Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager

Posted on June 11, 2025June 11, 2025 By CWS

Jun 11, 2025Ravie LakshmananNetwork Safety / Risk Intelligence

Risk intelligence agency GreyNoise has warned of a “coordinated brute-force exercise” focusing on Apache Tomcat Supervisor interfaces.
The corporate mentioned it noticed a surge in brute-force and login makes an attempt on June 5, 2025, a sign that they may very well be deliberate efforts to “determine and entry uncovered Tomcat companies at scale.”
To that finish, 295 distinctive IP addresses have been discovered to be engaged in brute-force makes an attempt in opposition to Tomcat Supervisor on that date, with all of them labeled as malicious. Over the previous 24 hours, 188 distinctive IPs have been recorded, a majority of them positioned in the USA, the UK, Germany, the Netherlands, and Singapore.

In an analogous vein, 298 distinctive IPs have been noticed conducting login makes an attempt in opposition to Tomcat Supervisor situations. Of the 246 IP addresses flagged within the final 24 hours, all of them are categorized as malicious and originate from the identical areas.
Targets of those makes an attempt embrace the USA, the UK, Spain, Germany, India, and Brazil for a similar time interval. GreyNoise famous {that a} important chunk of the exercise got here from infrastructure hosted by DigitalOcean (ASN 14061).
“Whereas not tied to a particular vulnerability, this habits highlights ongoing curiosity in uncovered Tomcat companies,” the corporate added. “Broad, opportunistic exercise like this usually serves as an early warning of future exploitation.”
To mitigate any potential dangers, organizations with uncovered Tomcat Supervisor interfaces are advisable to implement robust authentication and entry restrictions, and monitor for any indicators of suspicious exercise.
The disclosure comes as Bitsight revealed that it discovered greater than 40,000 safety cameras brazenly accessible on the web, probably enabling anybody to entry reside video feeds captured by these units over HTTP or Actual-Time Streaming Protocol (RTSP). The exposures are concentrated in the USA, Japan, Austria, Czechia, and South Korea.
The telecommunications sector accounts for 79% of the uncovered cameras, adopted by know-how (6%), media (4.1%), utilities (2.5%), training (2.2%), enterprise companies (2.2%), and authorities (1.2%).
The installations vary from these put in in residences, workplaces, public transportation techniques, and manufacturing unit settings, inadvertently leaking delicate data that would then be exploited for espionage, stalking, and extortion.

Customers are suggested to vary default usernames and passwords, disable distant entry if not required (or prohibit entry with firewalls and VPNs), and maintain firmware up-to-date.
“These cameras – meant for safety or comfort – have inadvertently turn into public home windows into delicate areas, usually with out their homeowners’ data,” safety researcher João Cruz mentioned in a report shared with The Hacker Information.
“Regardless of the rationale why one particular person or group wants this type of gadget, the truth that anybody can purchase one, plug it in, and begin streaming with minimal setup is probably going why that is nonetheless an ongoing risk.”

Discovered this text fascinating? Observe us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Apache, Attacks, BruteForce, Coordinated, IPs, Launch, Malicious, Manager, Tomcat

Post navigation

Previous Post: Webinar Today: Rethinking Endpoint Hardening for Today’s Attack Landscape
Next Post: Flaw in Industrial Computer Maker’s UEFI Apps Enables Secure Boot Bypass on Many Devices

Related Posts

Hackers Exploit Critical WordPress Theme Flaw to Hijack Sites via Remote Plugin Install The Hacker News
Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks The Hacker News
Google Patches 107 Android Flaws, Including Two Framework Bugs Exploited in the Wild The Hacker News
Five Malicious Chrome Extensions Impersonate Workday and NetSuite to Hijack Accounts The Hacker News
WhatsApp 0-Day, Docker Bug, Salesforce Breach, Fake CAPTCHAs, Spyware App & More The Hacker News
Researchers Uncover Malware in Fake Discord PyPI Package Downloaded 11,500+ Times The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released
  • Microsoft Releases Update for Windows 11, version 25H2 and 24H2 Systems
  • Exposed Open Directory Leaks BYOB Framework Across Windows, Linux, and macOS
  • Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries
  • Threat Actors Leverage Google Search Ads for ‘Mac Cleaner’ to Direct Users to Malicious Websites

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released
  • Microsoft Releases Update for Windows 11, version 25H2 and 24H2 Systems
  • Exposed Open Directory Leaks BYOB Framework Across Windows, Linux, and macOS
  • Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries
  • Threat Actors Leverage Google Search Ads for ‘Mac Cleaner’ to Direct Users to Malicious Websites

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark