Close Menu

    Subscribe to Updates

    Get the latest Tech news from SynapseFlow

    What's Hot

    Ninja Prestige DualBrew System review: espresso and drip coffee don’t get easier than this

    October 19, 2025

    Bluesky adds private bookmarks | TechCrunch

    October 19, 2025

    I use these 5 Windows troubleshooting tools to avoid paying for repairs

    October 19, 2025
    Facebook X (Twitter) Instagram
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    Facebook X (Twitter) Instagram YouTube
    synapseflow.co.uksynapseflow.co.uk
    • AI News & Updates
    • Cybersecurity
    • Future Tech
    • Reviews
    • Software & Apps
    • Tech Gadgets
    synapseflow.co.uksynapseflow.co.uk
    Home»Cybersecurity»Cisco, Fortinet, Palo Alto Networks Devices Targeted in Coordinated Campaign
    Cisco, Fortinet, Palo Alto Networks Devices Targeted in Coordinated Campaign
    Cybersecurity

    Cisco, Fortinet, Palo Alto Networks Devices Targeted in Coordinated Campaign

    The Tech GuyBy The Tech GuyOctober 10, 2025No Comments3 Mins Read0 Views
    Share
    Facebook Twitter LinkedIn Pinterest Email
    Advertisement


    Three exploitation campaigns targeting Cisco and Palo Alto Networks firewalls and Fortinet VPNs originate from IPs on the same subnets, GreyNoise has discovered.

    Advertisement

    The threat intelligence firm initially warned of scanning attempts targeting Cisco ASA devices in early September, roughly three weeks before Cisco disclosed two zero-day vulnerabilities impacting Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall Threat Defense (FTD) software.

    The bugs, tracked as CVE-2025-20333 (CVSS score of 9.9) and CVE-2025-20362 (CVSS score of 6.5), were exploited in attacks linked to the ArcaneDoor espionage campaign, which has been attributed to hackers based in China.

    Last week, GreyNoise warned of a massive increase in scanning activity related to Palo Alto Networks GlobalProtect login portals, as well as a surge in the count of unique ASNs involved.

    The cybersecurity firm noticed a 500% spike in scanning activity over a period of two days, originating from roughly 1,300 IPs. Within days, the number of involved unique IPs surged to 2,200, as more threat actors likely engaged in the activity.

    Over the past week, GreyNoise observed over 1.3 million unique login attempts targeting the Palo Alto Networks firewalls, and has published a list of the credentials used in the campaign.

    On Thursday, the company warned that the scanning campaigns targeting Cisco and Palo Alto Networks firewalls originate from IPs located on the same subnets, and that they can also be tied to brute forcing attacks targeting Fortinet VPNs.

    “Spikes in Fortinet VPN brute force attempts are typically followed by Fortinet VPN vulnerabilities disclosures within six weeks. Block all IPs brute forcing Fortinet SSL VPNs, and consider hardening defenses for firewall and VPN appliances amid these findings,” GreyNoise says.

    Advertisement. Scroll to continue reading.

    In fact, the threat intelligence firm says, roughly 80% of spikes in activity targeting firewall and VPN products from known vendors are an early warning that new vulnerabilities in these products are likely to be disclosed within the following six weeks.

    The three campaigns targeting Cisco, Fortinet, and Palo Alto Networks devices share TCP fingerprints, leverage the same subnets, and show elevated activity at similar times.

    “We assess with high confidence that all three campaigns are at least partially driven by the same threat actor(s),” GreyNoise says. 

    The company has also published a list of credentials used in the Fortinet campaign.

    Related: ZDI Drops 13 Unpatched Ivanti Endpoint Manager Vulnerabilities

    Related: Cisco Patches Zero-Day Flaw Affecting Routers and Switches

    Related: Hackers Looking for Vulnerable Palo Alto Networks GlobalProtect Portals

    Related: Fortinet FortiWeb Flaw Exploited in the Wild After PoC Publication

    Advertisement
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    The Tech Guy
    • Website

    Related Posts

    Sophisticated Malware Deployed in Oracle EBS Zero-Day Attacks

    October 12, 2025

    Apple Bug Bounty Update: Top Payout $2 Million, $35 Million Paid to Date

    October 12, 2025

    ZDI Drops 13 Unpatched Ivanti Endpoint Manager Vulnerabilities

    October 11, 2025

    Juniper Networks Patches Critical Junos Space Vulnerabilities

    October 11, 2025

    RondoDox Botnet Takes ‘Exploit Shotgun’ Approach

    October 11, 2025

    In Other News: Gladinet Flaw Exploitation, Attacks on ICS Honeypot, ClayRat Spyware

    October 10, 2025
    Leave A Reply Cancel Reply

    Advertisement
    Top Posts

    The iPad Air brand makes no sense – it needs a rethink

    October 12, 202516 Views

    Facebook updates its algorithm to give users more control over which videos they see

    October 8, 20257 Views

    Huawei Watch GT 6 Pro review

    October 12, 20256 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Advertisement
    About Us
    About Us

    SynapseFlow brings you the latest updates in Technology, AI, and Gadgets from innovations and reviews to future trends. Stay smart, stay updated with the tech world every day!

    Our Picks

    Ninja Prestige DualBrew System review: espresso and drip coffee don’t get easier than this

    October 19, 2025

    Bluesky adds private bookmarks | TechCrunch

    October 19, 2025

    I use these 5 Windows troubleshooting tools to avoid paying for repairs

    October 19, 2025
    categories
    • AI News & Updates
    • Cybersecurity
    • Future Tech
    • Reviews
    • Software & Apps
    • Tech Gadgets
    Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2025 SynapseFlow All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.