Original Article Text

Click to Toggle View

New wave of VPN login attempts targets Palo Alto GlobalProtect portals. A campaign has been observed targeting Palo Alto GlobalProtect portals with login attempts and launching scanning activity against SonicWall SonicOS API endpoints. The activity started on December 2nd and originated from more than 7,000 IP addresses from infrastructure operated by the German IT company 3xK GmbH, which runs its own BGP network (AS200373) and operates as a hosting provider. Initially, the actor targeted GlobalProtect portals with bruteforce and login attempts, then pivoted to scanning SonicWall API endpoints, threat intelligence company GreyNoise says in a report this week. GlobalProtect is the VPN and remote access component of Palo Alto Networks’ firewall platform, used by large enterprises, government agencies, and service providers. According to GreyNoise, the GlobalProtect login attempts targeted two profiles in the company's sensor network for passive capture of scanning and exploitation activity. The researchers say that the surge used three client fingerprints previously observed in scanning attempts recorded between late September and mid-October. This past activity originated from four ASNs with no history of malicious activity, generating over 9 million non-spoofable HTTP sessions, mostly targeting GlobalProtect portals. In mid-November, GreyNoise also observed activity from 3xK Tech GmbH's infrastructure probing GlobalProtect VPN portals with 2.3 million scan sessions. Most of the attacking IPs (62%) were located in Germany, and used the same TCP/JA4t fingerprints. Based on the analyzed indicators, the company confidently attributes both activities to the same actor. On December 3, the same three fingerprints were seen in scanning activity targeting SonicWall SonicOS API. SonicOS is the operating system running on SonicWall firewalls, exposing API endpoints for configuration, remote management, and monitoring. Malicious scanning targeting these endpoints is typically done to identify vulnerabilities and misconfigurations. GreyNoise has previously noted that these scans may also help discover exposed infrastructure in preparation for potential exploitation of upcoming flaws. For this reason, defenders are advised to monitor for IPs associated with this type of activity and block them. It is also recommended to monitor authentication surfaces for abnormal velocity/repeated failures, track recurring client fingerprints, and use dynamic, context-aware blocking instead of static reputation lists. BleepingComputer has contacted Palo Alto Networks and SonicWall about this activity. Palo Alto Networks said that it detected increased scanning aimed at GlobalProtect interfaces, and confirmed that it "represents credential-based attacks, not an exploit of a software vulnerability." "Furthermore, our internal telemetry and Cortex XSIAM protection confirm this activity does not constitute a compromise of our products or services," the company told BleepingComputer. Palo Alto Networks recommends customers enforce Multi-Factor Authentication (MFA) to protect against credential abuse. Break down IAM silos like Bitpanda, KnowBe4, and PathAI Broken IAM isn't just an IT problem - the impact ripples across your whole business. This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.

Daily Brief Summary

VULNERABILITIES // Surge in VPN Login Attempts Targets Palo Alto and SonicWall Systems

A significant campaign is targeting Palo Alto GlobalProtect portals and SonicWall SonicOS API endpoints, originating from 7,000 IP addresses linked to German IT firm 3xK GmbH.

The activity involves brute force login attempts on GlobalProtect portals, followed by scanning of SonicWall API endpoints, indicating a methodical approach to uncover vulnerabilities.

GreyNoise identified three client fingerprints linked to previous scanning attempts, suggesting a coordinated effort by the same actor.

The campaign generated over 9 million HTTP sessions, with 62% of attacking IPs located in Germany, emphasizing the scale of the operation.

Palo Alto Networks confirmed these are credential-based attacks, not software vulnerabilities, advising the use of Multi-Factor Authentication to mitigate risks.

Organizations are urged to monitor authentication surfaces for unusual activity and implement dynamic, context-aware blocking strategies.

This activity underscores the need for vigilance in defending against credential abuse and highlights the importance of robust identity and access management practices.