Piotr Kijewski
@piotrkijewski.bsky.social
📤 72
📥 3
📝 1
@shadowserver.bsky
.social
reposted by
Piotr Kijewski
The Shadowserver Foundation
1 day ago
We have identified 120 Cisco Secure Email Gateway/ Cisco Secure Email and Web Manager likely vulnerable to CVE-2025-20393 (over 650 fingerprinted exposed). CVE-2025-20393 is exploited in the wild, with no patch available. Follow Cisco recommendations at
sec.cloudapps.cisco.com/security/cen...
1
7
5
reposted by
Piotr Kijewski
The Shadowserver Foundation
8 days ago
Using ELK & interested in automating ingestion of our threat intel for your network/constituency via our API? We have introduced an ECS logging script for our intelligence reports. This script uses Redis to queue events for Logstash. Check it out at
github.com/The-Shadowse...
0
6
2
reposted by
Piotr Kijewski
The Shadowserver Foundation
2 days ago
We added fingerprinting of Fortinet devices with FortiCloud SSO enabled to our Device Identification reporting (at least 25K IPs seen globally). While not necessarily vulnerable to CVE-2025-59718/CVE-2025-59719 if you get a report from us regarding exposure, please verify/patch!
2
16
8
reposted by
Piotr Kijewski
The Shadowserver Foundation
16 days ago
React Server Components (CVE-2025-55182) RCE findings so far on 2025-12-05. 77664 IPs found vulnerable (based on Assetnote methodology). IP data is being shared in Vulnerable HTTP reports:
www.shadowserver.org/what-we-do/n...
Dashboard geo breakdown:
dashboard.shadowserver.org/statistics/c...
1
7
10
reposted by
Piotr Kijewski
The Shadowserver Foundation
20 days ago
Excited that our collaboration with VulnCheck (
vulncheck.com
) continues to grow as we welcome them as a new Shadowserver Alliance Partner -Silver tier! We look forward to enhancing our joint efforts to help network defenders globally with vulnerability management.
loading . . .
VulnCheck - Outpace Adversaries
Vulnerability intelligence that predicts avenues of attack with speed and accuracy.
https://vulncheck.com
1
5
2
reposted by
Piotr Kijewski
The Shadowserver Foundation
24 days ago
Operation Endgame Season 3 Episode 2: Interlude released in time for Thanksgiving, recapping some of the
#cybercrime
disruption successes achieved so far, by partners working together internationally. Happy holidays - looking forward to future episodes!
1
6
4
reposted by
Piotr Kijewski
The Shadowserver Foundation
24 days ago
We shared out 10,449 entries (e-mails) affected by the JSONFormatter and CodeBeautifier leak discovered by @watchTowr (see
labs.watchtowr.com/stop-putting...
). Data shared in a our Compromised Account Report
www.shadowserver.org/what-we-do/n...
(search for 2025-11-26 & compromised_account prefix)
1
3
3
reposted by
Piotr Kijewski
The Shadowserver Foundation
27 days ago
We have been sharing Monsta FTP CVE-2025-34299 (pre-auth RCE) vulnerable instances for the last few weeks. We still see over 780 IPs vulnerable (version based check) instances daily. Most affected: US & Slovakia:
dashboard.shadowserver.org/statistics/c...
dashboard.shadowserver.org/statistics/c...
1
3
2
reposted by
Piotr Kijewski
The Shadowserver Foundation
about 1 month ago
Proud to once again support our LE partners in Operation Endgame Season 3 86M stolen data items from 525K victim IPs across 226 countries included in our new Rhadamanthys Historic Bot Victims Special Report, run overnight 2025-11-12 More details:
shadowserver.org/news/rhadama...
1
12
5
reposted by
Piotr Kijewski
The Shadowserver Foundation
about 2 months ago
"Don’t take BADCANDY from strangers ..." The Australian Signals Directorate (ASD) recently published an advisory on the BadCandy implant still present in many Cisco IOS XE devices:
www.cyber.gov.au/about-us/vie...
We still see around 15 000 Cisco IOS XE devices with the implant
1
8
5
reposted by
Piotr Kijewski
The Shadowserver Foundation
about 2 months ago
We added CVE-2025-40778 BIND9 tagging (potential susceptibility to cache poisoning) to our DNS scans:
www.shadowserver.org/what-we-do/n...
We found nearly 8898 unpatched DNS open resolvers on 2025-10-30, down to 6653 on 2025-11-01:
dashboard.shadowserver.org/statistics/c...
1
7
3
reposted by
Piotr Kijewski
The Shadowserver Foundation
about 2 months ago
Attention - Microsoft WSUS CVE-2025-59287 incidents! We are observing exploitation attempts based on a published POC. We have also began fingerprinting exposed WSUS instances (ports 8530/8531) with at least 2800 seen on 2025-10-25 (not necessarily vulnerable).
1
9
4
reposted by
Piotr Kijewski
The Shadowserver Foundation
2 months ago
We are now sharing daily IP data on WatchGuard Fireware OS IKEv2 Out-of-Bounds Write CVE-2025-9242 vulnerable instances, with over 71 000 seen on 2025-10-18. Data shared in our Vulnerable ISAKMP reportings -
www.shadowserver.org/what-we-do/n...
Top affected: US with 23.2K instances
1
11
6
reposted by
Piotr Kijewski
The Shadowserver Foundation
2 months ago
Proud to support our Law Enforcement partners in another successful cybercrime disruption: Operation SIMCARTEL Great work everyone involved 👏
europol.europa.eu/media-press/...
0
5
3
reposted by
Piotr Kijewski
The Shadowserver Foundation
2 months ago
Regarding F5 network compromise (see
my.f5.com/manage/s/art...
): We are sharing daily IP data on F5 exposures in our Device ID
www.shadowserver.org/what-we-do/n...
(device_vendor set to F5). ~269K IPs seen daily, nearly half in US. Geo breakdown:
dashboard.shadowserver.org/statistics/i...
1
7
10
reposted by
Piotr Kijewski
The Shadowserver Foundation
3 months ago
Oracle E-Business Suite incidents: We have added CVE-2025-61882 scanning & reporting with 576 potential vulnerable IPs found on 2025-10-06. Top affected: USA IP data in
www.shadowserver.org/what-we-do/n...
World map view of likely vulnerable instances:
dashboard.shadowserver.org/statistics/c...
1
6
5
reposted by
Piotr Kijewski
The Shadowserver Foundation
3 months ago
You can track CVE-2025-20333 & CVE-2025-20362 vulnerable (unpatched) Cisco ASA/FTD instances here -
dashboard.shadowserver.org/statistics/c...
Around ~45K vulnerable seen on 2025-10-04
add a skeleton here at some point
1
6
1
reposted by
Piotr Kijewski
The Shadowserver Foundation
3 months ago
Last week we released a new daily report type, "Badsecrets Report":
www.shadowserver.org/what-we-do/n...
(default severity: HIGH) It identifies the use of known or very weak cryptographic secrets across a variety of web frameworks/platforms. 12168 IPs seen (2025-09-14) using "bad" secrets!
1
4
2
reposted by
Piotr Kijewski
The Shadowserver Foundation
4 months ago
FreePBX CVE-2025-57819 (CVSS 10.0) incidents: 6620 unpatched instances seen 2025-08-29, at least 386 compromised. Dashboard links: Vulnerable (unpatched):
dashboard.shadowserver.org/statistics/c...
Compromised:
dashboard.shadowserver.org/statistics/c...
1
11
5
Running unpatched Citrix NetScalers or seeing them in your constituency? Now is the time to get those checked for compromise and patched ...
add a skeleton here at some point
4 months ago
0
1
0
reposted by
Piotr Kijewski
The Shadowserver Foundation
4 months ago
We added a new daily scan report type, Accessible GPRS Tunneling Protocol (GTP) services listing IPs with publicly exposed GTP-C (Core) on port 2123/UDP & GTP-U (User) 2152/UDP. Report format:
www.shadowserver.org/what-we-do/n...
Dashboard World map:
dashboard.shadowserver.org/statistics/c...
1
3
2
reposted by
Piotr Kijewski
The Shadowserver Foundation
4 months ago
Since July 30th we are seeing an increase in scans coming from ~2200 compromised Cisco Small Business RV series routers, Linksys LRT series & Araknis Networks (AN-300-RT-4L2W). Top affected: US but also many others. IP data on these scans shared in
www.shadowserver.org/what-we-do/n...
1
5
3
reposted by
Piotr Kijewski
The Shadowserver Foundation
4 months ago
We added version based N-able N-central RMM CVE-2025-8875 & CVE-2025-8876 detection to our daily scans. 1077 IPs unpatched IPs seen on 2025-08-15. Both CVEs recently added to US CISA KEV. Top affected: US, Canada, Netherlands, UK Dashboard map view:
dashboard.shadowserver.org/statistics/c...
1
4
3
reposted by
Piotr Kijewski
The Shadowserver Foundation
4 months ago
We added VMware ESXi CVE-2025-41236 (CVSS 9.3) version based detection to our daily scans. First added 2025-07-19 with 17,238 IPs found. Latest scan (2025-08-10) detects 16,330 unpatched IPs, which is a slow patch rate. Top affected: France, China, US, Germany
1
9
2
reposted by
Piotr Kijewski
The Shadowserver Foundation
5 months ago
We added Microsoft Exchange CVE-2025-53786 detection to our daily scans (version based). See US CISA Emergency Directive 25-02:
www.cisa.gov/news-events/...
Over 28K IPs unpatched (2025-08-07). Top affected: US, Germany, Russia Dashboard world map:
dashboard.shadowserver.org/statistics/c...
1
6
3
reposted by
Piotr Kijewski
The Shadowserver Foundation
5 months ago
We added version based SonicWall SMA100 CVE-2025-40596 detection to our daily scans - at least 3200 IPs seen still unpatched! Top affected: US, Japan, Germany Dashboard map:
dashboard.shadowserver.org/statistics/c...
NVD entry:
nvd.nist.gov/vuln/detail/...
1
13
5
reposted by
Piotr Kijewski
The Shadowserver Foundation
5 months ago
PaperCut CVE-2023-2533 was recently added to the CISA KEV catalog. We added version based detection of unpatched IPs with 129 seen (2025-08-03).
dashboard.shadowserver.org/statistics/c...
We also scan for CVE-2023-39143 & CVE-2023-27350. Data in Vulnerable HTTP:
shadowserver.org/what-we-do/n...
1
5
2
reposted by
Piotr Kijewski
The Shadowserver Foundation
5 months ago
We’re excited to welcome SURFcert to the Shadowserver Alliance as a Bronze Tier Partner! Together with SURFcert and fellow Alliance Partners, we’re making the Internet more secure for all. Read more about SURFcert:
www.surf.nl/en
1
3
2
reposted by
Piotr Kijewski
The Shadowserver Foundation
5 months ago
SharePoint situational update: In collaboration with Validin & CERT-BUND we improved vhost & version based detection of SharePoint instances, resulting in ~17K IPs observed exposed. 840 with CVE-2025-53770 - version based detection only. At least 20 with webshells.
1
5
3
reposted by
Piotr Kijewski
The Shadowserver Foundation
5 months ago
Emerging threats are countered most effectively when IR teams can share technical indicators to improve detection - helping identify, notify & remediate more victims. Great example: CVE-2025-25257 & FortiWeb shells. Saudi Arabian NCA and Canadian CCCS both helped protect victims globally!
1
5
2
reposted by
Piotr Kijewski
The Shadowserver Foundation
5 months ago
Alert! We are scanning for unpatched CrushFTP instances vulnerable to CVE-2025-54309. This vulnerability is exploited in the wild:
www.crushftp.com/crush11wiki/...
We see 1040 instances unpatched on 20th July. Top countries affected: US, Germany, Canada
dashboard.shadowserver.org/statistics/c...
1
8
7
reposted by
Piotr Kijewski
The Shadowserver Foundation
5 months ago
Alert: SharePoint CVE-2025-53770 incidents! In collaboration with Eye Security & watchTowr we are notifying compromised parties. See:
research.eye.security/sharepoint-u...
~9300 Sharepoint IPs seen exposed daily (population, no vulnerability assessment):
dashboard.shadowserver.org/statistics/i...
1
13
10
reposted by
Piotr Kijewski
The Shadowserver Foundation
5 months ago
We are sharing Fortinet FortiWeb instances compromised with webshells likely via CVE-2025-25257. We see 77 cases on 2025-07-15, down from 85 on 2025-07-14. CVE-2025-25257 exploitation activity observed since Jul 11th. Tree map overview (compromised):
dashboard.shadowserver.org/statistics/c...
1
2
2
reposted by
Piotr Kijewski
The Shadowserver Foundation
5 months ago
Since start of July we are seeing Wing FTP Server CVE-2025-47812 RCE exploitation attempts. We are fingerprinting exposed Wing FTP Server instances to establish the potentially vulnerable population. We see ~2000 exposed (no vulnerability checks):
dashboard.shadowserver.org/statistics/i...
1
8
3
reposted by
Piotr Kijewski
The Shadowserver Foundation
6 months ago
Live Flax Typhoon Raptor Train botnet sinkholing data now available through our free daily Sinkhole Event and Sinkhole HTTP Event network reports:
shadowserver.org/what-we-do/n...
shadowserver.org/what-we-do/n...
events tagged as "raptor-train" Remediate current infections!
1
2
1
reposted by
Piotr Kijewski
The Shadowserver Foundation
6 months ago
New Special Report run in collaboration with LE partners on historical Flax Typhoon Raptor Train botnet infections:
shadowserver.org/what-we-do/n...
Filename prefix: 2025-07-07-special 732545 events, 179539 IPs, 2750 ASNs, 143 countries Check your reports for historical compromises
1
5
2
reposted by
Piotr Kijewski
The Shadowserver Foundation
6 months ago
We are scanning for Citrix NetScaler CVE-2025-5777 (since 19/06) & CVE-2025-6543 (since 27/06) vulnerabilities. 1289 & 2100 IPs still seen unpatched as of 2025-06-29. Top: US & DE Tracker:
dashboard.shadowserver.org/statistics/c...
1
6
4
reposted by
Piotr Kijewski
The Shadowserver Foundation
6 months ago
Shadowserver, a member of the Common Good Cyber secretariat, is proud to help launch the Common Good Cyber Fund announced today. Special thanks to the UK and Canada for investing in the Fund and continuing to provide their steadfast support.
commongoodcyber.org/news/common-...
1
8
4
reposted by
Piotr Kijewski
The Shadowserver Foundation
7 months ago
We are happy to support our LE partners!
www.justice.gov/usao-edva/pr...
loading . . .
U.S. Government seizes approximately 145 criminal marketplace domains
The U.S. Attorney’s Office for the Eastern District of Virginia announced today the seizure of approximately 145 darknet and traditional internet domains, and cryptocurrency funds associated with the ...
https://www.justice.gov/usao-edva/pr/us-government-seizes-approximately-145-criminal-marketplace-domains
1
4
2
reposted by
Piotr Kijewski
The Shadowserver Foundation
7 months ago
We have shared a Special Report on IPs infected with Latrodectus malware during 2025-04-26 to 2025-05-20. This is one of the results of the continued international Law Enforcement action called Operation Endgame Season 2.0 Over 44K infected IPs seen:
dashboard.shadowserver.org/statistics/c...
1
6
3
reposted by
Piotr Kijewski
The Shadowserver Foundation
7 months ago
You can also track CVE-2025-4427 exploitation attempts as seen by our honeypot sensors on our Dashboard:
dashboard.shadowserver.org/statistics/h...
add a skeleton here at some point
0
4
2
reposted by
Piotr Kijewski
The Shadowserver Foundation
7 months ago
We are also scanning for Ivanti EPMM instances likely vulnerable (unpatched) to CVE-2025-4427 which can be chained with CVE-2025-4428 for RCE. First scans found 940 instances (2025-05-15), down to 798 (2025-05-18). Geo breakdown:
dashboard.shadowserver.org/statistics/c...
1
1
3
reposted by
Piotr Kijewski
The Shadowserver Foundation
7 months ago
We’re excited to announce that CERT.LV (National CSIRT of Latvia) has joined the Shadowserver Alliance as a Bronze Tier Partner! Together we will raise the bar on cybersecurity. Read more about CERT.LV:
cert.lv/en/
Become a Shadowserver Alliance partner today:
www.shadowserver.org/partner/
0
8
4
reposted by
Piotr Kijewski
The Shadowserver Foundation
8 months ago
We are sharing ScreenConnect instances likely vulnerable to CVE-2025-3935 (CVSS 8.1, versions 25.2.3 & earlier may be susceptible to a ViewState code injection). Patch info:
connectwise.com/company/trus...
685 instances still unpatched (2025-05-07):
dashboard.shadowserver.org/statistics/c...
1
5
3
reposted by
Piotr Kijewski
The Shadowserver Foundation
8 months ago
The dashboard has been built thanks to UK FCDO funding (
www.gov.uk/government/o...
) and holds 2 years worth of aggregated Shadowserver data for all to explore!
add a skeleton here at some point
0
3
2
reposted by
Piotr Kijewski
The Shadowserver Foundation
8 months ago
We’re excited to announce that Identity Digital has joined the Shadowserver Alliance as a Bronze Tier Partner! Together we will work to make the Internet safer and more secure. Read more about Identity Digital:
www.identity.digital/company
loading . . .
Company | Identity Digital empowers registries, registrars, and their customers to elevate their online presence through top-level domains (TLDs), robust services, and advanced technology solutions.
Identity Digital offers the world's largest domain extension portfolio, as well as industry leading registry services (through our recent acquisition of Afilias) and registrar services (provided by Na...
https://www.identity.digital/company
2
5
3
reposted by
Piotr Kijewski
The Shadowserver Foundation
8 months ago
Attention! We are sharing SAP NetWeaver instances vulnerable to CVE-2025-31324 unauth upload (CVSS 10.0). 454 IPs found vulnerable on 2025-04-26. If you receive an alert from us, make sure to check for signs of compromise (incl. webshells). World Map:
dashboard.shadowserver.org/statistics/c...
1
11
6
reposted by
Piotr Kijewski
The Shadowserver Foundation
8 months ago
We are sharing SysAid instances likely vulnerable to CVE-2025-2775, CVE-2025-2776, CVE-2025-2777 (XXEs) any of which combined with CVE-2025-2778 allows for RCE. 77 IPs found unpatched so far (version check). Install updates from SysAid (from March!)
documentation.sysaid.com/docs/24-40-60
1
5
2
reposted by
Piotr Kijewski
The Shadowserver Foundation
8 months ago
Check out our latest Dashboard updates that now highlight compromised devices & post-exploitation frameworks/C2s discovered in scans, as well as various functionality improvements:
dashboard.shadowserver.org#compromised-...
dashboard.shadowserver.org#post-exploit...
2
4
4
reposted by
Piotr Kijewski
The Shadowserver Foundation
8 months ago
Attention! Check your Compromised Website Report for critical events tagged “fortinet-compromised” and follow Fortinet's mitigation advice on compromised devices:
fortinet.com/blog/psirt-b...
Data available from 2025-04-11+
shadowserver.org/what-we-do/n...
3
14
11
Load more
feeds!
log in