Media Coverage

Shadowserver in the news

Specialists of the State Special Communications Service shared their experience in protecting critical infrastructure at the OSCE regional training

GOV.UA, October 29, 2025

Specialists of the State Service for Special Communications participated in the OSCE regional training for Ukraine and Moldova, dedicated to increasing the effectiveness of the implementation of confidence-building measures in the field of cybersecurity and information and communication technologies (ICT) security. During the event, representatives of the State Service for Special Communications shared with international partners best practices in the field of critical infrastructure protection at the national level. They informed participants about key methods and results of responding to cyberattacks carried out against Ukraine in the context of full-scale armed aggression.

In addition to representatives from Ukraine and Moldova, experts from Romania, Belgium, Germany, and a representative of The Shadowserver Foundation were invited as speakers.

CISA orders feds to patch Windows Server WSUS flaw used in attacks

Bleeping Computer, October 27, 2025

The Cybersecurity and Infrastructure Security Agency (CISA) ordered U.S. government agencies to patch a critical-severity Windows Server Update Services (WSUS) vulnerability after adding it to its catalog of security flaws exploited in attacks.

The Shadowserver Internet watchdog group is tracking over 2,800 WSUS instances with the default ports (8530/8531) exposed online, though it didn’t say how many are already patched.

71,000+ WatchGuard Devices Vulnerable to Remote Code Execution Attacks

Cyber Security News, October 21, 2025

The Shadowserver Foundation has uncovered more than 71,000 internet-exposed WatchGuard devices running vulnerable versions of Fireware OS. The Shadowserver Foundation, a nonprofit dedicated to scanning for internet vulnerabilities, began sharing daily IP data on affected WatchGuard devices this week. Shadowserver’s data, available through their Vulnerable ISAKMP reporting portal, includes anonymized IP addresses to help network defenders identify and remediate their own exposures.

Cybercrime-as-a-service takedown: 7 arrested

Europol, October 17, 2025

An action day performed in Latvia on 10 October 2025 led to the arrest of five cybercriminals of Latvian nationality and the seizure of infrastructure used to enable crimes against thousands of victims across Europe. During the operation codenamed ‘SIMCARTEL’, law enforcement arrested two further suspects, took down five servers and seized 1 200 SIM box devices alongside 40 000 active SIM cards. Investigators from Austria, Estonia and Latvia, together with their colleagues at Europol und Eurojust, were able to attribute to the criminal network more than 1 700 individual cyber fraud cases in Austria and 1 500 in Latvia, with a total loss of several million euros.

To prepare for the action day in Latvia, Eurojust and Europol leveraged their strengths to enhance the international law enforcement effort. They assisted in planning and administering the action day, with support from Joint Investigation Team partners Austria, Estonia and Latvia, as well as Finland. During the operation, the technical infrastructure of the organised criminal network was dismantled in collaboration between Europol and the Shadowserver Foundation.

Over 269,000 F5 Devices Found Exposed Online After Massive Breach

GB Hackers, October 17, 2025

A recent breach of F5 Networks’ infrastructure has left more than 269,000 devices exposed and vulnerable to attack. Security researchers first detected unusual activity on F5’s management portal, prompting the company to issue an alert and patch critical vulnerabilities.

Shadowserver’s Device Identification report, which tracks vulnerable or misconfigured network equipment, now lists more than 269,000 F5 devices still online and unpatched. Shadowserver provides an interactive dashboard that breaks down the geographic distribution of exposed F5 gear.

Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer

The Hacker News, October 3, 2025

A threat actor named Detour Dog has been outed as powering campaigns distributing an information stealer known as Strela Stealer. That’s according to findings from Infoblox, which found the threat actor to maintain control of domains hosting the first stage of the stealer, a backdoor called StarFish. Infoblox said it worked with the Shadowserver Foundation to sinkhole two of Detour Dog’s C2 domains (webdmonitor[.]io and aeroarrows[.]io) on July 30 and August 6, 2025.

48+ Cisco Firewalls Hit by Actively Exploited 0-Day Vulnerability

GB Hackers, October 1, 2025

Cisco has confirmed two serious vulnerabilities impacting its Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) firewalls. Tracked as CVE-2025-20333 and CVE-2025-20362, both issues allow attackers to run arbitrary code on unpatched devices. Cisco security advisories warn that exploits for both flaws are already in the wild. Shadowserver’s daily vulnerable HTTP report now includes a live list of ASA/FTD instances susceptible to these 0-day bugs. On September 29, security researchers discovered 48,800+ publicly reachable IPs still running outdated firewall versions. Network teams should subscribe for daily updates and cross-check their public IP ranges against Shadowserver’s list.

Fortra warns of max severity flaw in GoAnywhere MFT’s License Servlet

Bleeping Computer, September 19, 2025

Fortra has released security updates to patch a maximum severity vulnerability in GoAnywhere MFT’s License Servlet that can be exploited in command injection attacks. GoAnywhere MFT is a web-based managed file transfer tool that helps organizations securely transfer files and maintain audit logs of who accesses the shared files. Security analysts at the nonprofit Shadowserver Foundation are monitoring over 470 GoAnywhere MFT instances. However, it is unclear how many of these have already been patched or have their admin console exposed online.

Hackers use new HexStrike-AI tool to rapidly exploit n-day flaws

Bleeping Computer, September 3, 2025

Hackers are increasingly using a new AI-powered offensive security framework called HexStrike-AI in real attacks to exploit newly disclosed n-day flaws. According to ShadowServer Foundation’s data, nearly 8,000 endpoints remain vulnerable to CVE-2025-7775 as of September 2, 2025, down from 28,000 the previous week. This activity is reported by CheckPoint Research, which observed significant chatter on the dark web around HexStrike-AI, associated with the rapid weaponization of newly disclosed Citrix vulnerabilities.

Over 28,000 Citrix instances remain exposed to critical RCE flaw CVE-2025-7775

Security Affairs, August 27, 2025

Experts at the Shadowserver Foundation warn that more than 28,200 Citrix instances are vulnerable to the vulnerability CVE-2025-7775, which is under active exploitation. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the Citrix NetScaler flaw to its Known Exploited Vulnerabilities (KEV) catalog. Shadowserver Foundation researchers reported that most of the vulnerable instances are located in the United States (10,100), followed by Germany (4,300), the United Kingdom (1,400), the Netherlands (1,300), and Switzerland (1,300).