Jul 24, 2025 • GreyNoise Blog
A Spike in the Desert: How GreyNoise Uncovered a Global Pattern of VOIP-Based Telnet Attacks
GreyNoise researchers identified a significant surge in botnet traffic originating from a rural utility in New Mexico, revealing a broader global pattern of...
Executive Summary
GreyNoise researchers identified a significant surge in botnet traffic originating from a rural utility in New Mexico, revealing a broader global pattern of VOIP-based Telnet attacks. This discovery highlights the prevalence of compromised devices within critical infrastructure sectors, demonstrating how localized anomalies can indicate widespread malicious campaigns. The analysis utilized a combination of human expertise and AI-powered tools to expose these attack patterns and identify compromised devices globally. While specific threat actors or malware families were not explicitly named in this report, the activity suggests coordinated botnet operations targeting network services. Defenders are advised to monitor Telnet traffic closely, secure VOIP infrastructure, and leverage threat intelligence platforms to detect similar anomalies. Proactive monitoring of utility networks is essential to prevent unauthorized access and mitigate the risk of devices being enlisted into global botnet armies for future attacks.
Summary
A spike in botnet traffic from a single utility in a rural part of New Mexico led to the discovery of a global botnet. Explore how human-led, AI-powered analysis exposed compromised devices, uncovered attack patterns, and why defenders should take note.
Published Analysis
GreyNoise researchers identified a significant surge in botnet traffic originating from a rural utility in New Mexico, revealing a broader global pattern of VOIP-based Telnet attacks. This discovery highlights the prevalence of compromised devices within critical infrastructure sectors, demonstrating how localized anomalies can indicate widespread malicious campaigns. The analysis utilized a combination of human expertise and AI-powered tools to expose these attack patterns and identify compromised devices globally. While specific threat actors or malware families were not explicitly named in this report, the activity suggests coordinated botnet operations targeting network services. Defenders are advised to monitor Telnet traffic closely, secure VOIP infrastructure, and leverage threat intelligence platforms to detect similar anomalies. Proactive monitoring of utility networks is essential to prevent unauthorized access and mitigate the risk of devices being enlisted into global botnet armies for future attacks. A spike in botnet traffic from a single utility in a rural part of New Mexico led to the discovery of a global botnet. Explore how human-led, AI-powered analysis exposed compromised devices, uncovered attack patterns, and why defenders should take note. A spike in botnet traffic from a single utility in a rural part of New Mexico led to the discovery of a global botnet. Explore how human-led, AI-powered analysis exposed compromised devices, uncovered attack patterns, and why defenders should take note.