The Shadowserver Foundation
@shadowserver.bsky.social
4.7K followers 0 following 690 posts
Our mission is to make the Internet more secure by bringing to light vulnerabilities, malicious activity and emerging threats. Join our Alliance! https://shadowserver.org/partner
Posts Media Videos Starter Packs
Pinned
shadowserver.bsky.social
Using ELK & interested in automating ingestion of our threat intel for your network/constituency?

We have added support for Elasticsearch Custom Logs integration for our free daily reports API.

Check it out at github.com/The-Shadowse...
shadowserver.bsky.social
Please let us know of any FPs

We are also in the process of expanding Oracle E-Business Suite exposure, which you can track here: dashboard.shadowserver.org/statistics/i...
Time series · IoT device statistics · The Shadowserver Foundation
dashboard.shadowserver.org
shadowserver.bsky.social
Oracle E-Business Suite incidents: We have added CVE-2025-61882 scanning & reporting with 576 potential vulnerable IPs found on 2025-10-06. Top affected: USA

IP data in www.shadowserver.org/what-we-do/n...

World map view of likely vulnerable instances: dashboard.shadowserver.org/statistics/c...
shadowserver.bsky.social
You can track CVE-2025-20333 & CVE-2025-20362 vulnerable (unpatched) Cisco ASA/FTD instances here - dashboard.shadowserver.org/statistics/c...

Around ~45K vulnerable seen on 2025-10-04
shadowserver.bsky.social
Attention!

Cisco ASA/FTD CVE-2025-20333 & CVE-2025-20362 incidents: we are now sharing daily vulnerable Cisco ASA/FTD instances in Vulnerable HTTP reports: www.shadowserver.org/what-we-do/n...

Over 48.8K unpatched IPs found 2025-09-29. Top affected: US

dashboard.shadowserver.org/statistics/c...
shadowserver.bsky.social
Last week we released a new daily report type, "Badsecrets Report": www.shadowserver.org/what-we-do/n... (default severity: HIGH)

It identifies the use of known or very weak cryptographic secrets across a variety of web frameworks/platforms. 12168 IPs seen (2025-09-14) using "bad" secrets!
shadowserver.bsky.social
FreePBX CVE-2025-57819 (CVSS 10.0) incidents: 6620 unpatched instances seen 2025-08-29, at least 386 compromised.

Dashboard links:
Vulnerable (unpatched): dashboard.shadowserver.org/statistics/c...

Compromised:
dashboard.shadowserver.org/statistics/c...
shadowserver.bsky.social
Citrix NetScaler CVE-2025-7775 patch rate as seen in our scans:

dashboard.shadowserver.org/statistics/c...

dashboard.shadowserver.org/statistics/c...

Down from 28.2K to 12.4K. Europe patching at faster rate than North America

(toggle overlapping/stacked time series on our Dashboard to compare)
shadowserver.bsky.social
ALERT: On 2025-08-26 over 28K Citrix NetScaler instances were unpatched to CVE-2025-7775 RCE. There is exploitation in the wild confirmed by US CISA KEV.

Patch info: support.citrix.com/support-home...

Top affected: US, Germany

Dashboard geo breakdown: dashboard.shadowserver.org/statistics/c...
shadowserver.bsky.social
These services should not be exposed to the public Internet.

#CyberCivilDefense
shadowserver.bsky.social
We added a new daily scan report type, Accessible GPRS Tunneling Protocol (GTP) services listing IPs with publicly exposed GTP-C (Core) on port 2123/UDP & GTP-U (User) 2152/UDP.

Report format: www.shadowserver.org/what-we-do/n...

Dashboard World map: dashboard.shadowserver.org/statistics/c...
shadowserver.bsky.social
We appreciate all feedback on any investigations as a result of our reports, should you receive one for your network. Check for device_vendor set to Cisco, Linksys or Araknis Networks with different device_model fields.
shadowserver.bsky.social
Since July 30th we are seeing an increase in scans coming from ~2200 compromised Cisco Small Business RV series routers, Linksys LRT series & Araknis Networks (AN-300-RT-4L2W). Top affected: US but also many others.

IP data on these scans shared in www.shadowserver.org/what-we-do/n...