{"id":295496,"date":"2025-02-13T04:38:00","date_gmt":"2025-02-13T12:38:00","guid":{"rendered":"https:\/\/sftarticles.wpenginepowered.com\/es\/?p=348292"},"modified":"2025-07-01T15:24:24","modified_gmt":"2025-07-01T22:24:24","slug":"a-massive-brute-force-attack-uses-2-8-million-ip-addresses-to-take-down-vpns","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/en\/a-massive-brute-force-attack-uses-2-8-million-ip-addresses-to-take-down-vpns\/","title":{"rendered":"A massive brute force attack uses 2.8 million IP addresses to take down VPNs"},"content":{"rendered":"\n<p>Nearly 2.8 million IP addresses are being used in a massive brute force attack targeting network devices, such as those offered by Palo Alto Networks, Ivanti, and SonicWall.<\/p>\n\n\n<div class=\"sc-card-program\">\r\n  <div class=\"sc-card-program__body\">\r\n    <div class=\"sc-card-program__row clearfix\">\r\n      <div class=\"sc-card-program__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-program__img\" alt=\"ExpressVPN\" src=\"https:\/\/images.sftcdn.net\/images\/t_app-icon-s\/p\/9dce379d-9f49-4660-be29-905824aa432b\/572870025\/expressvpn-download.png\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-title\">\r\n        <span class=\"sc-card-program__title\">ExpressVPN<\/span>\r\n        <a class=\"sc-card-program__button sc-card-program-internal\" href=\"https:\/\/go.expressvpn.com\/c\/310668\/1462856\/16063?subId1=softonicarticles\" target=\"_self\" rel=\"noopener noreferrer\">DOWNLOAD<\/a>\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-rating\">\r\n        <svg class=\"rating-score__content\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\" x=\"0\" y=\"0\" viewbox=\"0 0 50 50\" enable-background=\"new 0 0 50 50\" xml:space=\"preserve\"><path class=\"rating-score__background rating-score--good\" fill=\"none\" stroke-width=\"6\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><path class=\"rating-score__value rating-score__value--0\" fill=\"none\" stroke-width=\"6\" stroke-dashoffset=\"0\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><text class=\"rating-score__number\" content=\"\" text-anchor=\"middle\" transform=\"matrix(1 0 0 1 25 31.0837)\" data-auto=\"app-user-score\"><\/text><\/svg>\r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <span class=\"sc-card-program__description\"><\/span>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <img decoding=\"async\" class=\"sc-card-program__bigpic\" src=\"\" onerror=\"this.style.display='none'\">\r\n    <\/div>\r\n    <a class=\"sc-card-program__link track-link sc-card-program-internal\" href=\"https:\/\/go.expressvpn.com\/c\/310668\/1462856\/16063?subId1=softonicarticles\" target=\"_self\" rel=\"noopener noreferrer\"><\/a>\r\n  <\/div>\r\n<\/div>\n\n\n\n<p>This type of attack, which seeks to access accounts by repeating combinations of username and password, has seen a notable increase since its emergence in early January.<\/p>\n\n\n\n<p><strong>According to reports from the Shadowserver Foundation, the implicated IP addresses come from various parts of the world<\/strong>, with more than 1.1 million of them originating in Brazil, followed by Turkey, Russia, Argentina, Morocco, and Mexico.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">Massive brute force attack uses 2.8 million IPs to target VPN devices &#8211; <a href=\"https:\/\/twitter.com\/billtoulas?ref_src=twsrc%5Etfw\">@billtoulas<\/a><a href=\"https:\/\/t.co\/zQyInyh97m\">https:\/\/t.co\/zQyInyh97m<\/a><a href=\"https:\/\/t.co\/zQyInyh97m\">https:\/\/t.co\/zQyInyh97m<\/a><\/p>&mdash; BleepingComputer (@BleepinComputer) <a href=\"https:\/\/twitter.com\/BleepinComputer\/status\/1888245456200749552?ref_src=twsrc%5Etfw\">February 8, 2025<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">How attacks against VPNs are being carried out<\/h2>\n\n\n\n<p><strong>The attackers appear to be using botnets and residential proxy networks to carry out these attacks, complicating their tracking by authorities. <\/strong>A botnet is a network of computers infected with malware, while residential proxies allow criminals to access the internet using IP addresses that appear legitimate. This helps them hide their identity and maintain their anonymity, which poses a considerable challenge for cybersecurity.<\/p>\n\n\n\n<p>Despite the scale of the attack, to date, none of the major VPN services have been compromised. However, the importance of <strong>implementing strong passwords and enabling two-factor authentication (2FA) to protect devices and networks<\/strong> is emphasized, especially for small and medium-sized enterprises that are often more vulnerable to these attacks.