
Sign up to save your podcasts
Or


Here is the breakdown of the identified attackers, their IP addresses, and their specific attack vectors:1. Microsoft Azure (ASN 8075) This infrastructure is the primary source of the attacks, acting as a distributed bot swarm utilizing compromised cloud instances.
2. FranTech Solutions / PONYNET (ASN 53667)3. Tencent Cloud (ASN 132203)4. Amazon AWS (ASN 14618, 16509)5. Google Cloud Platform (ASN 396982)6. DMZHOST (ASN 48090)7. France (Compromised Hosting Infrastructure)Conclusion: The sources emphasize that these attackers are largely commodity bots, script kiddies, and AI crawlers leveraging massive corporate cloud infrastructure (like Azure, AWS, and GCP) to mask their origins. They execute scattered, automated attacks utilizing off-the-shelf exploitation tools rather than highly sophisticated, human-operated persistent threats.
Please Like, Comment, Share, Share, Share and Subscribe.
By Marcelo Mezquia, TheVoidIntent LLCHere is the breakdown of the identified attackers, their IP addresses, and their specific attack vectors:1. Microsoft Azure (ASN 8075) This infrastructure is the primary source of the attacks, acting as a distributed bot swarm utilizing compromised cloud instances.
2. FranTech Solutions / PONYNET (ASN 53667)3. Tencent Cloud (ASN 132203)4. Amazon AWS (ASN 14618, 16509)5. Google Cloud Platform (ASN 396982)6. DMZHOST (ASN 48090)7. France (Compromised Hosting Infrastructure)Conclusion: The sources emphasize that these attackers are largely commodity bots, script kiddies, and AI crawlers leveraging massive corporate cloud infrastructure (like Azure, AWS, and GCP) to mask their origins. They execute scattered, automated attacks utilizing off-the-shelf exploitation tools rather than highly sophisticated, human-operated persistent threats.
Please Like, Comment, Share, Share, Share and Subscribe.