Coordinated Cyberattacks Exploit Unpatched Enterprise Network Vulnerabilities

Article Highlights
Off On

A significant rise in cyberattacks has been observed, targeting enterprise network appliances and remote access tools, putting global organizations on heightened alert. On March 28, 2025, GreyNoise, a cybersecurity firm, reported a staggering 300 percent increase in malicious activities aimed at critical infrastructure such as SonicWall firewalls, Zoho ManageEngine platforms, F5 BIG-IP systems, and Ivanti Connect Secure VPNs. The spike in attacks underscores a coordinated campaign by threat actors exploiting both older vulnerabilities and newly disclosed flaws in these widely implemented technologies. This combination of outdated and new threats highlights the systematic and sophisticated approach cybercriminals are employing to attack unpatched systems.

Rising Threats from Unpatched Vulnerabilities

The most alarming aspect of these recent cyber assaults is the exploitation of unpatched vulnerabilities. This especially reflects the delayed patching cycles present in numerous organizations. Threat actors are leveraging a mix of older Common Vulnerabilities and Exposures (CVEs) along with newly disclosed flaws, revealing a methodical and sophisticated approach in their techniques. This scenario underscores the critical need for timely patching and vigilant security practices, as the threat actors exploit these unaddressed weaknesses to compromise enterprise networks.

Further compounding the issue is the complexity involved in maintaining and updating hybrid cloud infrastructures. Despite patches being released, the intricate nature of hybrid environments often leads to a lag in applying these crucial updates. This delay provides threat actors with an ample window to capitalize on vulnerabilities, leading to breaches and disruptions. The integration of different systems and technologies in hybrid environments poses unique challenges in ensuring that all components are adequately protected and promptly updated.

Targeted Systems and Exploitation Patterns

Ivanti Connect Secure VPNs have become a prime target, with attackers focusing on three critical vulnerabilities: CVE-2025-22467, CVE-2024-10644, and CVE-2024-38657. These specific flaws enable attackers to manipulate system files and execute malicious commands. Although patches were released in the first quarter of 2025, numerous organizations remain exposed due to the complexities associated with updating hybrid cloud infrastructures. Attackers have taken advantage of these delays, injecting payloads into Ivanti’s XML-based API endpoints while disguising malicious traffic as legitimate to avoid detection.

Similarly, SonicWall SSL VPNs face exploitation due to CVE-2024-53704, an authentication bypass flaw in SonicOS SSL VPNs patched in January 2025. By exploiting this vulnerability, attackers can hijack active VPN sessions and steal credentials. The escalation in exploit attempts aligns with the dark web leaks of SonicWall configuration templates specifically designed for ransomware deployment. This surge reflects the larger, coordinated efforts by threat actors to capitalize on unpatched vulnerabilities, emphasizing the importance of timely security updates and robust defenses.

Emerging Threats in Zoho ManageEngine and F5 BIG-IP

Zoho ManageEngine has also been targeted through CVE-2024-10640, a deserialization vulnerability in the REST API connector. Attackers exploit this flaw by crafting malicious serialized objects to gain root access, leading to attacks that deploy cryptominers and Cobalt Strike beacons. During a brief 72-hour window, GreyNoise logged thousands of exploitation attempts against vulnerable instances. Enterprises struggled to implement the necessary hotfixes released on March 25, leaving them vulnerable to swift exploitation. This rapid succession of attack and patch release underscores the critical need for prompt and effective mitigation strategies.

In addition, F5 BIG-IP appliances face threats from CVE-2025-19872, a server-side request forgery (SSRF) flaw in the iControl REST interface. Attackers exploited misconfigured HTTP endpoints to bypass network restrictions and potentially access sensitive resources such as Kubernetes clusters or cloud metadata. Despite F5 issuing a patch on March 18, the need for manual intervention delayed mitigation efforts for many users, further exposing them to risks. This vulnerability highlights the importance of ensuring proper configurations and timely patch applications to maintain robust security postures.

Multi-Phase Strategy of the Campaign

The multi-phase strategy utilized by attackers in this campaign is noteworthy for its complexity and effectiveness. The initial phase involves reconnaissance, where automated scanners identify unpatched systems by profiling SSL/TLS handshake patterns. Attackers then escalate privileges by chaining CVEs, such as combining Ivanti’s CVE-2024-38657 (file write) with CVE-2025-22467 (buffer overflow) to overwrite system binaries. This systematic approach allows attackers to gain deeper access and control over targeted systems, highlighting the sophisticated nature of their strategies.

Persistence is maintained through hijacked VPN tunnels and API keys, enabling lateral movement within compromised networks. Attackers establish SOCKS5 proxies using compromised credentials, facilitating further internal reconnaissance and exploitation. Additionally, SSRF exploits on F5 appliances are used to harvest AWS IAM credentials, further emphasizing the campaign’s sophistication. This multi-layered attack strategy underscores the need for comprehensive security measures and proactive threat detection protocols to combat such persistent and advanced threats.

Mitigation Strategies for Enterprises

A notable surge in cyberattacks has been detected, targeting enterprise network appliances and remote access tools, placing global organizations on high alert. On March 28, 2025, GreyNoise, a cybersecurity firm, reported a dramatic 300 percent increase in malicious activities directed at essential infrastructure like SonicWall firewalls, Zoho ManageEngine platforms, F5 BIG-IP systems, and Ivanti Connect Secure VPNs. This sharp rise in attacks highlights a coordinated campaign by cybercriminals exploiting both older vulnerabilities and newly revealed flaws in these widely used technologies. The combination of outdated and new threats emphasizes the systematic and sophisticated tactics employed by threat actors to breach unpatched systems. This pattern of exploitation underscores the urgent need for organizations to bolster their security measures and patch vulnerabilities promptly to defend against these evolving cyber threats that endanger critical infrastructure and sensitive data on a global scale.

Explore more

How Firm Size Shapes Embedded Finance Strategy

The rapid transformation of mundane business platforms into sophisticated financial ecosystems has effectively redrawn the competitive boundaries for companies operating in the modern economy. In this environment, the integration of banking, payments, and lending services directly into a non-financial company’s digital interface is no longer a luxury for the avant-garde but a baseline requirement for economic viability. Whether a company

What Is Embedded Finance vs. BaaS in the 2026 Landscape?

The modern consumer no longer wakes up with the intention of visiting a bank, because the very concept of a financial institution has migrated from a physical storefront into the digital oxygen of everyday life. This transformation marks the definitive end of banking as a standalone chore, replacing it with a fluid experience where capital management is an invisible byproduct

How Can Payroll Analytics Improve Government Efficiency?

While the hum of a government office often suggests a routine of paperwork and protocol, the digital pulses within its payroll systems represent the heartbeat of a nation’s economic stability. In many public administrations, payroll data is viewed as little more than a digital receipt—a record of transactions that concludes once a salary reaches a bank account. Yet, this information

Global RPA Market to Hit $50 Billion by 2033 as AI Adoption Surges

The quiet hum of high-speed data processing has replaced the frantic clicking of keyboards in modern back offices, marking a permanent shift in how global businesses manage their most critical internal operations. This transition is not merely about speed; it is about the fundamental transformation of human-led workflows into self-sustaining digital systems. As organizations move deeper into the current decade,

New AGILE Framework to Guide AI in Canada’s Financial Sector

The quiet hum of servers across Canada’s financial heartland now dictates more than just basic transactions; it increasingly determines who qualifies for a mortgage or how a retirement fund reacts to global volatility. As algorithms transition from the shadows of back-office automation to the forefront of consumer-facing decisions, the stakes for oversight have never been higher. The findings from the