5 Alarming Trends: 24,000 IP Attacks on Palo Alto Networks Uncovered



Introduction to the Cybersecurity Threat

In a recent cybersecurity revelation, researchers have observed an alarming increase in malicious scanning activities aimed at Palo Alto Networks’ GlobalProtect VPN portals. This orchestrated attack involves nearly 24,000 unique IP addresses, signifying a sophisticated effort by cybercriminals to probe and exploit vulnerabilities within network defenses.

Timeline and Scope of the Attacks

The aggressive scanning campaign kicked off on March 17, 2025, with the daily activity peaking at around 20,000 unique IP addresses. By March 26, however, the frequency of these attacks started to decrease, suggesting a temporal but intensive probing period aimed at identifying potential weaknesses in cybersecurity armor.

Identifying Suspicious and Malicious IPs

Analytical efforts by GreyNoise pinpointed most of the scanning sources as suspicious, tagging 154 out of 23,800 IPs as definitively malicious. This scrutiny highlights the persistent danger and sophistication inherent in these cyber assault efforts.

In-Depth Analysis of Attack Patterns

Experts like Bob Rudis, VP of Data Science at GreyNoise, have noted a pattern in the attacks over the last 18 to 24 months. These activities typically preprocess the exploitation of older vulnerabilities or repeat known attack vectors, often preceding the emergence of new vulnerabilities by two to four weeks.

Technical Insights into Attack Mechanisms

  • Utilization of three unique JA4h network fingerprint hashes connected to login scanner tools, which aid attackers in coordinating and varying their IP sources without losing the continuity of their probing attempts.

Geographical Origins and Targets

The bulk of this suspicious scanning originated from the United States (16,249 IPs) and Canada (5,823 IPs), with additional minor contributions from overseas locations like Finland, the Netherlands, and Russia. Interestingly, the targeted systems were predominantly located within the United States.

Linkage to Prior Cyber Reconnaissance Efforts

These activities bear similarity to previous espionage campaigns that focused on perimeter network devices, particularly those conducted in 2024. On March 26, a noted spike in “PAN-OS Crawler” traffic involved 2,580 distinct source IPs, further underlining the related nature of these probes.

Protective Measures and Recommendations

Given the scale and potential damage of these probes, it is crucial for organizations utilizing Palo Alto Networks’ solutions to undertake immediate reviews of their March logs, enforce stringent monitoring protocols, conduct comprehensive threat assessments, and update all pertinent security measures to guard against these and future attacks.

Stay Vigilant with Threat Intelligence Tools

Enhance your cybersecurity posture by employing advanced threat intelligence tools to detect and mitigate the impact of malicious IPs and phishing attacks effectively.

Source

Related: 5 Urgent Steps to Overcome VMware Workstation Update Failures Due to Broadcom URL Change

Last Updated: April 1, 2025