Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Scanning Cisco ASA Devices to Exploit Vulnerabilities from 25,000 IPs

Posted on September 5, 2025September 5, 2025 By CWS

An unprecedented surge in malicious scanning exercise focusing on Cisco Adaptive Safety Home equipment (ASAs) occurred in late August 2025, with over 25,000 distinctive IP addresses taking part in coordinated reconnaissance efforts.

GreyNoise, a risk intelligence firm, noticed two distinct scanning waves that characterize a dramatic escalation from the everyday baseline exercise of fewer than 500 IPs per day. The August 22 spike concerned roughly 25,000 distinctive addresses, adopted by a smaller however associated marketing campaign days later.

Evaluation reveals that the August 26 wave was primarily pushed by a single botnet cluster concentrated in Brazil. Of the roughly 17,000 lively IPs that day, greater than 14,000, representing over 80% had been tied to this coordinated botnet marketing campaign.

Scans for hundreds of IP

The attackers used shared shopper signatures and spoofed Chrome-like user-agents, indicating deployment of widespread scanning toolkits throughout the infrastructure.

“The shopper signature was seen alongside a collection of carefully associated TCP signatures, suggesting all nodes share a typical stack and tooling,” researchers famous, confirming the coordinated nature of the marketing campaign.

Geographic Distribution and Focusing on Patterns

Over the previous 90 days, scanning exercise has proven distinct geographic patterns. Brazil dominates supply nations at 64%, adopted by Argentina and america at 8% every.

Nevertheless, the focusing on is closely centered on U.S. infrastructure, with 97% of assaults aimed toward American networks, whereas the UK and Germany account for five% and three% respectively, GreyNoise noticed.

Vulnerabilities

Each scanning surges particularly focused the ASA net login path /+CSCOE+/logon.html, a typical reconnaissance marker used to determine uncovered units. Subsets of the identical IP addresses additionally probed Cisco Telnet/SSH and ASA software program personas, indicating a deliberate Cisco-focused marketing campaign slightly than opportunistic scanning.

The timing and scale of those scanning campaigns might sign an impending vulnerability disclosure. GreyNoise’s Early Warning Alerts analysis has demonstrated that scanning spikes usually precede the announcement of latest Frequent Vulnerabilities and Exposures (CVEs). Historic information exhibits comparable exercise surges occurred shortly earlier than earlier Cisco ASA vulnerability disclosures.

Cisco ASA units have been prime targets for stylish risk actors. The ArcaneDoor espionage marketing campaign beforehand exploited two zero-day vulnerabilities in Cisco ASA programs to infiltrate authorities networks.

Ransomware teams, together with Akira and LockBit, have additionally traditionally focused these units, whereas CVE-2020-3452 was weaponized globally inside days of its disclosure.

Organizations working Cisco ASA infrastructure ought to instantly evaluate their publicity, guarantee programs are absolutely patched, and monitor for uncommon authentication makes an attempt.

Given the size and coordination of this scanning exercise, safety groups ought to put together for potential zero-day exploitation makes an attempt and contemplate implementing further monitoring round ASA units.

The unprecedented scale of this reconnaissance marketing campaign suggests risk actors could also be positioning for a big vulnerability exploitation wave, making rapid defensive preparations important for organizations counting on Cisco ASA safety home equipment.

Discover this Story Attention-grabbing! Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates.

Cyber Security News Tags:ASA, Cisco, Devices, Exploit, Hackers, IPs, Scanning, Vulnerabilities

Post navigation

Previous Post: How to Use Browser Extensions Safely
Next Post: Windows Heap-based Buffer Overflow Vulnerability Let Attackers Elevate Privileges

Related Posts

Critical Apache bRPC Framework Vulnerability Let Attackers Crash the Server Cyber Security News
Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access Cyber Security News
GoAnywhere 0-Day RCE Vulnerability Exploited in the Wild to Deploy Medusa Ransomware Cyber Security News
CISA Adds ASUS Embedded Malicious Code Vulnerability to KEV List Following Active Exploitation Cyber Security News
Chinese Hackers Weaponizes Software Vulnerabilities to Compromise Their Targets Cyber Security News
Hackers Abuse Microsoft 365 Exchange Direct Send to Bypass Content Filters and Harvest Sensitive Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New AI Malware Era Begins as Advanced VoidLink Malware Emerges as the First Fully AI-Driven Threat Framework
  • Microsoft Investigating Issue Impacting Exchange Online, Teams, and M365 Suite
  • North Korean PurpleBravo Campaign Targeted 3,136 IP Addresses via Fake Job Interviews
  • Researchers Uncovered LockBit’s 5.0 Latest Affiliate Panel and Encryption Variants
  • CyberNut Closes $5M Growth Capital for K-12 Security Awareness Training

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New AI Malware Era Begins as Advanced VoidLink Malware Emerges as the First Fully AI-Driven Threat Framework
  • Microsoft Investigating Issue Impacting Exchange Online, Teams, and M365 Suite
  • North Korean PurpleBravo Campaign Targeted 3,136 IP Addresses via Fake Job Interviews
  • Researchers Uncovered LockBit’s 5.0 Latest Affiliate Panel and Encryption Variants
  • CyberNut Closes $5M Growth Capital for K-12 Security Awareness Training

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark