May 27, 2025 • GreyNoise Blog
Coordinated Cloud-Based Scanning Operation Targets 75 Known Exposure Points in One Day
GreyNoise identified a significant coordinated reconnaissance campaign occurring on May 8, involving 251 malicious IP addresses originating from Japan and...
Executive Summary
GreyNoise identified a significant coordinated reconnaissance campaign occurring on May 8, involving 251 malicious IP addresses originating from Japan and utilizing Amazon AWS infrastructure. This operation targeted 75 known exposure points within a single day, indicating a high level of centralized planning and resource allocation. While no specific threat actor group or malware family was explicitly attributed in the report, the scale and coordination suggest a sophisticated entity preparing for potential exploitation. The primary threat involves network scanning aimed at identifying vulnerabilities for future intrusion attempts. Organizations should prioritize reviewing exposure points, implementing strict access controls, and monitoring inbound traffic from cloud providers. Enhanced logging and threat intelligence integration are recommended to detect similar scanning activities early. Immediate mitigation involves patching known vulnerabilities and restricting unnecessary public-facing services to reduce the attack surface available to such coordinated scanning operations.
Summary
On May 8, GreyNoise observed a highly coordinated reconnaissance campaign launched by 251 malicious IP addresses, all geolocated to Japan and hosted by Amazon AWS. The infrastructure and execution suggest centralized planning.
Published Analysis
GreyNoise identified a significant coordinated reconnaissance campaign occurring on May 8, involving 251 malicious IP addresses originating from Japan and utilizing Amazon AWS infrastructure. This operation targeted 75 known exposure points within a single day, indicating a high level of centralized planning and resource allocation. While no specific threat actor group or malware family was explicitly attributed in the report, the scale and coordination suggest a sophisticated entity preparing for potential exploitation. The primary threat involves network scanning aimed at identifying vulnerabilities for future intrusion attempts. Organizations should prioritize reviewing exposure points, implementing strict access controls, and monitoring inbound traffic from cloud providers. Enhanced logging and threat intelligence integration are recommended to detect similar scanning activities early. Immediate mitigation involves patching known vulnerabilities and restricting unnecessary public-facing services to reduce the attack surface available to such coordinated scanning operations. On May 8, GreyNoise observed a highly coordinated reconnaissance campaign launched by 251 malicious IP addresses, all geolocated to Japan and hosted by Amazon AWS. The infrastructure and execution suggest centralized planning. On May 8, GreyNoise observed a highly coordinated reconnaissance campaign launched by 251 malicious IP addresses, all geolocated to Japan and hosted by Amazon AWS. The infrastructure and execution suggest centralized planning.