Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Attacks on Palo Alto PAN-OS Global Protect Login Portals Surge from 2,200 IPs

Posted on October 8, 2025October 8, 2025 By CWS

A large escalation in assaults focusing on Palo Alto Networks PAN-OS GlobalProtect login portals, with over 2,200 distinctive IP addresses conducting reconnaissance operations as of October 7, 2025. 

This represents a big surge from the preliminary 1,300 IPs noticed simply days earlier, marking the very best scanning exercise recorded previously 90 days in keeping with GreyNoise Intelligence monitoring.

The reconnaissance marketing campaign started with a pointy 500% enhance in scanning exercise on October 3, 2025, when researchers noticed roughly 1,300 distinctive IP addresses probing Palo Alto login portals. 

This preliminary surge already represented the most important burst of scanning exercise in three months, with each day volumes beforehand not often exceeding 200 IPs in the course of the previous 90-day interval.

2,200 IPs Scan Palo Portals

Palo Alto PAN-OS GlobalProtect Login Portals Surge

The escalating assault marketing campaign demonstrates subtle coordination throughout geographically distributed infrastructure. 

GreyNoise evaluation reveals that 91% of the malicious IP addresses are geolocated to the US, with extra clusters concentrated in the UK, the Netherlands, Canada, and Russia. 

Safety researchers have recognized roughly 12% of all ASN11878 subnets allotted to scanning Palo login portals, indicating vital infrastructure dedication to this operation.

The assault methodology suggests risk actors are systematically iterating by giant credential databases, with login try patterns indicating automated brute-force operations towards GlobalProtect SSL VPN portals. 

Tempo of Palo Alto distinctive login makes an attempt

GreyNoise has printed a complete dataset containing distinctive usernames and passwords from Palo login makes an attempt noticed in the course of the previous week, enabling safety groups to evaluate potential credential publicity.

Technical evaluation reveals that 93% of collaborating IP addresses had been labeled as suspicious, whereas 7% acquired malicious designations. 

1,285 Distinctive IPs probing Palo Alto login portals

The scanning exercise reveals distinct regional clustering patterns with separate TCP fingerprints, suggesting a number of coordinated risk teams working concurrently.

Safety researchers have recognized potential correlations between the Palo Alto scanning surge and concurrent reconnaissance operations focusing on Cisco ASA units. 

Each assault campaigns share dominant TCP fingerprints linked to infrastructure within the Netherlands, together with comparable regional clustering behaviors and tooling traits.

The cross-technology focusing on suggests a broader reconnaissance marketing campaign towards enterprise distant entry options. 

Concurrent surges noticed throughout a number of distant entry service platforms, although the precise relationship between these actions stays underneath investigation.

The focused nature of those assaults is clear from their concentrate on GreyNoise’s emulated Palo Alto profiles, together with GlobalProtect and PAN-OS programs. 

This precision signifies attackers probably derived goal lists from public reconnaissance platforms akin to Shodan or Censys, or performed their very own fingerprinting operations to determine susceptible Palo Alto units.

Safety groups ought to implement speedy defensive measures, together with IP blocklisting of identified malicious addresses, enhanced monitoring of GlobalProtect portal authentication logs, and implementation of extra entry controls for distant VPN connections.

Cyber Consciousness Month Supply: Upskill With 100+ Premium Cybersecurity Programs From EHA’s Diamond Membership: Be a part of At the moment

Cyber Security News Tags:Alto, Attacks, Global, IPs, Login, Palo, PANOS, Portals, Protect, Surge

Post navigation

Previous Post: Exploitation of Oracle EBS Zero-Day Started 2 Months Before Patching
Next Post: CISA Warns of Zimbra Collaboration Suite (ZCS) XSS Zero-Day Vulnerability Actively Exploited in Attacks

Related Posts

GitLab Patches Multiple Vulnerabilities That Enables Denial Of Service And SSRF Attacks Cyber Security News
NVIDIA NVDebug Tool Vulnerability Let Attackers Escalate Privileges Cyber Security News
Hackers Using Generative AI ‘ChatGPT’ to Evade Anti-virus Defenses Cyber Security News
New BruteForceAI Tool Automatically Detects Login Pages and Executes Smart Brute-Force Attacks Cyber Security News
Shai Hulud v2 Exploits GitHub Actions Workflows as Attack Vector to Steal Secrets Cyber Security News
Implementing NIST CSF 2.0 A Technical Blueprint Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cybersecurity News Weekly Newsletter – 29.7 Tbps DDoS Attack, Chrome 143, React2Shell Vulnerabilities and Cloudflare Outage
  • LockBit 5.0 Infrastructure Exposed in New Server, IP and Domain Leak
  • Hackers Launch Widespread Attacks on Palo Alto GlobalProtect Portals from 7,000+ IPs
  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cybersecurity News Weekly Newsletter – 29.7 Tbps DDoS Attack, Chrome 143, React2Shell Vulnerabilities and Cloudflare Outage
  • LockBit 5.0 Infrastructure Exposed in New Server, IP and Domain Leak
  • Hackers Launch Widespread Attacks on Palo Alto GlobalProtect Portals from 7,000+ IPs
  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark