Piotr Kijewski's Avatar

Piotr Kijewski

@piotrkijewski

@shadowserver.bsky.social‬

72
Followers
3
Following
1
Posts
14.06.2023
Joined
Posts Following

Latest posts by Piotr Kijewski @piotrkijewski

Massive increase in sources attempting Ivanti EPMM CVE-2026-1281 exploitation, with over 28.3K source IPs seen on 2026-02-09. IP data on attackers shared in our www.shadowserver.org/what-we-do/n... (with vulnerability_id set to CVE-2026-1281). 20.4K IPs seen from US networks.

10.02.2026 18:36 👍 7 🔁 5 💬 1 📌 1
Post image

We have started to report webshells (or other artifacts) found on Ivanti EPMM devices, likely compromised via CVE-2026-1281. 56 IPs found on 2026-02-06

Data in shadowserver.org/what-we-do/n...

Tree Map view: dashboard.shadowserver.org/statistics/c...

Thank you to the KSA NCA for the heads up!

07.02.2026 16:22 👍 27 🔁 8 💬 2 📌 1

These reports help people defend the country against cyber attacks and also helps people fight scammer networks

#CyberCivilDefense #take9

05.02.2026 11:53 👍 14 🔁 4 💬 0 📌 0
Post image Post image

Spike in Ivanti EPMM CVE-2026-1281 RCE exploitation attempts seen by our sensors last 24 hours from at least 13 source IPs. In our scans, we see ~1600 exposed instances worldwide (no vulnerability assessment). Top exposed: Germany (516)

Ivanti hotfix guidance: forums.ivanti.com/s/article/Se...

31.01.2026 15:32 👍 6 🔁 2 💬 1 📌 1

CVE-2026-24858, a Fortinet authentication bypass vulnerability affecting multiple Fortinet products with FortiCloud SSO enabled, has been added by CISA to the KEV catalog.

We share exposed Fortinet instances with FortiCloud SSO enabled daily in our feeds (~10 000 seen)

28.01.2026 18:48 👍 4 🔁 4 💬 1 📌 0
Post image

We added SmarterTools SmarterMail CVE-2026-23760 RCE to our daily Vulnerable HTTP scans. Around 6000 IPs globally found likely vulnerable based on our version check. We also see exploitation attempts in the wild.

CVE-2026-23760 Geo Treemap View: dashboard.shadowserver.org/statistics/c...

26.01.2026 14:03 👍 1 🔁 2 💬 1 📌 0
Post image

Regarding CVE-2026-24061 in GNU InetUtils telnetd: while we are not scanning for it explicitly (due to current lack of ability to check in a safe way, we do share - and have for years - data on exposed instances in our Accessible Telnet Report: www.shadowserver.org/what-we-do/n...

~800K exposed

26.01.2026 10:26 👍 5 🔁 2 💬 0 📌 1
Post image

We are scanning & reporting out SmarterMail hosts vulnerable to CVE-2025-52691 RCE (CVSS 10).
8001 unique IPs likely vulnerable on 2026-01-12 (18783 exposed). Note Exploit PoCs are public.

Tree Map: dashboard.shadowserver.org/statistics/c...

Raw IP data: www.shadowserver.org/what-we-do/n...

13.01.2026 12:29 👍 2 🔁 2 💬 1 📌 0
Post image

We have identified 120 Cisco Secure Email Gateway/ Cisco Secure Email and Web Manager likely vulnerable to CVE-2025-20393 (over 650 fingerprinted exposed). CVE-2025-20393 is exploited in the wild, with no patch available. Follow Cisco recommendations at sec.cloudapps.cisco.com/security/cen...

20.12.2025 18:31 👍 8 🔁 5 💬 1 📌 0
Post image

Using ELK & interested in automating ingestion of our threat intel for your network/constituency via our API?

We have introduced an ECS logging script for our intelligence reports. This script uses Redis to queue events for Logstash.

Check it out at github.com/The-Shadowse...

13.12.2025 15:45 👍 7 🔁 2 💬 0 📌 0
Post image

We added fingerprinting of Fortinet devices with FortiCloud SSO enabled to our Device Identification reporting (at least 25K IPs seen globally). While not necessarily vulnerable to CVE-2025-59718/CVE-2025-59719 if you get a report from us regarding exposure, please verify/patch!

19.12.2025 12:12 👍 16 🔁 7 💬 2 📌 1
Post image

React Server Components (CVE-2025-55182) RCE findings so far on 2025-12-05. 77664 IPs found vulnerable (based on Assetnote methodology).

IP data is being shared in Vulnerable HTTP reports: www.shadowserver.org/what-we-do/n...

Dashboard geo breakdown: dashboard.shadowserver.org/statistics/c...

06.12.2025 10:13 👍 7 🔁 6 💬 1 📌 3
Preview
VulnCheck - Outpace Adversaries Vulnerability intelligence that predicts avenues of attack with speed and accuracy.

Excited that our collaboration with
VulnCheck (vulncheck.com) continues to grow as we welcome them as a new Shadowserver Alliance Partner -Silver tier!

We look forward to enhancing our joint efforts to help network defenders globally with vulnerability management.

01.12.2025 15:20 👍 5 🔁 2 💬 1 📌 0
Post image

Operation Endgame Season 3 Episode 2: Interlude released in time for Thanksgiving, recapping some of the #cybercrime disruption successes achieved so far, by partners working together internationally. Happy holidays - looking forward to future episodes!

27.11.2025 11:35 👍 5 🔁 4 💬 1 📌 0
Post image

We shared out 10,449 entries (e-mails) affected by the JSONFormatter and CodeBeautifier leak discovered by @watchTowr (see labs.watchtowr.com/stop-putting...).

Data shared in a our Compromised Account Report www.shadowserver.org/what-we-do/n... (search for 2025-11-26 & compromised_account prefix)

27.11.2025 16:37 👍 3 🔁 3 💬 1 📌 0
Post image

We have been sharing Monsta FTP CVE-2025-34299 (pre-auth RCE) vulnerable instances for the last few weeks. We still see over 780 IPs vulnerable (version based check) instances daily. Most affected: US & Slovakia: dashboard.shadowserver.org/statistics/c...

dashboard.shadowserver.org/statistics/c...

24.11.2025 13:27 👍 3 🔁 2 💬 1 📌 0
Post image

Proud to once again support our LE partners in Operation Endgame Season 3

86M stolen data items from 525K victim IPs across 226 countries included in our new Rhadamanthys Historic Bot Victims Special Report, run overnight 2025-11-12

More details:
shadowserver.org/news/rhadama...

13.11.2025 10:13 👍 12 🔁 4 💬 1 📌 1
Post image

"Don’t take BADCANDY from strangers ..."

The Australian Signals Directorate (ASD) recently published an advisory on the BadCandy implant still present in many Cisco IOS XE devices: www.cyber.gov.au/about-us/vie...

We still see around 15 000 Cisco IOS XE devices with the implant

03.11.2025 20:30 👍 8 🔁 5 💬 1 📌 0
Post image

We added CVE-2025-40778 BIND9 tagging (potential susceptibility to cache poisoning) to our DNS scans: www.shadowserver.org/what-we-do/n...

We found nearly 8898 unpatched DNS open resolvers on 2025-10-30, down to 6653 on 2025-11-01: dashboard.shadowserver.org/statistics/c...

02.11.2025 14:02 👍 7 🔁 3 💬 1 📌 0
Post image

Attention - Microsoft WSUS CVE-2025-59287 incidents! We are observing exploitation attempts based on a published POC. We have also began fingerprinting exposed WSUS instances (ports 8530/8531) with at least 2800 seen on 2025-10-25 (not necessarily vulnerable).

26.10.2025 18:39 👍 9 🔁 4 💬 1 📌 0
Post image

We are now sharing daily IP data on WatchGuard Fireware OS IKEv2 Out-of-Bounds Write CVE-2025-9242 vulnerable instances, with over 71 000 seen on 2025-10-18. Data shared in our Vulnerable ISAKMP reportings - www.shadowserver.org/what-we-do/n...

Top affected: US with 23.2K instances

19.10.2025 13:30 👍 11 🔁 6 💬 1 📌 0
Post image Post image

Proud to support our Law Enforcement partners in another successful cybercrime disruption:
Operation SIMCARTEL

Great work everyone involved 👏

europol.europa.eu/media-press/...

18.10.2025 13:37 👍 5 🔁 3 💬 0 📌 0
Post image

Regarding F5 network compromise (see my.f5.com/manage/s/art...):

We are sharing daily IP data on F5 exposures in our Device ID www.shadowserver.org/what-we-do/n... (device_vendor set to F5).

~269K IPs seen daily, nearly half in US.

Geo breakdown: dashboard.shadowserver.org/statistics/i...

16.10.2025 19:42 👍 7 🔁 9 💬 1 📌 1
Post image

Oracle E-Business Suite incidents: We have added CVE-2025-61882 scanning & reporting with 576 potential vulnerable IPs found on 2025-10-06. Top affected: USA

IP data in www.shadowserver.org/what-we-do/n...

World map view of likely vulnerable instances: dashboard.shadowserver.org/statistics/c...

07.10.2025 14:03 👍 6 🔁 5 💬 1 📌 0

You can track CVE-2025-20333 & CVE-2025-20362 vulnerable (unpatched) Cisco ASA/FTD instances here - dashboard.shadowserver.org/statistics/c...

Around ~45K vulnerable seen on 2025-10-04

05.10.2025 10:00 👍 6 🔁 1 💬 1 📌 0
Post image

Last week we released a new daily report type, "Badsecrets Report": www.shadowserver.org/what-we-do/n... (default severity: HIGH)

It identifies the use of known or very weak cryptographic secrets across a variety of web frameworks/platforms. 12168 IPs seen (2025-09-14) using "bad" secrets!

15.09.2025 08:28 👍 4 🔁 2 💬 1 📌 0
Post image Post image

FreePBX CVE-2025-57819 (CVSS 10.0) incidents: 6620 unpatched instances seen 2025-08-29, at least 386 compromised.

Dashboard links:
Vulnerable (unpatched): dashboard.shadowserver.org/statistics/c...

Compromised:
dashboard.shadowserver.org/statistics/c...

30.08.2025 15:24 👍 11 🔁 5 💬 1 📌 0

Running unpatched Citrix NetScalers or seeing them in your constituency? Now is the time to get those checked for compromise and patched ...

27.08.2025 11:44 👍 1 🔁 0 💬 0 📌 0
Post image Post image Post image Post image

We added a new daily scan report type, Accessible GPRS Tunneling Protocol (GTP) services listing IPs with publicly exposed GTP-C (Core) on port 2123/UDP & GTP-U (User) 2152/UDP.

Report format: www.shadowserver.org/what-we-do/n...

Dashboard World map: dashboard.shadowserver.org/statistics/c...

20.08.2025 18:01 👍 3 🔁 2 💬 1 📌 0
Post image Post image Post image

Since July 30th we are seeing an increase in scans coming from ~2200 compromised Cisco Small Business RV series routers, Linksys LRT series & Araknis Networks (AN-300-RT-4L2W). Top affected: US but also many others.

IP data on these scans shared in www.shadowserver.org/what-we-do/n...

19.08.2025 10:15 👍 5 🔁 3 💬 1 📌 0