Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Over 400 IPs Exploiting Multiple SSRF Vulnerabilities in Coordinated Cyber Attack

The Hacker News by The Hacker News
March 12, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Mar 12, 2025Ravie LakshmananCloud Security / Vulnerability

Threat intelligence firm GreyNoise is warning of a “coordinated surge” in the exploitation of Server-Side Request Forgery (SSRF) vulnerabilities spanning multiple platforms.

“At least 400 IPs have been seen actively exploiting multiple SSRF CVEs simultaneously, with notable overlap between attack attempts,” the company said, adding it observed the activity on March 9, 2025.

The countries which have emerged as the target of SSRF exploitation attempts include the United States, Germany, Singapore, India, Lithuania, and Japan. Another notable country is Israel, which has witnessed a surge on March 11, 2025.

Cybersecurity

The list of SSRF vulnerabilities being exploited are listed below –

Cybersecurity

GreyNoise said that many of the same IP addresses are targeting multiple SSRF flaws at once rather than focusing on one particular weakness, noting the pattern of activity suggests structured exploitation, automation, or pre-compromise intelligence gathering.

In light of active exploitation attempts, it’s essential that users apply the latest patches, limit outbound connections to necessary endpoints, and monitor for suspicious outbound requests.

“Many modern cloud services rely on internal metadata APIs, which SSRF can access if exploited,” GreyNoise said. “SSRF can be used to map internal networks, locate vulnerable services, and steal cloud credentials.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
The Hacker News

The Hacker News

Next Post
CrowdStrike, Accenture Launch ‘Major’ SIEM Modernization Partnership

CrowdStrike, Accenture Launch 'Major' SIEM Modernization Partnership

Recommended.

TTA Showcases Taiwanese Startups at VivaTech for 7th Consecutive Year, Achieving 2nd Place in the Event’s Tech for Change Awards

TTA Showcases Taiwanese Startups at VivaTech for 7th Consecutive Year, Achieving 2nd Place in the Event’s Tech for Change Awards

June 12, 2025
Financial firms plan to increase software spending this year

Financial firms plan to increase software spending this year

February 11, 2025

Trending.

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

March 10, 2026
Huawei lanceert Next Generation FAN-oplossing

Huawei lanceert Next Generation FAN-oplossing

March 7, 2026
Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

February 26, 2026
Half of Google’s software development now AI-generated | Computer Weekly

Half of Google’s software development now AI-generated | Computer Weekly

February 5, 2026
Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

March 24, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio