Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
2.5 Million+ Malicious Request From Hackers Attacking Adobe ColdFusion Servers

2.5 Million+ Malicious Request From Hackers Attacking Adobe ColdFusion Servers

Posted on December 29, 2025December 29, 2025 By CWS

A coordinated exploitation marketing campaign that generated greater than 2.5 million malicious requests towards Adobe ColdFusion servers and 47+ different know-how platforms in the course of the Christmas 2025 vacation interval.

The operation was attributed to a single risk actor working from Japan-based infrastructure. This means a complicated scanning effort by attackers in search of each legacy and new vulnerabilities courting again 20 years.

The targeted ColdFusion part of the marketing campaign exploited 10+ crucial CVEs from 2023–2024, with peak exercise on Christmas Day accounting for 68% of assault site visitors.

The deliberate timing throughout vacation downtime, when safety groups usually function at lowered capability, suggests intentional concentrating on of monitoring gaps.

Roughly 5,940 requests focused ColdFusion servers throughout 20 nations, with the USA accounting for 68% of classes.

Two major IP addresses (134.122.136.119 and 134.122.136.96) hosted by CTG Server Restricted generated the overwhelming majority of assault site visitors.

Assault Warmth map (Supply: Greynoise)

The risk actor leveraged ProjectDiscovery Interactsh, an out-of-band testing platform, for callback verification, deploying almost 10,000 distinctive OAST domains throughout oast.professional, oast. Web site, and oast.me companies.

The first assault vector exploited WDDX deserialization to set off JNDI/LDAP injection, concentrating on the com.solar.rowset.JdbcRowSetImpl gadget chain. Notably, the ColdFusion exercise represents solely 0.2% of the broader operation.

Full marketing campaign evaluation reveals systematic reconnaissance throughout 767 distinct CVEs affecting Java software servers, net frameworks, CMS platforms, and enterprise purposes.

Probably the most incessantly focused vulnerabilities had been CVE-2022-26134 (Confluence OGNL injection) with 12,481 requests and CVE-2014-6271 (Shellshock) with 8,527 requests.

Community fingerprinting evaluation recognized 4,118 distinctive JA4H HTTP signatures, indicating that template-based scanning was possible carried out utilizing Nuclei or related frameworks.

The attacker’s infrastructure exhibited regarding associations: CTG Server Restricted beforehand hosted phishing infrastructure concentrating on luxurious manufacturers, together with Chanel and Cartier, and introduced Bogon routes, suggesting insufficient community hygiene.

In accordance with GreyNoise Labs, organizations ought to instantly block the recognized IP addresses and ASNs, implement signatures for the printed JA4+ fingerprints, and prioritize patching ColdFusion and Java-based infrastructure.

The marketing campaign’s scale and class point out superior reconnaissance capabilities typical of preliminary entry brokers getting ready for downstream assaults.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Adobe, Attacking, ColdFusion, Hackers, Malicious, Million, Request, Servers

Post navigation

Previous Post: New Vulnerabilities in Bluetooth Headphones Let Hackers Hijack Connected Smartphone
Next Post: Top US Accounting Firm Sax Discloses 2024 Data Breach Impacting 220,000

Related Posts

vLLM Vulnerability Enables Remote Code Execution Via Malicious Payloads vLLM Vulnerability Enables Remote Code Execution Via Malicious Payloads Cyber Security News
Vulnerabilities in Preinstalled Android Apps Expose PIN Codes and Allow Command Injection Vulnerabilities in Preinstalled Android Apps Expose PIN Codes and Allow Command Injection Cyber Security News
Cybersecurity News Weekly Newsletter – Windows, Chrome, and Apple 0-days, Kali Linux 2025.4, and MITRE Top 25 Cybersecurity News Weekly Newsletter – Windows, Chrome, and Apple 0-days, Kali Linux 2025.4, and MITRE Top 25 Cyber Security News
81% Router Usres Have Not Changed Default Admin Passwords, Exposing Devices to Hackers 81% Router Usres Have Not Changed Default Admin Passwords, Exposing Devices to Hackers Cyber Security News
Metasploit Update: New Exploits Target Linux, BeyondTrust Metasploit Update: New Exploits Target Linux, BeyondTrust Cyber Security News
Lite XL Text editor Vulnerability Let Attackers Execute Arbitrary Code Lite XL Text editor Vulnerability Let Attackers Execute Arbitrary Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark