Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
LLMs in Attacker Crosshairs, Warns Threat Intel Firm

LLMs in Attacker Crosshairs, Warns Threat Intel Firm

Posted on January 12, 2026January 12, 2026 By CWS

Risk actors have been probing misconfigured proxy servers that might present them with entry to LLM APIs, risk intelligence agency GreyNoise experiences.

Between October 2025 and January 2026, the corporate’s honeypots captured over 91,000 assault periods, together with assaults related to two campaigns.

The primary began in October and relied on ProjectDiscovery’s OAST (Out-of-band Software Safety Testing) infrastructure to use server-side request forgery (SSRF) vulnerabilities.

The marketing campaign spiked over Christmas and a lot of the assaults had the identical signature, suggesting automated tooling.

Primarily based on the noticed VPS-based assault infrastructure, GreyNoise believes that the marketing campaign was carried out by safety researchers or bug hunters, however doesn’t exclude the potential of a grey-hat operation.

The second marketing campaign began on December 28 and concerned 80,469 assault periods over an 11-day interval. The attackers had been probing greater than 70 LLM mannequin endpoints, on the lookout for misconfigurations that might leak entry to industrial APIs, GreyNoise explains.Commercial. Scroll to proceed studying.

The assaults carried out reconnaissance in opposition to fashions from OpenAI (GPT-4o and variants), Anthropic (Claude Sonnet, Opus, Haiku), Meta (Llama 3.x), DeepSeek (DeepSeek-R1), Google (Gemini), Mistral, Alibaba (Qwen), and xAI (Grok).

“Take a look at queries stayed intentionally innocuous with the probably aim to fingerprint which mannequin truly responds with out triggering safety alerts,” GreyNoise notes.

The assaults originated from two IP addresses related to the exploitation of greater than 200 vulnerabilities, together with CVE-2025-55182 (React2Shell) and CVE-2023-1389, a command injection bug in TP-Hyperlink Archer AX21 routers.

Based on GreyNoise, the marketing campaign is probably going mounted by a risk actor conducting reconnaissance to construct a goal listing in preparation for a bigger exploitation operation.

Associated: Rethinking Safety for Agentic AI

Associated: Chrome Extensions With 900,000 Downloads Caught Stealing AI Chats

Associated: WormGPT 4 and KawaiiGPT: New Darkish LLMs Increase Cybercrime Automation

Associated: 5 Cybersecurity Predictions for 2026: Id, AI, and the Collapse of Perimeter Pondering

Security Week News Tags:Attacker, Crosshairs, Firm, Intel, LLMs, Threat, Warns

Post navigation

Previous Post: India Continues to Be the Top Target for Mobile Attacks with 38% Increase in Threats
Next Post: Web3 Developer Environments Targeted by Social Engineering Campaign Leveraging Fake Interview Software

Related Posts

Android Crypto Wallets at Risk Due to SDK Flaw Android Crypto Wallets at Risk Due to SDK Flaw Security Week News
Over 300,000 Individuals Impacted by Vitas Hospice Data Breach Over 300,000 Individuals Impacted by Vitas Hospice Data Breach Security Week News
Checkmarx Supply Chain Attack Leads to Data Breach Checkmarx Supply Chain Attack Leads to Data Breach Security Week News
Tens of Thousands of Malicious NPM Packages Distribute Self-Replicating Worm Tens of Thousands of Malicious NPM Packages Distribute Self-Replicating Worm Security Week News
Critical Vulnerability Exposes Many Mitel MiCollab Instances to Remote Hacking Critical Vulnerability Exposes Many Mitel MiCollab Instances to Remote Hacking Security Week News
Quest KACE Security Flaw Potentially Exploited by Hackers Quest KACE Security Flaw Potentially Exploited by Hackers Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark