295 Malicious IPs Coordinate Brute-Force Attacks on Apache Tomcat Manager

Published:

spot_img

Surge in Brute-Force Attacks on Apache Tomcat Manager Interfaces

Overview of the Threat

Recently, GreyNoise, a notable threat intelligence firm, issued an alert regarding a significant increase in brute-force login attempts targeting Apache Tomcat Manager interfaces. Beginning on June 5, 2025, the frequency of these attempts has raised concerns that these attacks are systematic efforts aimed at exposing vulnerable Tomcat services en masse.

Observations of Malicious Activity

On the specified date, GreyNoise identified 295 unique IP addresses engaged in recurrent brute-force attacks against Tomcat Manager. Alarmingly, all of these IPs were classified as malicious. In the subsequent 24 hours, an additional 188 unique IPs were documented, with the highest concentrations originating from the United States, the United Kingdom, Germany, the Netherlands, and Singapore.

Specifics of Login Attempts

The findings also included data on login attempts against Tomcat Manager instances. A total of 298 unique IP addresses were noted in these attempts, with 246 of those flagged within the last 24 hours, all again categorized as malicious. The attempts were not confined geographically, targeting regions including the United States, the United Kingdom, Spain, Germany, India, and Brazil. Notably, many of these malicious activities were traced back to servers hosted by DigitalOcean.

Implications of This Behavior

GreyNoise emphasized that while no specific vulnerability has been linked to these activities, the occurrence points toward a continued interest in accessing exposed Tomcat services. Such widespread and opportunistic probing often acts as an early indicator of potential exploitation down the line.

In light of these threats, organizations utilizing Apache Tomcat, especially with accessible Manager interfaces, are urged to take proactive measures. Implementing robust authentication protocols and stringent access controls is essential. Regular monitoring for unusual activity can further help mitigate risks associated with these malicious attempts.

Exposed Security Cameras: A Growing Concern

In a separate security issue, Bitsight reported that there are more than 40,000 security cameras currently accessible online. This situation creates serious vulnerabilities, as anyone with internet access could potentially view live feeds, highlighting ongoing issues with unsecured digital devices.

Distribution of Exposed Cameras

The majority of these exposed cameras are concentrated in countries such as the United States, Japan, Austria, Czechia, and South Korea. The telecommunications sector bears the brunt of this issue, accounting for 79% of the exposed devices. Other sectors include technology (6%), media (4.1%), utilities (2.5%), education (2.2%), business services (2.2%), and government (1.2%).

Risks Associated with Vulnerable Installations

These cameras, found in various settings—from private residences to public transport and manufacturing environments—risk leaking sensitive information. Such exposures can facilitate espionage, stalking, and extortion, emphasizing the need for heightened security awareness among users.

Best Practices for Camera Security

To combat these risks, security experts recommend several preventive steps. Users should change default usernames and passwords, disable remote access if unnecessary, or restrict access through firewalls and Virtual Private Networks (VPNs). Keeping firmware updated is another critical measure to ensure better device security.

João Cruz, a security researcher, highlighted the unintended consequences of these security cameras, often referred to as “inadvertent windows” into personal and sensitive spaces. The ease with which these devices can be installed—usually involving minimal setup—adds to the ongoing risk.

As security practitioners and users become increasingly aware of these critical issues, the focus on implementing robust protective measures continues to grow. Monitoring online vulnerabilities and enhancing device security are essential actions in today’s connected world.

spot_img

Related articles

Recent articles

Aussie Firm Skeggs Goldstien Confirms Qilin Ransomware Attack

Investigation Underway at Skeggs Goldstien Following Cybersecurity Incident Cybersecurity Breach Confirmed Skeggs Goldstien, a financial services company based in New South Wales, Australia, is currently addressing...

IHC Unveils $1 Billion AI-Powered Reinsurance Platform RIQ in Abu Dhabi

IHC Launches Revolutionary Reinsurance Platform in Abu Dhabi International Holding Company (IHC), a prominent investment firm based in the UAE, has unveiled the Reinsurance Intelligence...

Over 269,000 Websites Hit by JSFireTruck JavaScript Malware in Just One Month

Jun 13, 2025Ravie LakshmananWeb Security / Network Security The Rise of JSFireTruck: A New Threat in Web Security Cybersecurity experts have recently highlighted a significant threat...

Will You Fall in Love with Your AI Twin?

Embracing Our AI Twins: A Journey Toward Collaborative Intelligence The Concept of Digital Twins Imagine a world where a version of you—enhanced, fast-thinking, and caffeine-free—exists in...