Cyble vulnerability intelligence researchers have discovered new vulnerabilities through its expansive global network of honeypot sensors. These sensors emulate vulnerable systems, effectively luring attackers and exposing their tactics in real time. Cyble’s latest sensor intelligence report reveals a sharp spike in exploit attempts, malware campaigns, and brute-force attacks targeting diverse systems worldwide.
This week’s intelligence highlights a rise in attacks on the Internet of Things (IoT) devices alongside traditional enterprise infrastructure. Malware variants like Mirai and Gafgyt, infamous for their role in IoT botnets, remain active threats. Cyble’s sensors also noted persistent exploitation attempts against core enterprise components, including Telerik UI libraries and Cisco ASA firewalls.
Cyble’s analysis spotlighted 17 critical vulnerabilities actively scanned or exploited during the week. These vulnerabilities span consumer devices, industrial-grade security appliances, and software tools, illustrating the broad attack surface facing organizations today.
Among the most notable are:
Additional vulnerabilities include PHP CGI argument injection (CVE-2024-4577), information disclosure in D-Link DNS products (CVE-2024-3274), unauthenticated SQL injection in Icegram Express WordPress plugin (CVE-2024-2876), and Mirai botnet exploits targeting Dasan GPON routers.
Cyble’s sensors recorded over 544,000 attempts targeting the Treck TCP/IP stack vulnerability (CVE-2020-11899). Similarly, vulnerabilities in Wind River’s VxWorks TCP/IP stack and the infamous Apache Log4j2 (CVE-2021-44228) and Microsoft BlueKeep (CVE-2019-0708) remain prominent attack vectors, particularly against unpatched systems.
The report details several high-profile malware strains observed this week:
Phishing campaigns persist as a favorite tactic for credential theft and malware distribution. Attackers impersonate trusted entities like banks, government agencies, or well-known companies to trick victims. Typical lures include fake prize notifications, inheritance scams, urgent delivery alerts, and fraudulent investments.
Brute-force attacks also remain widespread. Cyble noted a high volume of attempts targeting common usernames such as “admin,” “root,” and “postgres” paired with weak passwords like “123456.” These attempts focus on IT automation tools, databases, and servers running Ubuntu, Hadoop, Oracle, and Sonar software.
Cyble’s monitoring of underground forums and Telegram channels revealed threat actors actively sharing and weaponizing vulnerabilities such as:
The surge in high-risk vulnerabilities and exploitation attempts this week reinforces the reality that cybersecurity teams cannot afford to let their guard down. A risk-based vulnerability management program remains essential, but it won’t stop zero-day threats on its own. To strengthen their defenses, organizations must also implement layered cybersecurity strategies such as network segmentation, Zero Trust access models, ransomware-resistant backups, hardening of endpoints and infrastructure, continuous monitoring across cloud, network, and endpoint layers, and routinely tested incident response plans.
Cyble’s comprehensive attack surface management solutions enhance these defenses by scanning both cloud and on-premises assets for potential exposures, prioritizing remediation based on risk, and continuously monitoring for leaked credentials and other early indicators of compromise. These proactive measures provide organizations with the situational awareness needed to stay ahead of today’s rapidly evolving threat landscape.
Get a free external threat profile for your organization today and take a critical step toward reducing cyber risk.
Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.