Original Article Text

Click to Toggle View

Massive surge in scans targeting Palo Alto Networks login portals. A spike in suspicious scans targeting Palo Alto Networks login portals indicates clear reconnaissance efforts from suspicious IP addresses, researchers warn.  Cybersecurity intelligence company GreyNoise reports a 500% increase in IP addresses focused on Palo Alto Networks GlobalProtect and PAN-OS profiles. The activity culminated on October 3 with more than 1,285 unique IPs engaged in the activity. Typically, daily scans do not exceed 200 addresses, the company says. Most of the observed IPs were geolocated in the U.S., while smaller clusters were based in the U.K., the Netherlands, Canada, and Russia. One activity cluster concentrated its traffic on targets in the United States and another one focused on Pakistan, the researchers say, noting that both had "distinct TLS fingerprints but not without overlap." According to GreyNoise, 91% of the IP addresses were classified as suspicious. An additional 7% were tagged as malicious. "Nearly all activity was directed at GreyNoise’s emulated Palo Alto profiles (Palo Alto GlobalProtect, Palo Alto PAN-OS), suggesting the activity is targeted in nature, likely derived from public (e.g., Shodan, Censys) or attacker-originated scans fingerprinting Palo Alto devices," explains GreyNoise. GreyNoise has previously warned that such scan activity often indicates preparation for attacks using new exploits for zero-day or n-day flaws. The cybersecurity firm issued a warning recently about increased network scans targeting Cisco ASA devices. Two weeks later, news emerged about a zero-day vulnerability exploited in attacks targeting the same Cisco product. However, GreyNoise says the observed correlation is weaker for the recent scans focusing on Palo Alto Networks products. Grafana also targeted Researchers also noticed an increase in exploitation attempts of an old path traversal vulnerability in Grafana. The security issue is identified as CVE-2021-43798 and was exploited in December 2021 in zero-day attacks. GreyNoise observed 110 unique malicious IPs, most of them from Bangladesh, launching attacks on September 28. The targets were primarily based in the United States, Slovakia, and Taiwan, with the attacks maintaining a consistent destination ratio depending on the specific origin, which typically indicates automation. Greynoise recommends administrators to make sure that their Grafana instances are patched against CVE-2021-43798 and block the identified 110 malicious IP addresses. The researchers also advise checking the logs for evidence of path traversal requests that may return sensitive files. The Security Validation Event of the Year: The Picus BAS Summit Join the Breach and Attack Simulation Summit and experience the future of security validation. Hear from top experts and see how AI-powered BAS is transforming breach and attack simulation. Don't miss the event that will shape the future of your security strategy

Daily Brief Summary

VULNERABILITIES // Surge in Scans Targets Palo Alto Networks and Grafana Systems

GreyNoise reports a 500% rise in suspicious IPs scanning Palo Alto Networks login portals, peaking on October 3 with over 1,285 unique IPs involved.

The scans primarily originated from the U.S., with additional clusters in the U.K., Netherlands, Canada, and Russia, suggesting a coordinated global reconnaissance effort.

91% of the IP addresses were deemed suspicious, while 7% were classified as malicious, indicating potential preparation for exploiting vulnerabilities.

The targeted scans focused on Palo Alto GlobalProtect and PAN-OS profiles, likely sourced from public scanning tools or attacker-originated reconnaissance.

GreyNoise previously linked similar scan activity to exploit preparation, though the correlation with Palo Alto products is currently weaker than past incidents.

An increase in exploitation attempts on Grafana's CVE-2021-43798 vulnerability was also noted, with 110 malicious IPs, mostly from Bangladesh, targeting systems.

Administrators are advised to ensure Grafana systems are patched and to block identified malicious IPs, while monitoring logs for path traversal attempts.