Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Actively Exploiting AI Deployments

Hackers Actively Exploiting AI Deployments

Posted on January 9, 2026January 9, 2026 By CWS

Safety researchers have recognized over 91,000 assault classes focusing on AI infrastructure between October 2025 and January 2026, exposing systematic campaigns towards giant language mannequin deployments.

GreyNoise’s Ollama honeypot infrastructure captured 91,403 assault classes throughout this era, revealing two distinct menace campaigns. The findings corroborate and prolong earlier analysis from Defused on AI system focusing on.

The primary marketing campaign exploited server-side request forgery vulnerabilities to power servers into making outbound connections to attacker-controlled infrastructure.

Attackers focused Ollama’s mannequin pull performance by injecting malicious registry URLs and manipulating Twilio SMS webhook MediaUrl parameters.

SSRF Enumeration (Supply: Greynoise)

The marketing campaign ran from October 2025 by January 2026, with a dramatic spike over Christmas, 1,688 classes in simply 48 hours.

Attackers used ProjectDiscovery’s OAST infrastructure to verify profitable exploitation through callback validation.

Fingerprinting revealed a single JA4H signature showing in 99% of assaults, indicating shared automation tooling possible based mostly on Nuclei.

Whereas 62 supply IPs unfold throughout 27 nations have been noticed, constant fingerprints counsel VPS-based infrastructure fairly than a botnet.

GreyNoise assesses this as possible grey-hat operations by bug bounty hunters, although the dimensions and timing increase moral considerations.

Enumeration Marketing campaign: Constructing Goal Lists

Beginning December 28, 2025, two IPs launched methodical probes of 73+ LLM mannequin endpoints, producing 80,469 classes in eleven days.

This systematic reconnaissance sought misconfigured proxy servers which may expose entry to business APIs.

The assaults examined OpenAI-compatible and Google Gemini codecs throughout each main mannequin household: OpenAI GPT-4o, Anthropic Claude, Meta Llama 3.x, DeepSeek-R1, Google Gemini, Mistral, Alibaba Qwen, and xAI Grok.

Check queries remained intentionally innocuous, with “hello” showing 32,716 occasions and “What number of states are there in the USA?” showing 27,778 occasions, possible aiming to fingerprint fashions with out triggering safety alerts.

The infrastructure factors to skilled menace actors: 45.88.186.70 (AS210558, 1337 Companies GmbH): 49,955 classes 204.76.203.125 (AS51396, Pfcloud UG): 30,514 classes

Each IPs have intensive histories of CVE exploitation, with over 4 million mixed sensor hits throughout greater than 200 vulnerabilities, together with CVE-2025-55182 and CVE-2023-1389.

Block these community indicators:

JA4HDomainsIPspo11nn060000…*.oast.dwell, *.oast.me, *.oast.on-line, *.oast.professional, *.oast.enjoyable, *.oast.website, *.oast.today45.88.186.70, 204.76.203.125, 134.122.136.119, 134.122.136.96, 112.134.208.214, 146.70.124.188, 146.70.124.165

Enable Ollama to make outbound connections solely to permitted addresses. Block all different outgoing site visitors so attackers can’t use it for SSRF callbacks.

Eighty thousand enumeration requests symbolize a major funding. Risk actors don’t map infrastructure at this scale with out plans to use it.

When you’re working uncovered LLM endpoints, you’re possible already on somebody’s goal checklist.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Actively, Deployments, Exploiting, Hackers

Post navigation

Previous Post: FBI Warns North Korean Hackers Using Malicious QR Codes in Spear-Phishing
Next Post: New Ghost Tapped Attack Uses Your Android Device to Drain Your Bank Account

Related Posts

Microsoft’s New AI Agent Project to Detect Malware with Reverse Engineering Tools Microsoft’s New AI Agent Project to Detect Malware with Reverse Engineering Tools Cyber Security News
A New Tool that Automates GitHub Device Code Phishing Attack A New Tool that Automates GitHub Device Code Phishing Attack Cyber Security News
New Banking Malware Abusing WhatsApp to Gain Complete Remote Access to Your Computer New Banking Malware Abusing WhatsApp to Gain Complete Remote Access to Your Computer Cyber Security News
Microsoft Windows 11 October Update Breaks Localhost (127.0.0.1) Connections Microsoft Windows 11 October Update Breaks Localhost (127.0.0.1) Connections Cyber Security News
Google Chrome RCE Vulnerability Details Released Along with Exploit Code Google Chrome RCE Vulnerability Details Released Along with Exploit Code Cyber Security News
CISA Warns of Hackers Actively Exploiting Windows Server Update Services RCE Vulnerability in the Wild CISA Warns of Hackers Actively Exploiting Windows Server Update Services RCE Vulnerability in the Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News