Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

Pakistan defeats Bangladesh with seven wickets and sweeps the T20 series when Harris hits. Cricket News

Early AI investor Elad Gil found his next big bet: AI-powered rollup

Aid ship sails from Italy to aim to break Israel’s siege of Gaza | Israeli-Palestinian conflict news

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Over 400 IPs exploiting multiple SSRF vulnerabilities in coordinated cyberattacks
Identity

Over 400 IPs exploiting multiple SSRF vulnerabilities in coordinated cyberattacks

userBy userMarch 12, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 12, 2025Ravi LakshmananCloud Security/Vulnerability

Multiple SSRF Vulnerabilities

Threat intelligence company Greynoise warns of “adjusted surges” in the exploitation of server-side request forgery (SSRF) vulnerabilities across multiple platforms.

“At least 400 IPs are actively utilizing multiple SSRF CVEs at the same time, and are actively utilizing them with a prominent overlap between attack attempts,” the company said, adding that it observed activity on March 9, 2025.

Countries that emerged as targets for attempts to exploit SSRF include the United States, Germany, Singapore, India, Lithuania and Japan. Another notable country is Israel, witnessing a surge on March 11, 2025.

Cybersecurity

A list of exploited SSRF vulnerabilities is listed below –

Cybersecurity

Greynoise said many of the same IP addresses target multiple SSRF flaws at once rather than focusing on specific weaknesses, suggesting structured patterns of activity to gather intelligence before structured exploitation, automation, or compromise.

In light of aggressive exploitation attempts, it is essential that users apply the latest patches, limit outbound connections to required endpoints, and monitor suspicious outbound requests.

“Many modern cloud services rely on internal metadata APIs and are accessible when SSRF is utilized,” says Greynoise. “SSRF can be used to map internal networks, find vulnerable services, and steal cloud credentials.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticlePlanets like Earth may be more common than we imagined
Next Article Foxhills Club & Resort inspires colleagues at International Women’s Day event
user
  • Website

Related Posts

New Linux flaws allow password hash theft via core dumps in Ubuntu, Rhel, Fedora

May 31, 2025

US DOJ seizes four domains that support cybercrime crypto services in global operations

May 31, 2025

Rust-based Eddiestealer malware steals browser data using Clickfix Captcha Trick

May 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Pakistan defeats Bangladesh with seven wickets and sweeps the T20 series when Harris hits. Cricket News

Early AI investor Elad Gil found his next big bet: AI-powered rollup

Aid ship sails from Italy to aim to break Israel’s siege of Gaza | Israeli-Palestinian conflict news

Sam Altman biographer Keach Hagey explains why the OpenAI CEO was ‘born for this moment’

Trending Posts

Pakistan defeats Bangladesh with seven wickets and sweeps the T20 series when Harris hits. Cricket News

June 1, 2025

Aid ship sails from Italy to aim to break Israel’s siege of Gaza | Israeli-Palestinian conflict news

June 1, 2025

Indian general admits the loss of the jet in a clash with Pakistan: What he said is here | India and Pakistan tension news

June 1, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Things AI can do, but laws won’t allow: 16 profitable AI ideas big tech won’t touch (but you can)

Top Startup and Tech Funding News for the Week Ending May 30, 2025

Where LLMS retrieves real-time data behind AI searches (and why it’s more important than you think)

SpaceX’s Journey to Mars: How Spaceships Use Hohmann Orbital’s Movement from Earth to Mars (and the Physics Behind)

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.