Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Actively Exploiting AI Deployments

Posted on January 9, 2026January 9, 2026 By CWS

Safety researchers have recognized over 91,000 assault classes focusing on AI infrastructure between October 2025 and January 2026, exposing systematic campaigns towards giant language mannequin deployments.

GreyNoise’s Ollama honeypot infrastructure captured 91,403 assault classes throughout this era, revealing two distinct menace campaigns. The findings corroborate and prolong earlier analysis from Defused on AI system focusing on.

The primary marketing campaign exploited server-side request forgery vulnerabilities to power servers into making outbound connections to attacker-controlled infrastructure.

Attackers focused Ollama’s mannequin pull performance by injecting malicious registry URLs and manipulating Twilio SMS webhook MediaUrl parameters.

SSRF Enumeration (Supply: Greynoise)

The marketing campaign ran from October 2025 by January 2026, with a dramatic spike over Christmas, 1,688 classes in simply 48 hours.

Attackers used ProjectDiscovery’s OAST infrastructure to verify profitable exploitation through callback validation.

Fingerprinting revealed a single JA4H signature showing in 99% of assaults, indicating shared automation tooling possible based mostly on Nuclei.

Whereas 62 supply IPs unfold throughout 27 nations have been noticed, constant fingerprints counsel VPS-based infrastructure fairly than a botnet.

GreyNoise assesses this as possible grey-hat operations by bug bounty hunters, although the dimensions and timing increase moral considerations.

Enumeration Marketing campaign: Constructing Goal Lists

Beginning December 28, 2025, two IPs launched methodical probes of 73+ LLM mannequin endpoints, producing 80,469 classes in eleven days.

This systematic reconnaissance sought misconfigured proxy servers which may expose entry to business APIs.

The assaults examined OpenAI-compatible and Google Gemini codecs throughout each main mannequin household: OpenAI GPT-4o, Anthropic Claude, Meta Llama 3.x, DeepSeek-R1, Google Gemini, Mistral, Alibaba Qwen, and xAI Grok.

Check queries remained intentionally innocuous, with “hello” showing 32,716 occasions and “What number of states are there in the USA?” showing 27,778 occasions, possible aiming to fingerprint fashions with out triggering safety alerts.

The infrastructure factors to skilled menace actors: 45.88.186.70 (AS210558, 1337 Companies GmbH): 49,955 classes 204.76.203.125 (AS51396, Pfcloud UG): 30,514 classes

Each IPs have intensive histories of CVE exploitation, with over 4 million mixed sensor hits throughout greater than 200 vulnerabilities, together with CVE-2025-55182 and CVE-2023-1389.

Block these community indicators:

JA4HDomainsIPspo11nn060000…*.oast.dwell, *.oast.me, *.oast.on-line, *.oast.professional, *.oast.enjoyable, *.oast.website, *.oast.today45.88.186.70, 204.76.203.125, 134.122.136.119, 134.122.136.96, 112.134.208.214, 146.70.124.188, 146.70.124.165

Enable Ollama to make outbound connections solely to permitted addresses. Block all different outgoing site visitors so attackers can’t use it for SSRF callbacks.

Eighty thousand enumeration requests symbolize a major funding. Risk actors don’t map infrastructure at this scale with out plans to use it.

When you’re working uncovered LLM endpoints, you’re possible already on somebody’s goal checklist.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Actively, Deployments, Exploiting, Hackers

Post navigation

Previous Post: FBI Warns North Korean Hackers Using Malicious QR Codes in Spear-Phishing
Next Post: New Ghost Tapped Attack Uses Your Android Device to Drain Your Bank Account

Related Posts

Prompt Injection Vulnerability in GitHub Actions Hits Fortune 500 Firms Cyber Security News
New Research Uncovers the Alliance Between Qilin, DragonForce and LockBit Cyber Security News
New 7-Zip Vulnerability Enables Malicious RAR5 File to Crash Your System Cyber Security News
Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach Cyber Security News
Hackers Exploiting .onmicrosoft.com Domains to Launch TOAD Scam Attack Cyber Security News
Gmail to Drop POP3 mail Fetching to Collect Mail from other Email Accounts Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark