Cyber Security

Hackers Attacking Web Login Pages of Popular Firewalls for Brute-Force Attacks

In recent weeks, ShadowServer has observed a significant rise in brute-force attacks targeting web login pages of edge devices, with honeypot data revealing up to 2.8 million IPs involved daily. 

These attacks, primarily originating from Brazil, are aimed at devices such as firewalls, VPNs, and IoT systems from vendors like Palo Alto Networks, Ivanti, and SonicWall.

Attacks primarily originating from Brazil

The Shadowserver Foundation’s Honeypot HTTP Scanner Events Report notes that attackers are leveraging known vulnerabilities (CVE identifiers) and exploiting weak credentials to gain unauthorized access.

Brute-Force Techniques and Tools

Brute-force attacks involve systematically guessing login credentials to gain access to systems. Cybercriminals use tools like Burp Suite and Ncrack to automate these attacks. 

Common tactics include attempting default or weak username-password combinations (e.g., “admin/admin”) and exploiting unsecured login interfaces. 

These attacks often target web-based content management systems, remote desktop protocols (RDP), and VPNs. .

Why Edge Devices Are Prime Targets

Edge devices, which operate at the boundary of networks (e.g., routers and firewalls), are critical for maintaining enterprise security. 

However, they often lack robust built-in protections and are deployed with a “set it and forget it” mentality. This makes them attractive targets for attackers seeking to establish persistent access or launch further exploits within an organization’s network. 

Recent incidents involving Ivanti VPNs and SonicWall firewalls demonstrate how vulnerabilities in these devices can lead to severe consequences, including ransomware deployment and data breaches.

Attack Statistics based on the devices

Mitigation Strategies

Organizations must adopt proactive measures to defend against brute-force attacks:

  • Enforce strong password policies and implement Multi-Factor Authentication (MFA).
  • Use CAPTCHA challenges, monitor network activity for unusual patterns, and apply security patches.

Advanced reporting tools now provide detailed insights into attack patterns, including CVE mappings, CVSS scores, and MITRE ATT&CK techniques. Such intelligence enables organizations to better understand their threat landscape and prioritize remediation efforts.

The surge in brute-force attacks against edge device web login pages underscores the need for heightened vigilance in securing network perimeters. 

As attackers continue to exploit weak credentials and unpatched vulnerabilities, organizations must adopt comprehensive security measures to mitigate risks effectively.

PCI DSS 4.0 & Supply Chain Attack Prevention – Free Webinar

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Ukraine Warns of Weaponized XLL Files Delivers CABINETRAT Malware Via Zip Files

Ukrainian security agencies have issued an urgent warning regarding a sophisticated malware campaign targeting government…

4 hours ago

Threat Actors Leveraging Senior Travel Scams to Deliver Datzbro Malware

Cybersecurity researchers have uncovered a sophisticated Android malware campaign targeting seniors through fraudulent travel and…

5 hours ago

Malicious PyPI Package Mimics as SOCKS5 Proxy Tool Attacking Windows Platforms

A sophisticated malicious package has infiltrated the Python Package Index (PyPI), masquerading as a legitimate…

5 hours ago

New Google Drive Desktop Feature adds AI-powered Ransomware Detection to Prevent Cyberattacks

Google has introduced a new AI-powered ransomware detection feature for Google Drive for desktop, designed…

8 hours ago

New FlipSwitch Hooking Technique Bypasses Linux Kernel Defenses

The cybersecurity landscape witnessed the emergence of a sophisticated rootkit variation, FlipSwitch, targeting modern Linux…

8 hours ago

New DNS Malware Detour Dog Delivers Strela Stealer Using DNS TXT Records

A sophisticated DNS-based malware campaign has emerged, utilizing thousands of compromised websites worldwide to deliver…

8 hours ago