Cloud Devices Under Attack: 251 IPs Exploit 75 Flaws

Home/BOTNET, Exploitation, Internet Security, Security Advisory, Security Update/Cloud Devices Under Attack: 251 IPs Exploit 75 Flaws

Cloud Devices Under Attack: 251 IPs Exploit 75 Flaws

On May 8, 2025, cybersecurity analysts at GreyNoise identified a large-scale and tightly coordinated scanning campaign that swept across 75 known exposure points on the internet—all within a 24-hour window.

The operation was launched using 251 unique IP addresses, all geolocated to Japan and hosted by Amazon Web Services (AWS).

These IPs were inactive before and after the campaign, indicating the likely use of temporary, rented cloud infrastructure to carry out the scan and then disappear—a tactic often seen in professional, stealthy attacks.

Instead of random, opportunistic probing, this was a targeted operation, carefully mapped out and likely automated, suggesting it was centrally planned using custom tooling or orchestration scripts.

The attackers were not just scanning at random—they were actively probing for known vulnerabilities and misconfigurations across a wide range of commonly deployed enterprise systems. GreyNoise detected 75 distinct behaviors as part of the campaign, including:

Exploitation Attempts for Known CVEs:

  • Adobe ColdFusion – CVE-2018-15961 (Remote Code Execution)
  • Apache Struts – CVE-2017-5638 (OGNL Injection)
  • Elasticsearch – CVE-2015-1427 (Groovy Sandbox RCE)
  • Atlassian Confluence – CVE-2022-26134 (OGNL Injection)
  • Bash (Shellshock) – CVE-2014-6271

Other Activities:

  • Scanning for vulnerable CGI scripts
  • Exposing environment variables
  • Checking for leaked .git directories or config files
  • Attempting shell uploads
  • Performing WordPress author enumeration (to prepare for brute-force or privilege escalation)

For example, the tag “ColdFusion RCE Attempt” would be triggered if GreyNoise detects exploit traffic like this in HTTP requests:

POST /cfide/adminapi/base.cfc?method=login HTTP/1.1
Host: vulnerable-server
Content-Type: application/x-www-form-urlencoded
Content-Length: 45

cfcPath=../../../../../../../../etc/passwd

This request tries to access system files using directory traversal, a clear sign of an attack attempt.

Recommended Defensive Actions

  • Monitor for GreyNoise tags associated with known CVEs
  • Block AWS-sourced scanning activity where appropriate
  • Review logs for abnormal HTTP requests or access attempts
  • Patch systems affected by the listed CVEs
  • Harden public-facing apps against common misconfigurations

Risk Factors

Risk FactorDescriptionSeverityMitigation
Legacy CVEsOld, unpatched flaws still being targetedHighPatch regularly, scan for vulns
Edge InfrastructureTools can scan wide areas quicklyHighAudit systems, segment networks
Cloud IP RotationAttackers use throwaway IPs to bypass blocksMediumUse dynamic blocking, threat intel
Misconfig ScansLooks for weak setups and leaked settingsMediumHarden configs, monitor constantly
Broad ReconAttackers hit any weak point, not just oneHighAssess overall security posture
Automation & OrchestrationAttacks run fast using single toolsetsHighAutomate detection

The May 8 campaign shows how fast and advanced cloud-driven attacks have become. Organizations need to:

  • Patch known CVEs
  • Use real-time threat intelligence
  • Monitor edge and legacy systems closely

These types of scans often come just before major zero-day exploits, so acting quickly is key to staying secure.

‍Follow Us on: Twitter, InstagramFacebook to get the latest security news!

By | 2025-06-10T22:35:03+05:30 May 28th, 2025|BOTNET, Exploitation, Internet Security, Security Advisory, Security Update|

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!