Cyber Attack Targets 2.8 Million IPs on VPN Devices

A massive cyber attack using 2.8 million IPs targets VPN devices and other network appliances via brute-force attacks, primarily impacting Brazil.
Cyber Attack Targets 2.8 Million IPs on VPN Devices
Table of Contents
    Add a header to begin generating the table of contents

    A Massive Cyber Attack: 2.8 Million IPs Targeted

    Millions of internet-connected devices are under attack in a massive cyber attack. Security researchers at The Shadowserver Foundation while speaking to BleepingComputer have observed a significant brute-force attack targeting a wide range of devices. The scale is enormous: approximately 2.8 million unique IP addresses are involved in this cyber attack.

    The Targets: VPNs and More

    The primary targets of this cyber attack are Virtual Private Network (VPN) devices. However, the attackers aren’t limiting themselves. They’re also targeting gateways, security appliances, and other edge devices connected to the internet. Popular brands like Palo Alto Networks, Ivanti, SonicWall, and others are among the affected.

    “Someone is currently using roughly 2.8 million different IP addresses to try and guess the passwords for VPNs and similar devices,” The Shadowserver Foundation reported.

    Brute-Force Tactics and Geographic Impact

    The attackers are using a brute-force approach. This means they’re systematically trying countless username and password combinations until they find one that works. This cyber attack is effective because many devices have weak passwords—passwords lacking a mix of uppercase and lowercase letters, numbers, and special symbols.

    The geographic distribution of the 2.8 million IPs involved in this cyber attack is telling. The majority (1.1 million) are located in Brazil. Other heavily impacted regions include Turkey, Russia, Argentina, Morocco, and Mexico.

    Automation and the Botnet

    This cyber attack relies heavily on automation. The attackers likely use a botnet—a network of compromised devices—or residential proxy services. Residential proxies mask the attackers’ true location, making it harder to trace them. These services use IP addresses assigned to legitimate home devices, making them appear as though the attack originates from ordinary users. This makes them attractive targets for cybercriminals.

    The Shadowserver Foundation noted a recent surge in the intensity of this cyber attack. The use of compromised MikroTik, Huawei, Cisco, Boa, and ZTE routers further highlights the sophisticated nature of this operation. These routers, likely infected with malware or vulnerable due to weak passwords, are being used as part of the botnet to amplify the attack. This cyber attack serves as a stark reminder of the importance of strong passwords and regular security updates for all internet-connected devices.

    Related Posts