By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Web Raiders Unleash Global Brute Force Attacks From 2.8M IP Addresses
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Web Raiders Unleash Global Brute Force Attacks From 2.8M IP Addresses
Computing

Web Raiders Unleash Global Brute Force Attacks From 2.8M IP Addresses

News Room
Last updated: 2025/02/12 at 8:42 AM
News Room Published 12 February 2025
Share
SHARE

A weeks-long brute force attack campaign by malicious actors has reached mammoth proportions, according to a non-profit security organization.

The Shadowserver Foundation reports that the campaign, which has been ongoing since January, involves as many as 2.8 million IP addresses daily, targeting VPN devices, firewalls, and gateways from vendors like Palo Alto Networks, Ivanti, and SonicWall.

“The recent wave of brute force attacks targeting edge security devices, as reported by Shadowserver, is a serious concern for cybersecurity teams,” said Brent Maynard, senior director for security technology and strategy at Akamai Technologies, a content delivery network service provider, in Cambridge, Mass.

“What makes this attack stand out is both its scale — millions of unique IPs attempting access daily — and the fact that it’s hitting critical security infrastructure like firewalls, VPNs, and secure gateways,” Maynard told TechNewsWorld.

“These aren’t just any devices. They’re the frontline defenses that protect organizations from external threats. If an attacker gains control over them, they can bypass security controls entirely, leading to data breaches, espionage, or even destructive attacks.”

In a brute force attack, waves of passwords and usernames inundate a login target in an attempt to discover valid login credentials. Compromised devices may be used for data theft, botnet integration, or illegal network access.

Massive Botnet Threat Escalates

“This type of botnet activity is not new. However, the scale is worrisome,” observed Thomas Richards, a network and red team practice director at Black Duck Software, an applications security company in Burlington, Mass.

“Depending on the type of device compromised, the attackers could leverage their access to disable internet access to the organization, disrupt networks communicating or facilitate their own access inside the network,” Richards told TechNewsWorld. “The attack, even if unsuccessful in gaining access to the devices, can cause harm by attempting too many login attempts and having valid accounts locked out.”

Patrick Tiquet, vice president for security and architecture at Keeper Security, a Chicago-based password management and online storage company, explained that brute force attacks are significant because they exploit weak or reused passwords, one of the most persistent vulnerabilities in cybersecurity.

“Beyond immediate data loss, these breaches can disrupt operations, damage an organization’s reputation, and erode customer trust — leading to long-term financial and security consequences,” he told TechNewsWorld.

Erich Kron, a security awareness advocate at KnowBe4, a security awareness training provider in Clearwater, Fla., added that the source of these attacks is millions of smaller devices spread around the globe, making them extremely difficult to defend against.

“Many consumers have old and outdated devices in their homes connecting to the internet,” Kron told TechNewsWorld. “These vulnerable devices are being exploited and used to drive cyberattacks like this.”

“Traditional approaches such as geoblocking and disallowing large blocks of IP addresses could actually block legitimate web traffic, costing some organizations sales and appearing as if the website is down to potential customers,” he said.

Credential-Based Attacks Overwhelm Defenses

Kris Bondi, CEO and co-founder of Mimoto, a threat detection and response company in San Francisco, asserted that the campaign exposed by Shadowserver highlights the vulnerability of credentials, even at security and infrastructure organizations.

“Brute force attacks are automated, so they’re implemented at scale,” Bondi told TechNewsWorld. “It’s not a question of if they can get in with this approach. The question is how many times the organization will be penetrated this way, and will the security team know when it happens.”

Akamai’s Maynard explained: “Attackers no longer need to sit at a keyboard guessing passwords. They deploy massive botnets that can test thousands of credentials in minutes.”

“Using an attack called password spraying, attackers can use a known username or email address and pair it with tens of thousands of the most common passwords with software that will then try to log into various exposed devices,” added KnowBe4’s Kron. “With several million devices available to be attempting these logins, the success rate is liable to be high.”

Bondi noted that the number and size of brute force attacks are rising. “Automation and generative AI have made it easier to implement this type of attack,” she said.

“They are hitting the large vulnerability that credentials represent,” she continued. “The attackers know that if they send enough attacks, some percentage will get through. In the meantime, security teams are overwhelmed and aren’t able to address all the attacks in real time, particularly without additional context.”

The explosion of internet-connected devices and the continued use of weak credentials also contribute to increased brute force attacks.

“With remote work, smart devices, and cloud adoption, more organizations rely on edge security devices that must be accessible from the internet,” Maynard said. “This makes them natural targets.”

“Despite years of warnings,” he added, “many companies still use default or weak passwords, especially on infrastructure devices.”

AI’s Role in Cyberattack Defense and Prevention

While artificial intelligence contributes to the rise in brute force attacks, it may also foil them. “AI has the potential to be a game-changer in defending against brute force and credential stuffing attacks,” Maynard said.

He noted that security teams are using AI-driven solutions to detect anomalies, analyze behavior, and automate responses to attacks.

“AI is very good at spotting anomalies and patterns. Therefore, AI can be very useful at looking at attempted logins, finding a pattern, and hopefully suggesting ways to filter the traffic,” Kron explained.

Jason Soroko, senior vice president of product at Sectigo, a global digital certificate provider, acknowledged that AI could help defenses by detecting anomalous login patterns and throttling suspicious activity in real time, but advised that strong authentication be prioritized first.

“While strong authentication needs identity management to scale and digital certificates and other strong asymmetric form factors need provisioning and lifecycle management, they can yield very strong security benefits,” Soroko told TechNewsWorld.

However, Bondi predicted AI will eventually vacate the need for credentials. “AI enables combining anomaly detection with advanced pattern matching to recognize specific people, not credentials, with significantly lower rates of false positives,” she said.

AI can also help deliver context with alerts, which will enable security teams to prioritize and respond faster to true alerts while reducing false positives, she added.

“The expectation is that in the near future, AI will also be able to help predict intent based on specific actions and techniques of an attack,” Bondi observed. “While LLMs aren’t capable of this yet, they could be within a few quarters.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Apple’s new robot looks like the Pixar lamp
Next Article https://news.google.com/read/CBMibEFVX3lxTE1zMHMwNDlIM3FWMkljMExCeWZPdWMyd2Z5eTRTU1JFUzFGRTc3OE1xMlZXTjk0aHBVZENFcXFHRE0tOVJHLWF4dGxIeXhRQjlCQzN6V3hhcFIweHlMMVFfZm5SV1RBTUxKOEUyb9IBckFVX3lxTE10QmtYT1AtbXlNRERiVWNvc0ZnRzZGYnRvMGdDWGdyMG0yNjIyYThuLW4yVkFXQ2FtMzBCRi1KakNubmx2Nlh0U0NrQUM2NmprVmtVN3QzMWVoLXZEREh1aG55YXFHbzNxdzd2MzRiQ1dnQQ?hl=en-GB&gl=GB&ceid=GB%3Aen
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Today's NYT Connections Hints, Answers for May 12, #701
News
Fortnite includes Apple IAP and Epic checkout, fate rests with App Store review – 9to5Mac
News
Top 100 Best Budget Buys: Affordable, Tested Tech That’s Actually Worth It
News
Save over $300 on a robot vacuum that’s probably smarter than you
News

You Might also Like

Computing

Free Script Writing Templates for Professional Screenwriting

23 Min Read
Computing

Top 10 Clockify Alternatives For Time Tracking & Productivity

26 Min Read
Computing

TikTok faces large-scale content removal after major falling out with Universal Music Group · TechNode

3 Min Read
Computing

Ad Hoc Meeting Essentials: 7 Key Steps for Success |

28 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?