Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

MOVEit Transfer Faces Increased Threats as Scanning Surges and CVE Flaws Are Targeted

Posted on June 27, 2025June 27, 2025 By CWS

Jun 27, 2025Ravie LakshmananNetwork Safety / Vulnerability
Menace intelligence agency GreyNoise is warning of a “notable surge” in scanning exercise concentrating on Progress MOVEit Switch techniques beginning Could 27, 2025—suggesting that attackers could also be making ready for one more mass exploitation marketing campaign or probing for unpatched techniques.MOVEit Switch is a well-liked managed file switch answer utilized by companies and authorities businesses to share delicate information securely. As a result of it typically handles high-value data, it has develop into a favourite goal for attackers.
“Previous to this date, scanning was minimal — usually fewer than 10 IPs noticed per day,” the corporate stated. “However on Could 27, that quantity spiked to over 100 distinctive IPs, adopted by 319 IPs on Could 28.”
Since then, day by day scanner IP quantity has remained intermittently elevated between 200 to 300 IPs per day, GreyNoise added, stating it marks a “important deviation” from ordinary conduct.

As many as 682 distinctive IPs have been flagged in reference to the exercise over the previous 90 days, with 449 IP addresses noticed previously 24 hours alone. Of the 449 IPs, 344 have been categorized as suspicious and 77 have been marked malicious.
A majority of the IP addresses geolocate to the USA, adopted by Germany, Japan, Singapore, Brazil, the Netherlands, South Korea, Hong Kong, and Indonesia.

GreyNoise additionally stated it detected low-volume exploitation makes an attempt to weaponize two identified MOVEit Switch flaws (CVE-2023-34362 and CVE-2023-36934) on June 12, 2025. It is price noting that CVE-2023-34362 was abused by Cl0p ransomware actors as a part of a widespread marketing campaign in 2023, impacting greater than 2,770 organizations.
The spike in scanning exercise is a sign that MOVEit Switch situations are as soon as once more beneath the risk actor’s scanner, making it important that customers block the offending IP addresses, be sure that the software program is up-to-date, and keep away from publicly exposing them over the web.

Discovered this text fascinating? Comply with us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:CVE, Faces, Flaws, Increased, MOVEit, Scanning, Surges, Targeted, Threats, Transfer

Post navigation

Previous Post: OneClik Malware Targets Energy Sector Using Microsoft ClickOnce and Golang Backdoors
Next Post: Microsoft 365 Direct Send Abused for Phishing

Related Posts

Zoom and Xerox Release Critical Security Updates Fixing Privilege Escalation and RCE Flaws The Hacker News
Why Traditional DLP Solutions Fail in the Browser Era The Hacker News
Over 80,000 Microsoft Entra ID Accounts Targeted Using Open-Source TeamFiltration Tool The Hacker News
Microsoft Fixes 78 Flaws, 5 Zero-Days Exploited; CVSS 10 Bug Impacts Azure DevOps Server The Hacker News
Deepfake Defense in the Age of AI The Hacker News
Chinese Hackers Deploy MarsSnake Backdoor in Multi-Year Attack on Saudi Organization The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Zoom and Xerox Release Critical Security Updates Fixing Privilege Escalation and RCE Flaws
  • Chipmaker Patch Tuesday: Many Vulnerabilities Addressed by Intel, AMD, Nvidia
  • FortiWeb Authentication Bypass Vulnerability Let Attackers Log in As Any Existing User
  • Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code
  • Several Docker Images Contain Infamous XZ Backdoor Planted for More Than a Year

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Zoom and Xerox Release Critical Security Updates Fixing Privilege Escalation and RCE Flaws
  • Chipmaker Patch Tuesday: Many Vulnerabilities Addressed by Intel, AMD, Nvidia
  • FortiWeb Authentication Bypass Vulnerability Let Attackers Log in As Any Existing User
  • Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code
  • Several Docker Images Contain Infamous XZ Backdoor Planted for More Than a Year

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News