Mar 11, 2025 • GreyNoise Blog
New SSRF Exploitation Surge Serves as a Reminder of 2019 Capital One Breach
GreyNoise has identified a significant surge in Server-Side Request Forgery (SSRF) exploitation attempts targeting various platforms globally. Over 400 unique...
Executive Summary
GreyNoise has identified a significant surge in Server-Side Request Forgery (SSRF) exploitation attempts targeting various platforms globally. Over 400 unique IP addresses were observed conducting these activities, with notable concentration in Israel and the Netherlands. This activity recalls the severe 2019 Capital One breach, which was facilitated by similar SSRF vulnerabilities, highlighting the critical risk posed by unvalidated user-supplied URLs. While no specific threat actor or malware family has been attributed to this campaign, the volume suggests coordinated scanning or exploitation efforts. Organizations must prioritize patching known SSRF vulnerabilities and implementing strict egress filtering to mitigate potential data exfiltration or internal network reconnaissance. Security teams should monitor logs for unexpected outbound requests from web servers. Immediate remediation is advised to prevent unauthorized access to cloud metadata services or internal resources, which could lead to significant data compromise similar to past high-profile incidents.
Summary
GreyNoise observed 400+ IPs exploiting multiple SSRF vulnerabilities across various platforms, with recent activity concentrated in Israel and the Netherlands.
Published Analysis
GreyNoise has identified a significant surge in Server-Side Request Forgery (SSRF) exploitation attempts targeting various platforms globally. Over 400 unique IP addresses were observed conducting these activities, with notable concentration in Israel and the Netherlands. This activity recalls the severe 2019 Capital One breach, which was facilitated by similar SSRF vulnerabilities, highlighting the critical risk posed by unvalidated user-supplied URLs. While no specific threat actor or malware family has been attributed to this campaign, the volume suggests coordinated scanning or exploitation efforts. Organizations must prioritize patching known SSRF vulnerabilities and implementing strict egress filtering to mitigate potential data exfiltration or internal network reconnaissance. Security teams should monitor logs for unexpected outbound requests from web servers. Immediate remediation is advised to prevent unauthorized access to cloud metadata services or internal resources, which could lead to significant data compromise similar to past high-profile incidents. GreyNoise observed 400+ IPs exploiting multiple SSRF vulnerabilities across various platforms, with recent activity concentrated in Israel and the Netherlands. GreyNoise observed 400+ IPs exploiting multiple SSRF vulnerabilities across various platforms, with recent activity concentrated in Israel and the Netherlands.