Source: BleepingComputer
Author: Bill Toulas
URL: https://www.bleepingcomputer.com/news/security/globalprotect-vpn-portals-probed-with-23-million-scan-sessions/
ONE SENTENCE SUMMARY:
A coordinated campaign has spiked malicious scanning on Palo Alto Networks GlobalProtect VPN portals, amplifying security concerns significantly.
MAIN POINTS:
- Malicious activity targeting GlobalProtect VPN surged 40 times in one day.
- Activity began escalating on November 14, reaching a 90-day high.
- October saw a 500% increase in IPs scanning GlobalProtect, 91% suspicious.
- April reported 24,000 IPs targeting GlobalProtect, many suspicious.
- The surge linked to previous campaigns via fingerprints and timing.
- Primary attacks originated from ASNs in Germany and Canada.
- 2.3 million sessions targeted VPN logins between November 14 and 19.
- Attacks focused on US, Mexico, and Pakistan users.
- 80% of scanning spikes precede new security flaw disclosures.
- February saw active exploitation of vulnerabilities in Palo Alto Networks.
TAKEAWAYS:
- Coordinate security efforts to address escalating VPN portal threats.
- Track IP activity patterns to preempt future security disclosures.
- Recognize geographical attack concentration for better defense strategies.
- Identify imminent threats by examining historical scanning spikes.
- Utilize intelligence reports to inform security budget planning.