Cyberattack Surge: 500% Increase in Palo Alto Scanning Activity

cyberattack campaign Palo Alto Networks scanning Cisco ASA Fortinet SSL VPN GreyNoise network security vulnerability disclosure
Edward Zhou
Edward Zhou

CEO & Co-Founder

 
October 13, 2025 4 min read

TL;DR

GreyNoise has detected a coordinated cyberattack campaign targeting devices from Cisco, Fortinet, and Palo Alto Networks. The campaign features escalating scanning activity, with a notable 500% surge in scans against Palo Alto Networks login portals. This pattern often precedes vulnerability disclosures, making it crucial for organizations to enhance their security measures.

Coordinated Cyberattack Campaign

GreyNoise has detected a coordinated cyberattack campaign targeting Cisco, Fortinet, and Palo Alto Networks devices. The campaign involves escalating scanning activity that may indicate upcoming vulnerability disclosures.

Scanning Activity on Palo Alto Networks

GreyNoise observed a spike in scanning activity targeting Palo Alto Networks login portals, with a nearly 500% increase in IP addresses scanning on October 3, 2025. This was the highest level recorded in the last three months. The traffic was described as targeted and structured. As many as 1,300 unique IP addresses participated, a jump from around 200 before. 93% were classified as suspicious and 7% as malicious.

Palo Alto Networks Portals
Image courtesy of The Hacker News

Most IP addresses geolocated to the U.S., with smaller clusters in the U.K., the Netherlands, Canada, and Russia. According to GreyNoise, the "Palo Alto surge shares characteristics with Cisco ASA scanning occurring in the past 48 hours". Both cases exhibited regional clustering and fingerprinting overlap in the tooling used, with a dominant TLS fingerprint tied to infrastructure in the Netherlands.

Palo Alto Networks stated, "We have investigated the reported scanning activity and found no evidence of a compromise...Palo Alto Networks is protected by our own Cortex XSIAM platform".

GreyNoise's Early Warning Signals report in July 2025 noted that surges in malicious scanning, brute-forcing, or exploit attempts are often followed by the disclosure of a new CVE affecting the same technology within six weeks.

In April 2025, GreyNoise reported similar suspicious login scanning activity targeting Palo Alto Networks PAN-OS GlobalProtect gateways.

Update on Palo Alto Networks Scans

On October 7, 2025, GreyNoise detected a further spike in scanning against Palo Alto Networks PAN-OS GlobalProtect login portals, originating from over 2,200 unique IP addresses. There was also a sharp increase in the number of ASNs involved, suggesting an increase in the number of threat actors involved. The pace of login attempts suggests activity driven by a threat actor iterating through a large dataset of credentials.

According to GreyNoise, elevated scanning activity targeting Cisco and Palo Alto Networks firewalls, along with brute-force attack attempts aimed at Fortinet SSL VPNs, originate from IPs on the same subnets, specifically from ASNs 3xK Tech GmbH (AS200373) and tzulo, Inc. (AS11878). They assess that the three campaigns are "at least partially" driven by the same threat actor due to shared TCP fingerprints, recurring subnets, and a coordinated surge in activity.

Correlated Campaigns

GreyNoise identified links between recent campaigns targeting:

They assess with high confidence that all three campaigns are at least partially driven by the same threat actor(s), evidenced by shared TCP fingerprints, recurring subnets, and elevated activity at similar times.

Campaign Connections

All three campaigns heavily rely on the same subnets:

Subnet Usage

GreyNoise recommends using GreyNoise Block to block threat IPs from all relevant GreyNoise tags (ASA Scanner, Fortinet VPN Bruteforcer, Palo Scanner) and the ASNs AS200373 (3xK Tech GmbH) and AS11878 (tzulo, Inc.).

Fortinet Brute Force Attempts

GreyNoise research identified a correlation: spikes in Fortinet VPN brute force attempts are typically followed by Fortinet VPN vulnerabilities disclosures within six weeks.

Fortinet Attempts

Scanning Surge Details

On October 3, 2025, GreyNoise observed a ~500% increase in IPs scanning Palo Alto Networks login portals, the highest level recorded in the past 90 days.

Palo Alto Scanning

Key Findings:

  • Volume: ~1,300 unique IPs triggered GreyNoise’s Palo Alto Networks Login Scanner tag on 3 October.
  • Classification: 93% of IPs were classified as suspicious and 7% as malicious.
  • Source infrastructure: 91% of IPs geolocated to the United States, with smaller clusters in the U.K., Netherlands, Canada, and Russia. 
  • Targeted profiles: Nearly all activity was directed at GreyNoise’s emulated Palo Alto profiles (Palo Alto GlobalProtect, Palo Alto PAN-OS).
  • Destination focus: Distinct scanning clusters were observed in the past 48 hours.

Related Activity:

The Palo Alto surge shares characteristics with Cisco ASA scanning, with a dominant TCP fingerprint tied to infrastructure in the Netherlands.

Concurrent surges across remote access services were also identified.

Remote Access Services

Cisco ASA Zero-Day Exploitation

Cisco reported that a sophisticated state-sponsored threat actor is actively exploiting multiple zero-day vulnerabilities in [Cisco Adaptive Security Appliance (ASA)](https

Edward Zhou
Edward Zhou

CEO & Co-Founder

 

CEO & Co-Founder of Gopher Security, leading the development of Post-Quantum cybersecurity technologies and solutions..

Related Articles

RondoDox botnet

RondoDox Botnet Exploits 56 Vulnerabilities Across Multiple Vendors

RondoDox botnet aggressively exploits 50+ vulnerabilities across 30+ vendors. Learn about its 'exploit shotgun' approach and loader-as-a-service distribution. Secure your network now!

By Edward Zhou October 13, 2025 3 min read
Read full article
Microsoft Defender for Endpoint vulnerabilities

Mitigating Microsoft Defender Vulnerabilities to Enhance Security

Discover critical vulnerabilities in Microsoft Defender for Endpoint that allow authentication bypass and command interception. Learn how to mitigate these risks.

By Alan V Gutnov October 13, 2025 4 min read
Read full article
Kansas cybersecurity

Cybersecurity Weaknesses Identified in Kansas Government Audit

Explore significant cybersecurity weaknesses across Kansas government agencies, revealing the urgent need for effective measures to protect against cyberattacks.

By Edward Zhou October 8, 2025 3 min read
Read full article
AI-native SOC

Revolutionizing Cybersecurity: The Impact of Agentic AI

Discover how generative and agentic AI are reshaping cybersecurity operations, enhancing threat detection, and driving team efficiency. Learn more!

By Edward Zhou October 8, 2025 3 min read
Read full article