Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Attacks on Palo Alto PAN-OS Global Protect Login Portals Surge from 2,200 IPs

Attacks on Palo Alto PAN-OS Global Protect Login Portals Surge from 2,200 IPs

Posted on October 8, 2025October 8, 2025 By CWS

A large escalation in assaults focusing on Palo Alto Networks PAN-OS GlobalProtect login portals, with over 2,200 distinctive IP addresses conducting reconnaissance operations as of October 7, 2025. 

This represents a big surge from the preliminary 1,300 IPs noticed simply days earlier, marking the very best scanning exercise recorded previously 90 days in keeping with GreyNoise Intelligence monitoring.

The reconnaissance marketing campaign started with a pointy 500% enhance in scanning exercise on October 3, 2025, when researchers noticed roughly 1,300 distinctive IP addresses probing Palo Alto login portals. 

This preliminary surge already represented the most important burst of scanning exercise in three months, with each day volumes beforehand not often exceeding 200 IPs in the course of the previous 90-day interval.

2,200 IPs Scan Palo Portals

Palo Alto PAN-OS GlobalProtect Login Portals Surge

The escalating assault marketing campaign demonstrates subtle coordination throughout geographically distributed infrastructure. 

GreyNoise evaluation reveals that 91% of the malicious IP addresses are geolocated to the US, with extra clusters concentrated in the UK, the Netherlands, Canada, and Russia. 

Safety researchers have recognized roughly 12% of all ASN11878 subnets allotted to scanning Palo login portals, indicating vital infrastructure dedication to this operation.

The assault methodology suggests risk actors are systematically iterating by giant credential databases, with login try patterns indicating automated brute-force operations towards GlobalProtect SSL VPN portals. 

Tempo of Palo Alto distinctive login makes an attempt

GreyNoise has printed a complete dataset containing distinctive usernames and passwords from Palo login makes an attempt noticed in the course of the previous week, enabling safety groups to evaluate potential credential publicity.

Technical evaluation reveals that 93% of collaborating IP addresses had been labeled as suspicious, whereas 7% acquired malicious designations. 

1,285 Distinctive IPs probing Palo Alto login portals

The scanning exercise reveals distinct regional clustering patterns with separate TCP fingerprints, suggesting a number of coordinated risk teams working concurrently.

Safety researchers have recognized potential correlations between the Palo Alto scanning surge and concurrent reconnaissance operations focusing on Cisco ASA units. 

Each assault campaigns share dominant TCP fingerprints linked to infrastructure within the Netherlands, together with comparable regional clustering behaviors and tooling traits.

The cross-technology focusing on suggests a broader reconnaissance marketing campaign towards enterprise distant entry options. 

Concurrent surges noticed throughout a number of distant entry service platforms, although the precise relationship between these actions stays underneath investigation.

The focused nature of those assaults is clear from their concentrate on GreyNoise’s emulated Palo Alto profiles, together with GlobalProtect and PAN-OS programs. 

This precision signifies attackers probably derived goal lists from public reconnaissance platforms akin to Shodan or Censys, or performed their very own fingerprinting operations to determine susceptible Palo Alto units.

Safety groups ought to implement speedy defensive measures, together with IP blocklisting of identified malicious addresses, enhanced monitoring of GlobalProtect portal authentication logs, and implementation of extra entry controls for distant VPN connections.

Cyber Consciousness Month Supply: Upskill With 100+ Premium Cybersecurity Programs From EHA’s Diamond Membership: Be a part of At the moment

Cyber Security News Tags:Alto, Attacks, Global, IPs, Login, Palo, PANOS, Portals, Protect, Surge

Post navigation

Previous Post: Exploitation of Oracle EBS Zero-Day Started 2 Months Before Patching
Next Post: CISA Warns of Zimbra Collaboration Suite (ZCS) XSS Zero-Day Vulnerability Actively Exploited in Attacks

Related Posts

Ransomware Attack 2025 Recap – From Critical Data Extortion to Operational Disruption Ransomware Attack 2025 Recap – From Critical Data Extortion to Operational Disruption Cyber Security News
Arsen Launches Smishing Simulation to Help Companies Defend Against Mobile Phishing Threats Arsen Launches Smishing Simulation to Help Companies Defend Against Mobile Phishing Threats Cyber Security News
Remote Code Execution Risk in Telnetd Impacts Security Remote Code Execution Risk in Telnetd Impacts Security Cyber Security News
New Eleven11bot Hacked 86,000 IP Cameras for Massive DDoS Attack New Eleven11bot Hacked 86,000 IP Cameras for Massive DDoS Attack Cyber Security News
Chinese UNC6384 Hackers Leverages Valid Code Signing Certificates to Evade Detection Chinese UNC6384 Hackers Leverages Valid Code Signing Certificates to Evade Detection Cyber Security News
Researchers Gain Access to StealC Malware Command-and-Control Systems Researchers Gain Access to StealC Malware Command-and-Control Systems Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark