Malicious Probes or Routine Scans? Why CISOs Can’t Afford to Ignore Subtle Reconnaissance

Malicious Probes or Routine Scans? Why CISOs Can’t Afford to Ignore Subtle Reconnaissance

Every second, websites around the globe are under attack—sometimes by hackers seeking vulnerabilities, and sometimes by well-intentioned security researchers. But how can you tell the difference?

This article is based on 10 months logged suspicious HTTP requests to https://www.cybernode.au , a React.js static website hosted in AWS Sydney region. In this article, we’ll dive into the traffic patterns observed on Cyber Node’s website, analyze the origins and nature of the requests, and explore how we can interpret these signals to better protect the organization. Legitimate site traffic has been filtered out to obtain those results.

Malicious requests - 10 months period


Most Frequent Malicious Paths

Upon reviewing the logs, specific paths on the website were being targeted far more frequently than others. The top requested paths as well as what their presence or absence can mean for an attacker:

Most common malicious requests by URL


At first glance, the requests to /wp-login.php raise red flags. This is the default login page for WordPress websites, yet Cyber Node’s website does not run WordPress. The high frequency of these requests suggests automated bots targeting the website in the hope of finding an unsecured WordPress installation. These brute-force attempts are usually done with malicious intent, seeking to exploit weak or default credentials.

Similarly, requests for /.git/config and /.env files indicate probing for critical configuration data that could expose sensitive information about the website’s internal structure, such as Git repositories or environment variables containing API keys and credentials. These types of requests highlight a sophisticated level of probing, where attackers are not just looking for low-hanging fruit but also for opportunities to exploit misconfigurations.


Who’s Behind the Scans?

When examining the geographic distribution of malicious requests, the results offer a surprising insight. Rather than seeing a high volume of activity from countries typically associated with cyber-attacks, such as Russia or North Korea, the bulk of suspicious traffic comes from a wide range of countries, many of which are not known for hosting illegitimate cyber-security operations. The breakdown of malicious requests reveals:

Malicious requests per Country - 10 months period


The presence of USA, Germany and Switzerland at the top of the list is unexpected. Several cyber-security firms in these countries regularly scan websites as part of routine vulnerability assessments. However, this activity can sometimes blur the lines between proactive research and potential exploitation, as legitimate tools are also available to malicious actors. These requests reinforce the notion that malicious probes can come from countries typically regarded as cyber-security hubs.

China however, according to the news media, is more typically associated with nation-state actors and sophisticated cyber operations. Given the broad reach of Chinese scanning and hacking groups, the volume of requests is not surprising.

Interestingly, countries like the Netherlands and Singapore host numerous data centers and cloud services. These services are frequently exploited by attackers using compromised infrastructure to launch their attacks. This suggests that many of the requests might be originating from compromised servers or cloud platforms, rather than from individual malicious actors operating within those countries.

Meanwhile, Russia, a country frequently linked to high-profile cyber-attacks, generated only 4 requests, similar to countries like Singapore and Poland.


The geographic diversity of these requests demonstrates that malicious activity is not confined to a handful of well-known cyber-attack origins. Instead, attackers may be distributing their efforts across a global network of servers and platforms, making it increasingly difficult to pinpoint where the real threats are coming from.

This trend challenges traditional notions of cyber-security, where blocking traffic from specific high-risk regions like Russia or China was once considered effective. Now, attacks can just as easily originate from countries with robust cyber-security infrastructures, as malicious actors exploit legitimate tools and services for their purposes.



Repeat Offenders

A closer look at the IP addresses responsible for multiple malicious requests targeting Cyber Node’s website in the last 10 months reveals a clear pattern of repeat offenders. These IPs, often linked to well-known cloud providers and hosting services, suggest that attackers are leveraging compromised servers or cloud infrastructure to conduct their activities. Here are some of the most notable offenders:

The top 4 IPs, all from Germany, are hosted on DigitalOcean Inc, a well-known cloud provider that caters to developers, businesses, and unfortunately, malicious actors. This activity strongly suggests the use of compromised virtual machines or accounts for conducting coordinated probing attempts. This high volume of requests indicates that DigitalOcean’s infrastructure is a prime target for attackers seeking to anonymize their scanning efforts by using widely available and reputable cloud services.

Another interesting offender, 179.43.149.114, originates from Switzerland and is tied to Private Layer Inc, a hosting provider known for prioritizing user privacy and anonymity. This platform’s emphasis on privacy, while appealing to legitimate users, also makes it an attractive option for cyber-criminals seeking to hide their tracks. As above, these requests suggest that Private Layer’s infrastructure is either being abused by attackers or that a compromised server is being used to conduct these probes.

Other offenders, including DMZHOST in the Netherlands, Zenlayer Inc in the United States, and Scaleway in Poland, made between 4 and 6 requests. These smaller-scale probes may represent early-stage reconnaissance, with the intent to identify weaknesses before launching more sophisticated or larger-scale attacks.

This analysis highlights how malicious actors are increasingly using global cloud infrastructure and privacy-focused hosting providers to anonymise their operations and carry out attacks with relative impunity. The challenge for defenders lies in balancing security with the recognition that not all scanning activity from these providers is inherently malicious.



Don't wait for a breach to happen—take proactive steps today. Contact us at [email protected] or visit https://cybernode.au to learn how we can help you secure your business.



A Fine Line: Security Research vs. Malicious Intent

There is an important distinction between proactive security research and malicious probing. Security researchers often scan websites as part of a responsible disclosure process to help site owners identify and fix vulnerabilities before they can be exploited. On the other hand, malicious actors use similar techniques to exploit any weaknesses they find, often leading to compromised websites or stolen data.

In Cyber Node’s case, many of the requests for /wp-login.php or .git/config can clearly be classified as malicious, as they specifically target common vulnerabilities in Content Management Systems (CMS) or misconfigured repositories. These types of attacks are often launched by automated bots attempting to exploit weak or default settings.



Real-World Cases

To better understand how seemingly harmless probing can evolve into major cyber incidents, let's explore a few real-world examples of attacks that began with scanning or reconnaissance activity similar to what Cyber Node experienced.


Log4j Vulnerability | 2021

The Log4Shell vulnerability revealed how widely-used logging library, Log4j, could be exploited by attackers through remote code execution. As soon as the vulnerability was announced, security researchers and attackers alike began scanning the internet for systems using vulnerable versions of Log4j with frequent requests for /.git/config and /server-status. This led to a wave of automated exploits across multiple industries, as attackers sought to hijack vulnerable systems.

Source - "Mass scanning activity continues - The vast majority of traffic observed by Microsoft remains mass scanners by both attackers and security researchers." - Microsoft - # Guidance for preventing, detecting, and hunting for exploitation of the Log4j 2 vulnerability


Equifax Breach | 2017

The Equifax breach exposed the personal information of over 147 million people. Attackers exploited a known Apache Struts vulnerability (CVE-2017-5638), which allowed them to execute remote code on Equifax’s servers. This breach occurred because Equifax had failed to patch the vulnerability, despite it being publicly disclosed and actively exploited by attackers. The vulnerability was announced in March 2017, and hackers began scanning the internet for /login.action, eventually gaining access to Equifax’s systems in May 2017.

Source - Command Execution Attacks on Apache Struts server CVE-2017–5638



Conclusion - Striking the Balance Between Awareness and Action

The line between security research and malicious activity is razor-thin. Without proactive monitoring and defense strategies, organizations risk exposing their digital assets to exploitation. Cyber Node’s traffic analysis is a warning: attacks can come from unexpected sources, and ignoring early signals could result in a major breach.

To stay protected:

  • Be proactive: Apply patches promptly and ensure secure server configurations to block attacks that begin with simple scanning.
  • Monitor scanning activity: Treat probing, like that seen with Log4j and Apache Struts, as a warning signal.
  • Learn from past breaches: Major incidents like Equifax and SolarWinds began with reconnaissance, underscoring the need to understand this phase.
  • Leverage threat intelligence: Keep up with intelligence reports to identify and respond to emerging attack patterns.
  • Enhance defenses: Implement rate-limiting, block known malicious IPs, and use web application firewalls (WAF) to filter common exploit attempts.
  • Audit server configurations: Ensure sensitive files like .git/config and .env are not publicly accessible.

How confident are you that your website is not being scanned right now? Contact us at [email protected] or visit https://cybernode.au to learn how we can help you secure your business.

要查看或添加评论,请登录

社区洞察

其他会员也浏览了