Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io

Made with 💙 by Wiz

Last Updated: April 3, 2025

Cloud Threat Landscape
/Incidents
Incidents
/
Coordinated One-Day Cloud Scanning Operation Targets 75 Exposure Points

Coordinated One-Day Cloud Scanning Operation Targets 75 Exposure Points

Type
Campaign
Actors
❓Unknown
Pub. date
May 28, 2025
Initial access
1-day vulnerabilitySoftware misconfig
Impact
None
Observed techniques
Vulnerability exploitation
Targeted technologies
Adobe ColdFusionApache TomcatElasticsearchDrupalWordPressWebLogic
References
https://www.greynoise.io/blog/coordinated-cloud-based-scanning-operation-targets-75-known-exposure-points
Status
Finalized
Last edited
May 28, 2025 1:25 PM

On May 8, 2025, GreyNoise observed a tightly coordinated and large-scale reconnaissance campaign launched from 251 malicious IP addresses, all hosted on Amazon AWS and geolocated in Japan. These IPs were active for only one day and collectively triggered 75 distinct scanning behaviors across web technologies, cloud infrastructure, and IoT devices. The targets included legacy CVEs (e.g., CVE-2017-5638 in Apache Struts, CVE-2014-6271 Shellshock) and misconfiguration probes (e.g., exposed .git configs, ENV variables, CGI scripts). The temporary nature of the infrastructure and the synchronized execution suggest centralized orchestration rather than opportunistic scanning.

The targeted technologies spanned a wide range: ColdFusion, Apache Tomcat, Elasticsearch, WebLogic, WordPress, Drupal, and even IoT devices. GreyNoise analysis revealed high overlap between scanning activity, reinforcing the likelihood of a single operator or shared toolset. These patterns mirror behaviors seen before zero-day discoveries like Ivanti EPMM, underscoring how broad scanning often precedes exploitation.