Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Hackers use Facebook ads to spread JSCEAL malware via fake cryptocurrency trading apps

Funksec Ransomware Decryptor was published for free after the group was dormant

Skechers make kids shoes with hidden air tag compartments

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Over 400 IPs exploiting multiple SSRF vulnerabilities in coordinated cyberattacks
Identity

Over 400 IPs exploiting multiple SSRF vulnerabilities in coordinated cyberattacks

userBy userMarch 12, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 12, 2025Ravi LakshmananCloud Security/Vulnerability

Multiple SSRF Vulnerabilities

Threat intelligence company Greynoise warns of “adjusted surges” in the exploitation of server-side request forgery (SSRF) vulnerabilities across multiple platforms.

“At least 400 IPs are actively utilizing multiple SSRF CVEs at the same time, and are actively utilizing them with a prominent overlap between attack attempts,” the company said, adding that it observed activity on March 9, 2025.

Countries that emerged as targets for attempts to exploit SSRF include the United States, Germany, Singapore, India, Lithuania and Japan. Another notable country is Israel, witnessing a surge on March 11, 2025.

Cybersecurity

A list of exploited SSRF vulnerabilities is listed below –

Cybersecurity

Greynoise said many of the same IP addresses target multiple SSRF flaws at once rather than focusing on specific weaknesses, suggesting structured patterns of activity to gather intelligence before structured exploitation, automation, or compromise.

In light of aggressive exploitation attempts, it is essential that users apply the latest patches, limit outbound connections to required endpoints, and monitor suspicious outbound requests.

“Many modern cloud services rely on internal metadata APIs and are accessible when SSRF is utilized,” says Greynoise. “SSRF can be used to map internal networks, find vulnerable services, and steal cloud credentials.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticlePlanets like Earth may be more common than we imagined
Next Article Foxhills Club & Resort inspires colleagues at International Women’s Day event
user
  • Website

Related Posts

Hackers use Facebook ads to spread JSCEAL malware via fake cryptocurrency trading apps

July 30, 2025

Funksec Ransomware Decryptor was published for free after the group was dormant

July 30, 2025

Enabling remote hijacking via critical duffer camera defect ONVIF and file upload exploit

July 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Hackers use Facebook ads to spread JSCEAL malware via fake cryptocurrency trading apps

Funksec Ransomware Decryptor was published for free after the group was dormant

Skechers make kids shoes with hidden air tag compartments

2 How Uc Berkeley Dropout raised $28 million for AI Marketing Automation Startup

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

New Internet Era: Berners-Lee Sets the Pace as Zuckerberg Pursues Metaverse

TwinH Transforms Belgian Student Life: Hendrik’s Journey to Secure Digital Identity

Tim Berners-Lee Unveils the “Missing Link”: How the Web’s Architect Is Building AI’s Trusted Future

Dispatch from London Tech Week: Keir Starmer, The Digital Twin Boom, and FySelf’s Game-Changing TwinH

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.