Article Details
Scrape Timestamp (UTC): 2025-09-08 21:45:20.263
Original Article Text
Click to Toggle View
Surge in networks scans targeting Cisco ASA devices raise concerns. Large network scans have been targeting Cisco ASA devices, prompting warnings from cybersecurity researchers that it could indicate an upcoming flaw in the products. GreyNoise has recorded two significant scanning spikes in late August, with up to 25,000 unique IP addresses probing ASA login portals and also Cisco IOS Telnet/SSH. The second wave, logged on August 26, 2025, was largely (80%) driven by a Brazilian botnet, using roughly 17,000 IPs. In both cases, the threat actors used overlapping Chrome-like user agents, suggesting a common origin. The scanning activity predominantly targeted the United States, while the UK and Germany were also targeted. GreyNoise has previously explained that such reconnaissance activity precedes the disclosure of new vulnerabilities on the scanned products in 80% of cases. Statistically, this correlation was weaker for Cisco, compared to other vendors, but information about such spikes can still be to helpful to defenders in enhancing their monitoring and proactive measures. These scans are commonly failed exploitation attempts of already-patched bugs, but they can also be enumeration and mapping efforts in preparation for exploiting new flaws. A separate report published earlier by system administrator 'NadSec – Rat5ak' reports overlapping activity that started on July 31 with low opportunistic scans that escalated in mid-August and culminated on August 28. Rat5ak saw 200,000 hits on Cisco ASA endpoints within 20 hours, with a uniform 10k/IP traffic that appeared highly automated. The administrator reports that the activity came from three ASNs, namely Nybula, Cheapy-Host, and Global Connectivity Solutions LLP. System administrators are advised to apply the latest security updates on Cisco ASA to patch known vulnerabilities, enforce multi-factor authentication (MFA) for all remote ASA logins, and avoid exposing /+CSCOE+/logon.html, WebVPN, Telnet, or SSH directly. If external access is required, a VPN concentrator, reverse proxy, or access gateway should be used to enforce additional access controls. Finally, use the scanning activity indicators shared in GreyNoise and Rat5ak's reports to preemptively block these attempts, or use geo-blocking and rate limiting for regions far from your organization. BleepingComputer has contacted Cisco for a comment on the observed activity, and we will update this post when we hear back from them. Picus Blue Report 2025 is Here: 2X increase in password cracking 46% of environments had passwords cracked, nearly doubling from 25% last year. Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.
Daily Brief Summary
Recent network scans have targeted Cisco ASA devices, with GreyNoise recording significant spikes involving up to 25,000 unique IP addresses probing ASA login portals.
A Brazilian botnet drove 80% of the second wave of scans, utilizing approximately 17,000 IPs, primarily targeting the United States, with additional focus on the UK and Germany.
Overlapping Chrome-like user agents suggest a common origin for the scanning activity, indicating potential reconnaissance for future vulnerabilities.
GreyNoise notes that such reconnaissance often precedes new vulnerability disclosures, though this correlation is statistically weaker for Cisco products.
System administrators are urged to apply the latest security updates, enforce multi-factor authentication, and avoid exposing certain services directly to the internet.
Utilizing scanning activity indicators from GreyNoise and Rat5ak's reports can help preemptively block these attempts, enhancing organizational cybersecurity posture.
Cisco has been contacted for comment, and further updates are anticipated as more information becomes available.