Massive Brute Force Attack Using 2.8 Million IPs Targets Networking Devices
![Massive Brute Force Attack Using 2.8 Million IPs Targets Networking Devices Massive Brute Force Attack Using 2.8 Million IPs Targets Networking Devices](https://www.blackhatethicalhacking.com/wp-content/uploads/2025/02/877x440-Images-for-the-News-posts-36.png)
Reading Time: 3 Minutes
See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses
How Attackers Operate
- The attacks come from multiple networks and Autonomous Systems, likely controlled by a botnet or residential proxy networks.
- Residential proxies route traffic through home users’ IPs, making attacks harder to detect.
- Compromised gateway devices may be used as proxy exit nodes, allowing cybercriminals to:
- Bypass security measures
- Launch further attacks from trusted enterprise networks
Protection Measures
- Change default admin credentials to strong, unique passwords.
- Enable multi-factor authentication (MFA) where possible.
- Restrict access by creating an allowlist of trusted IPs.
- Disable unnecessary web admin interfaces to reduce exposure.
- Apply firmware and security updates to patch known vulnerabilities.
Previous Warnings
- April 2024: Cisco warned of brute-force attacks targeting Cisco, CheckPoint, Fortinet, SonicWall, and Ubiquiti devices.
- December 2024: Citrix warned of password spray attacks on Citrix Netscaler devices worldwide.
Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]
Source: bleepingcomputer.com