← Back to BrewedIntel
vulnerabilitymediumExploitation AttemptVulnerability Scanning

Apr 01, 2025 • GreyNoise Blog

Heightened In-The-Wild Activity On Key Technologies Observed On March 28

On March 28, GreyNoise reported a substantial increase in malicious activity targeting a broad range of edge and internal management technologies. Affected...

Source
GreyNoise Blog
Category
vulnerability
Severity
medium

Executive Summary

On March 28, GreyNoise reported a substantial increase in malicious activity targeting a broad range of edge and internal management technologies. Affected vendors include SonicWall, Zoho, Zyxel, F5, Linksys, and Ivanti. This spike indicates coordinated scanning or exploitation attempts against known vulnerabilities within these platforms. While specific threat actors or malware families were not identified in this report, the breadth of targeted technologies suggests a widespread campaign aiming to compromise network perimeters and management interfaces. Organizations utilizing these systems should prioritize patching known vulnerabilities, reviewing logs for unauthorized access attempts, and enforcing strict network segmentation. Immediate verification of edge device integrity is recommended to prevent potential initial access by adversaries leveraging these exposed services. Continuous monitoring is essential to detect further escalation.

Summary

On March 28, GreyNoise observed a significant spike in activity targeting multiple edge technologies, including SonicWall, Zoho, Zyxel, F5, Linksys, and Ivanti systems. While some of these technologies are edge systems, others are primarily internal management tools.

Published Analysis

On March 28, GreyNoise reported a substantial increase in malicious activity targeting a broad range of edge and internal management technologies. Affected vendors include SonicWall, Zoho, Zyxel, F5, Linksys, and Ivanti. This spike indicates coordinated scanning or exploitation attempts against known vulnerabilities within these platforms. While specific threat actors or malware families were not identified in this report, the breadth of targeted technologies suggests a widespread campaign aiming to compromise network perimeters and management interfaces. Organizations utilizing these systems should prioritize patching known vulnerabilities, reviewing logs for unauthorized access attempts, and enforcing strict network segmentation. Immediate verification of edge device integrity is recommended to prevent potential initial access by adversaries leveraging these exposed services. Continuous monitoring is essential to detect further escalation. On March 28, GreyNoise observed a significant spike in activity targeting multiple edge technologies, including SonicWall, Zoho, Zyxel, F5, Linksys, and Ivanti systems. While some of these technologies are edge systems, others are primarily internal management tools. On March 28, GreyNoise observed a significant spike in activity targeting multiple edge technologies, including SonicWall, Zoho, Zyxel, F5, Linksys, and Ivanti systems. While some of these technologies are edge systems, others are primarily internal management tools.