<\/p>\n\n\n\n<p>A strong business VPN not only encrypts internet traffic but also protects data and allows secure access to servers and networks.<\/p>\n\n\n<div class=\"sc-card-program\">\r\n  <div class=\"sc-card-program__body\">\r\n    <div class=\"sc-card-program__row clearfix\">\r\n      <div class=\"sc-card-program__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-program__img\" alt=\"ExpressVPN\" src=\"https:\/\/images.sftcdn.net\/images\/t_app-icon-s\/p\/9dce379d-9f49-4660-be29-905824aa432b\/572870025\/expressvpn-download.png\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-title\">\r\n        <span class=\"sc-card-program__title\">ExpressVPN<\/span>\r\n        <a class=\"sc-card-program__button sc-card-program-internal\" href=\"https:\/\/go.expressvpn.com\/c\/310668\/1462856\/16063?subId1=softonicarticles\" target=\"_self\" rel=\"noopener noreferrer\">DOWNLOAD<\/a>\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-rating\">\r\n        <svg class=\"rating-score__content\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\" x=\"0\" y=\"0\" viewbox=\"0 0 50 50\" enable-background=\"new 0 0 50 50\" xml:space=\"preserve\"><path class=\"rating-score__background rating-score--good\" fill=\"none\" stroke-width=\"6\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><path class=\"rating-score__value rating-score__value--0\" fill=\"none\" stroke-width=\"6\" stroke-dashoffset=\"0\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><text class=\"rating-score__number\" content=\"\" text-anchor=\"middle\" transform=\"matrix(1 0 0 1 25 31.0837)\" data-auto=\"app-user-score\"><\/text><\/svg>\r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <span class=\"sc-card-program__description\"><\/span>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <img decoding=\"async\" class=\"sc-card-program__bigpic\" src=\"\" onerror=\"this.style.display='none'\">\r\n    <\/div>\r\n    <a class=\"sc-card-program__link track-link sc-card-program-internal\" href=\"https:\/\/go.expressvpn.com\/c\/310668\/1462856\/16063?subId1=softonicarticles\" target=\"_self\" rel=\"noopener noreferrer\"><\/a>\r\n  <\/div>\r\n<\/div>\n\n\n\n<p>All users, whether individuals or businesses, are advised to adopt good data privacy practices and  consider using a VPN, which will provide an additional layer of security. Although there is a possibility that this type of attack will continue to increase, implementing appropriate measures helps mitigate the risk.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Almost 2.8 million IP addresses are being used in a massive brute force attack targeting network devices, such as those offered by Palo Alto Networks, Ivanti, and SonicWall. This type of attack, which seeks to access accounts by repeatedly trying username and password combinations, has seen a notable increase since its emergence in early January. According to reports from the Shadowserver Foundation, the implicated IP addresses come from various parts of the world, with more than 1.1 million of them originating in Brazil, followed by Turkey, Russia, Argentina, Morocco, and Mexico. How they are carrying out [&hellip;]<\/p>\n","protected":false},"author":9317,"featured_media":295505,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":1},"categories":[1015],"tags":[5605,1852],"usertag":[],"vertical":[],"content-category":[],"class_list":["post-295496","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-ciberseguridad","tag-vpn"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/295496","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/users\/9317"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/comments?post=295496"}],"version-history":[{"count":1,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/295496\/revisions"}],"predecessor-version":[{"id":309705,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/295496\/revisions\/309705"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media\/295505"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media?parent=295496"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/categories?post=295496"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/tags?post=295496"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/usertag?post=295496"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/vertical?post=295496"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/content-category?post=295496"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}