Original Article Text

Click to Toggle View

Nearly 24,000 IPs behind wave of Palo Alto Global Protect scans. A significant spike in scanning activity targeting Palo Alto Network GlobalProtect login portals has been observed, with researchers concerned it may be a prelude to an upcoming attack or flaw being exploited. According to GreyNoise, which reports the activity, the scanning activity involves over 24,000 unique source IP addresses. The activity peaked at 20,000 unique IP addresses per day on March 17, 2025, and continued at this scale until March 26. Of those IPs, 23,800 are classified as "suspicious," while 154 were validated by the threat monitoring firm as "malicious," leaving little doubt about the activity's true intentions. Most of the scanning attempts originate from the United States and Canada. Most targeted systems are based in the United States, though other countries are targeted too. GreyNoise noted that in the past, such spikes in network scanning have been linked to preparatory reconnaissance, which was eventually followed by the disclosure of flaws two to four weeks later. "Over the past 18 to 24 months, we've observed a consistent pattern of deliberate targeting of older vulnerabilities or well-worn attack and reconnaissance attempts against specific technologies," states Bob Rudis, VP of Data Science at GreyNoise. "These patterns often coincide with new vulnerabilities emerging 2 to 4 weeks later." GreyNoise underlined the consistency in how the scanning activity is performed, suggesting that it could be part of an effort to test network defenses before attempting targeted exploitation. The researchers have also found a link to another activity they have been observing recently, concerning a PAN-OS crawler that also spiked on March 26, 2025, involving 2,580 IPs in its scans. GreyNoise noted that the activity is reminiscent of the espionage campaign Cisco Talos attributed to 'ArcaneDoor' hackers roughly a year ago, targeting edge devices. At this time, the exact nature and goals of this large-scale activity remain blurry, but the takeaway for administrators of internet-exposed Palo Alto Networks systems should be to elevate their vigilance against probing and potential exploitation attempts. GreyNoise recommends reviewing logs since mid-March to evaluate if you have been targeted, hunt for signs of compromise, harden login portals, and block known malicious IPs (shared in the report). BleepingComputer has contacted Palo Alto Networks for a comment on the activity Greynoise sees, and we will update this post when we hear back. Top 10 MITRE ATT&CK© Techniques Behind 93% of Attacks Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.

Daily Brief Summary

CYBERCRIME // Massive Scanning of Palo Alto Networks Portals Detected

A significant increase in scanning attacks targeting Palo Alto Networks GlobalProtect login portals has been observed.

Over 24,000 unique IP addresses were recorded participating in the activity, with a peak of 20,000 IPs per day starting from March 17, 2025.

The majority of these source IPs originate from the United States and Canada, primarily focusing on systems based in the USA.

Of the detected IPs, 23,800 are classified as “suspicious,” and 154 have been confirmed as "malicious."

The scanning pattern suggests a potential prelude to exploiting vulnerabilities, historically found to surface two to four weeks after such reconnaissance activities.

GreyNoise has noted a similar pattern over the last 18 to 24 months, involving targeted attacks and reconnaissance on known vulnerabilities.

The scanning activity may be related to another identified pattern involving a PAN-OS crawler that spiked concurrently on March 26, 2025.

Administrators are advised to review logs since mid-March for signs of compromise and to implement defensive measures against potential exploitation attempts.