The Hacker News
Why Traditional DLP Solutions Fail in the Browser Era The Hacker News
Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Remove Your Data From Data Broker Sites
  • TP-Link Network Video Recorder Vulnerability Let Attackers Execute Arbitrary Commands
  • SharePoint 0-day Vulnerability Exploited in Wild by All Sorts of Hacker Groups
  • Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems
  • Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Remove Your Data From Data Broker Sites
  • TP-Link Network Video Recorder Vulnerability Let Attackers Execute Arbitrary Commands
  • SharePoint 0-day Vulnerability Exploited in Wild by All Sorts of Hacker Groups
  • Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems
  • Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News