Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Joby Aviation Expands Ohio Footprint to Ramp Up U.S. Air Taxi Production

    January 13, 2026

    Amazon Rolls Out Redesigned Dash Cart to Whole Foods, Expands Smart Grocery Shopping

    January 13, 2026

    OpenAI Debuts ChatGPT Health With Medical Records, Wellness App Integration

    January 13, 2026
    Facebook X (Twitter) Instagram
    • Tech
    • AI News
    Facebook X (Twitter) Instagram Pinterest VKontakte
    TallwireTallwire
    • Tech

      Joby Aviation Expands Ohio Footprint to Ramp Up U.S. Air Taxi Production

      January 13, 2026

      Amazon Rolls Out Redesigned Dash Cart to Whole Foods, Expands Smart Grocery Shopping

      January 13, 2026

      Tech Firms Tackle Backlash by Redesigning Data Centers to Win Over Communities

      January 13, 2026

      OpenAI Debuts ChatGPT Health With Medical Records, Wellness App Integration

      January 13, 2026

      Malicious Chrome Extensions Compromise 900,000 Users’ AI Chats and Browsing Data

      January 12, 2026
    • AI News
    TallwireTallwire
    Home»Tech»New Wave of Cyber-Attacks Targets GlobalProtect VPN Portals
    Tech

    New Wave of Cyber-Attacks Targets GlobalProtect VPN Portals

    4 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    New Wave of Cyber-Attacks Targets GlobalProtect VPN Portals
    New Wave of Cyber-Attacks Targets GlobalProtect VPN Portals
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A coordinated hacking campaign has launched widespread brute-force login attempts against GlobalProtect VPN portals from Palo Alto Networks, followed by a second wave of scanning that targeted SonicOS API endpoints used by SonicWall firewalls. The activity began December 2, 2025, and has been traced to over 7,000 IP addresses belonging to German hosting provider 3xK GmbH. Security researchers say the attacks reused fingerprints and infrastructure seen in previous campaigns back in September–October, suggesting the same actor is responsible. While no evidence yet indicates a breach of GlobalProtect itself, the surge has renewed calls for organizations to enforce multi-factor authentication and dynamic blocking to protect exposed VPN and firewall interfaces.

    Sources: Bleeping Computer, Security Affairs

    Key Takeaways

    – Attackers used over 7,000 IP addresses from 3xK GmbH to carry out a coordinated brute-force campaign against GlobalProtect VPN portals, then pivoted to scanning SonicWall SonicOS APIs — pointing to a broad reconnaissance effort rather than a simple script-run attack.

    – The campaign relies on repeated “client fingerprints,” matching patterns from earlier September–October login waves, indicating the same threat actor is likely behind ongoing assaults across multiple network products.

    – No patches or zero-day exploits were used — the attacks are credential-based, highlighting the importance of multi-factor authentication, rate limiting, dynamic blocking, and vigilant exposure of VPN/firewall interfaces.

    In-Depth

    On December 2, 2025, cybersecurity researchers monitoring internet-wide scanning activity noticed a sudden surge of login attempts aimed at GlobalProtect portals operated by Palo Alto Networks. Within just a few hours, more than 7,000 IP addresses tied to a German hosting provider (3xK GmbH) attempted to brute-force credentials — triggering red flags across multiple threat-intel communities. The login attempts weren’t random: the traffic re-used three specific “client fingerprint” signatures tied to earlier September–October campaigns, suggesting these weren’t opportunistic actors, but a persistent adversary actively probing corporate VPN front doors.

    What began as brute-force login activity didn’t stop there. On December 3, the same infrastructure and fingerprints appeared in scans targeting SonicWall SonicOS API endpoints — the management interfaces used to configure and monitor firewall devices. This pivot suggests the attacker is casting a wide net, probing both VPNs and firewall/API surfaces for potential vulnerabilities or misconfigurations. It may indicate a broad reconnaissance campaign in preparation for future attacks — or, at minimum, an attempt to build a comprehensive inventory of exposed network assets.

    Despite the volume and scope of the activity, the vendor (Palo Alto Networks) says there’s no indication GlobalProtect was exploited — the attempts appear credential-based, not exploiting any known software vulnerability. But that’s little comfort if credentials are weak, reused, or otherwise compromised. In fact, the danger here is not a sudden zero-day exploit but the slow grind of credential stuffing and brute-force attacks against systems often exposed to the public internet.

    Given how prevalent GlobalProtect and SonicWall are in enterprise, government, and service-provider contexts, the stakes are high: a successful login could grant an attacker remote access to internal networks, bypassing many perimeter defenses. As remote work remains widespread, VPN portals and firewall management APIs continue to serve as high-value — and high-risk — entry points.

    It’s expected that the same group behind the earlier login waves is operating again with updated infrastructure, which complicates blocking efforts based on static blacklists: once a hosting provider is blocked, attackers can simply switch ASNs or IP ranges, evading detection.

    That’s why security experts are doubling down on defenses that don’t rely on static reputation lists. Instead, organizations are urged to adopt: multi-factor authentication, rate-limiting and lockouts for repeated failures, dynamic and context-aware blocking tied to anomalous fingerprints/traffic patterns, regular auditing of exposed authentication surfaces, and strict segmentation — keeping VPN and admin interfaces invisible or heavily restricted when possible.

    In short: the new wave of attacks reminds us that the biggest vulnerability isn’t always unpatched code — sometimes it’s the human element (weak or reused credentials), combined with exposed attack surfaces, and adversaries willing to exploit both through relentless automation.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleNew U.S. Restrictions Could Ground Chinese Drones By December 23
    Next Article New York Moves to Dismiss Lawsuit by Elon Musk’s X Over Content-Moderation Disclosure Law

    Related Posts

    Amazon Rolls Out Redesigned Dash Cart to Whole Foods, Expands Smart Grocery Shopping

    January 13, 2026

    Joby Aviation Expands Ohio Footprint to Ramp Up U.S. Air Taxi Production

    January 13, 2026

    Tech Firms Tackle Backlash by Redesigning Data Centers to Win Over Communities

    January 13, 2026

    OpenAI Debuts ChatGPT Health With Medical Records, Wellness App Integration

    January 13, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    Joby Aviation Expands Ohio Footprint to Ramp Up U.S. Air Taxi Production

    January 13, 2026

    Amazon Rolls Out Redesigned Dash Cart to Whole Foods, Expands Smart Grocery Shopping

    January 13, 2026

    Tech Firms Tackle Backlash by Redesigning Data Centers to Win Over Communities

    January 13, 2026

    OpenAI Debuts ChatGPT Health With Medical Records, Wellness App Integration

    January 13, 2026
    Top Reviews
    Tallwire
    Facebook X (Twitter) Instagram Pinterest YouTube
    • Tech
    • AI News
    © 2026 Tallwire. Optimized by ARMOUR Digital Marketing Agency.

    Type above and press Enter to search. Press Esc to cancel.