Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

New Linux flaws allow password hash theft via core dumps in Ubuntu, Rhel, Fedora

Gaza “The Most Hungry Place on Earth”, All People at Risk of Hungry, United Nations Warning | Israeli-Palestinian Conflict News

Hegseth warns about China’s threat as Beijing’s Top Brass Skip Singapore Summit | Military News

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Over 400 IPs exploiting multiple SSRF vulnerabilities in coordinated cyberattacks
Identity

Over 400 IPs exploiting multiple SSRF vulnerabilities in coordinated cyberattacks

userBy userMarch 12, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 12, 2025Ravi LakshmananCloud Security/Vulnerability

Multiple SSRF Vulnerabilities

Threat intelligence company Greynoise warns of “adjusted surges” in the exploitation of server-side request forgery (SSRF) vulnerabilities across multiple platforms.

“At least 400 IPs are actively utilizing multiple SSRF CVEs at the same time, and are actively utilizing them with a prominent overlap between attack attempts,” the company said, adding that it observed activity on March 9, 2025.

Countries that emerged as targets for attempts to exploit SSRF include the United States, Germany, Singapore, India, Lithuania and Japan. Another notable country is Israel, witnessing a surge on March 11, 2025.

Cybersecurity

A list of exploited SSRF vulnerabilities is listed below –

Cybersecurity

Greynoise said many of the same IP addresses target multiple SSRF flaws at once rather than focusing on specific weaknesses, suggesting structured patterns of activity to gather intelligence before structured exploitation, automation, or compromise.

In light of aggressive exploitation attempts, it is essential that users apply the latest patches, limit outbound connections to required endpoints, and monitor suspicious outbound requests.

“Many modern cloud services rely on internal metadata APIs and are accessible when SSRF is utilized,” says Greynoise. “SSRF can be used to map internal networks, find vulnerable services, and steal cloud credentials.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticlePlanets like Earth may be more common than we imagined
Next Article Foxhills Club & Resort inspires colleagues at International Women’s Day event
user
  • Website

Related Posts

New Linux flaws allow password hash theft via core dumps in Ubuntu, Rhel, Fedora

May 31, 2025

US DOJ seizes four domains that support cybercrime crypto services in global operations

May 31, 2025

Rust-based Eddiestealer malware steals browser data using Clickfix Captcha Trick

May 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

New Linux flaws allow password hash theft via core dumps in Ubuntu, Rhel, Fedora

Gaza “The Most Hungry Place on Earth”, All People at Risk of Hungry, United Nations Warning | Israeli-Palestinian Conflict News

Hegseth warns about China’s threat as Beijing’s Top Brass Skip Singapore Summit | Military News

US DOJ seizes four domains that support cybercrime crypto services in global operations

Trending Posts

Gaza “The Most Hungry Place on Earth”, All People at Risk of Hungry, United Nations Warning | Israeli-Palestinian Conflict News

May 31, 2025

Hegseth warns about China’s threat as Beijing’s Top Brass Skip Singapore Summit | Military News

May 31, 2025

Chinese Navy conducts combat patrols near the contested shallows of the South China Sea | South China Sea News

May 31, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Top Startup and Tech Funding News for the Week Ending May 30, 2025

Where LLMS retrieves real-time data behind AI searches (and why it’s more important than you think)

SpaceX’s Journey to Mars: How Spaceships Use Hohmann Orbital’s Movement from Earth to Mars (and the Physics Behind)

zircuit allows for top-up of non-curative wallets for crypto.com visa cards

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.