Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Posted on January 9, 2026January 9, 2026 By CWS

Between December 25–28, a single risk actor performed a large-scale scanning marketing campaign, testing over 240 completely different exploits in opposition to internet-facing methods and gathering information on each weak goal discovered.

This reconnaissance operation, working from two IP addresses linked to CTG Server Restricted (AS152194), represents a brand new stage of sophistication in how preliminary entry is secured for ransomware operations.

The attacker systematically probed targets at intervals of 1 to 5 seconds, with every system receiving 11 completely different exploit varieties to determine weaknesses.

The marketing campaign reveals a regarding shift in ransomware operations. Relatively than launching direct assaults, these risk actors are appearing as Preliminary Entry Brokers (IABs), constructing catalogs of weak methods to promote to ransomware teams.

The info collected throughout this four-day window supplies a confirmed stock of exploitable targets that can possible gasoline focused intrusions all through 2026.

The timing was deliberate, making the most of vacation intervals when safety groups are decreased, and detection methods obtain minimal consideration.

Greynoise analysts recognized the marketing campaign by detecting over 57,000 distinctive Out-of-Band Utility Safety Testing (OAST) subdomains tied to ProjectDiscovery’s Interactsh platform.

The researchers famous that the tooling matched Nuclei, an open-source vulnerability scanner, run at industrial scale.

IP addresses (Supply – Greynoise)

By analyzing JA4 community fingerprints and a shared Machine ID throughout 98 % of makes an attempt, Greynoise analysts confirmed this was a single operator conducting the assault, not a coordinated group effort.

Detection Evasion and Infrastructure Evaluation

The attacker’s selection of CTG Server Restricted raises important considerations about resilient infrastructure for prison operations.

This Hong Kong-registered internet hosting supplier controls roughly 201,000 IPv4 addresses throughout 672 prefixes and operates with minimal abuse enforcement.

The community beforehand recognized as internet hosting phishing domains inside FUNNULL CDN infrastructure and pronounces bogon routes, indicating poor community hygiene practices that make it engaging for operations requiring infrastructure that may face up to blocking makes an attempt.

Organizations want to look at their logs from the marketing campaign dates for connections to the suspicious IP addresses 134.122.136.119 and 134.122.136.96, in addition to DNS queries to OAST domains together with oast.professional, oast.website, oast.me, oast.on-line, oast.enjoyable, and oast.dwell.

If matches are found, organizations ought to assume attackers have confirmed vulnerabilities of their networks, and that this entry info could already be out there for buy in prison marketplaces.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Actors, Attacking, Deployment, Exploits, Ransomware, Systems, Threat

Post navigation

Previous Post: Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations
Next Post: In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k

Related Posts

Scattered Lapsus$ Hunters Registered 40+ Domains Mimicking Zendesk Environments Cyber Security News
Hackers Poison Google Paid Ads With Fake Tesla Websites to Deliver Malware Cyber Security News
Ransomware Operations Surge Following Qilin’s New Pattern of Attacks Cyber Security News
CISA and NSA Warns of BRICKSTORM Malware Attacking VMware ESXi and Windows Environments Cyber Security News
Cisco Small Business Switches Face Global DNS Crash Outage Cyber Security News
New Windows-Based Airstalk Malware Employs Multi-Threaded C2 Communication to Steal Logins Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark