• Hello and welcome! Register to enjoy full access and benefits:

    • Advertise in the Marketplace section for free.
    • Get more visibility with a signature link.
    • Company/website listings.
    • Ask & answer queries.
    • Much more...

    Register here or log in if you're already a member.

  • 🎉 WHV has crossed 17,000 monthly views and 220,000 clicks per month, as per Google Analytics! Thank you for your support! 🎉

Cybersecurity Alert: Massive Increase in Scans Targeting Palo Alto Networks GlobalProtect Portals

johny899

New Member
Content Writer
Messages
507
Reaction score
3
Points
23
Balance
$586.0USD
Not long ago, security researchers observed an alarming spike in scans targeting Palo Alto Networks login portals -- particularly GlobalProtect and PAN-OS.

These are not random scans by any means. These hackers are conducting scans to find vulnerable or exploitable systems for a future attack.

According to GreyNoise (a cybersecurity firm), the amount of scanning for these portals has surged by 500%! About 200 scans is typical per day -- but on October 3 there were 1,285 unique IP addresses scanning.

Although most of the scans were from the U.S., there were scans originating from the U.K., Netherlands, Canada, Russia and Pakistan.

To make matters worse, 91% of the scanning IPs were flagged as suspicious, with 7% of those IPs being classified as malicious.

So for all intents and purposes, this is serious.

Why it matters​

  • Attackers pre-test before attacking
  • The trend we've seen is that hackers typically scan before they attack.
  • These attackers scan to see what systems are online, what version of software is running, and if there are any known vulnerabilities.

GreyNoise thinks that this kind of scanning typically occurs just before hackers attempt to use a zero-day (a new, non-public security vulnerability) or an n-day (a known vulnerability that remains exploitable).

Earlier this year, we observed another phenomenon of large scale scanning - over 24,000 unique IP addresses engaged in scanning GlobalProtect portals.

Those scanning events led to an attack in March that lasted multiple days.

So, seeing this new wave of scanning may indicate that something larger will happen soon. There are acknowledged vulnerabilities

Palo Alto has already made news with a serious product vulnerability, CVE-2025-0108, which left users exposed to this bug, which was an authentication bypass. In short, it was easy to do — if the admin front-end was accessible to the outside world, an attacker could just bypass the login to gain access to any system. This is exactly why scans like this are so alarming. This is a tool a hacker can use to find a new route in using the same vector.

What to do now?​

In light of the news if you and your organization have any Palo Alto firewalls or VPN, take the following action steps as soon as possible:

a. Upgrade your software — To the latest PAN-OS or GlobalProtect version for your device

b. Hide your login page — Only allow login page access from a single internal or trusted IP

c. Review your logs — Look for possible signins from unknown IP

d. Block known bad IP — A threat intel service like GreyNoise will help identify known malicious IP addresses

e. Layer additional security on authentication — Examples of layered authentication methods include multifactor authentication and long strong passwords.

This may seem like a small step now, but it may be the difference between a large compromise later on.

Conclusion​

This enormous number of scans is not an innocent background noise - it is a warning. Hackers seem to be looking at Palo Alto systems and may even be readying for an attack.

If you're responsible for firewalls or VPNs, do not wait. Patch, protect, and monitor - today's scans could very well be tomorrow's attack.
 
Top