Operation successfully coordinated by
@europol.europa.eu via EC3 Cyber Intelligence Extension Programme (CIEP). Civil legal action by
@microsoft.com DCU
Millions of phishing emails, 96K victims globally
Key domains seized/sinkholed/suspended, thousands of criminal users potentially impacted
06.03.2026 09:50
π 0
π 0
π¬ 0
π 0
Great to support our international LE and private sector partners in Tycoon 2FA phishing-as-a-service #cybercrime disruption:
shadowserver.org/news/tycoon-...
New nCSIRT-only Tycoon 2FA Domains Special Report run 2026-03-04 (historical C2/panel/infra domains)
www.shadowserver.org/what-we-do/n...
06.03.2026 09:50
π 3
π 1
π¬ 1
π 0
Another Iran Internet blackout, this time due to the war, visualized on our Public Dashboard - drop to near zero on 2026-03-01:
dashboard.shadowserver.org/statistics/c...
03.03.2026 20:32
π 5
π 2
π¬ 0
π 0
World map Β·
General statistics Β·
The Shadowserver Foundation
If you receive an alert from us, please patch.
World Map view of all n8n vulnerable instances we track: dashboard.shadowserver.org/statistics/c...
#CyberCivilDefense
03.03.2026 12:51
π 2
π 0
π¬ 0
π 0
CRITICAL: Vulnerable HTTP Report | The Shadowserver Foundation
DESCRIPTION LAST UPDATED: 2026-03-02 DEFAULT SEVERITY LEVEL: CRITICAL This report identifies hosts that have the Hypertext Transfer Protocol (HTTP) service running on some port that may have a vulnera...
IP data on vulnerable instances is tagged 'n8n' & with a cve tag (like cve-2026-27495) in our Vulnerable HTTP reporting www.shadowserver.org/what-we-do/n...
Latest n8n critical RCE vulns (all covered with above tag):
github.com/n8n-io/n8n/s...
github.com/n8n-io/n8n/s...
github.com/n8n-io/n8n/s...
03.03.2026 12:51
π 2
π 0
π¬ 1
π 0
We are continuing to expand our n8n RCE vulnerability scanning - most recently adding CVE-2026-27495 (CVSS 9.4) tagging as well. You can track our various n8n scan results here for the most well known critical vulns: dashboard.shadowserver.org/statistics/c...
Top affected: US, Germany & France.
03.03.2026 12:51
π 6
π 1
π¬ 1
π 0
NVD - cve-2025-14500
If you receive an alert from us, please update!
NVD entry: nvd.nist.gov/vuln/detail/...
Background: www.zerodayinitiative.com/advisories/Z...
#CyberCivilDefense
02.03.2026 19:43
π 0
π 0
π¬ 0
π 0
We are scanning & reporting IceWarp CVE-2025-14500 (CVSS 9.8, pre-auth command injection RCE) instances. 1278 IPs seen 2026-03-01 (version based).
Patch: support.icewarp.com/hc/en-us/com...
IP data: www.shadowserver.org/what-we-do/n...
World Map view: dashboard.shadowserver.org/statistics/c...
02.03.2026 19:43
π 4
π 2
π¬ 1
π 0
#CyberCivilDefense
27.02.2026 14:51
π 0
π 0
π¬ 0
π 0
blog.talosintelligence.com/uat-8616-sd-...
www.cyber.gov.au/sites/defaul...
sec.cloudapps.cisco.com/security/cen...
27.02.2026 14:51
π 0
π 0
π¬ 1
π 0
INFO: Accessible SSH Report | The Shadowserver Foundation
This report identifies hosts that have the Secure Shell (SSH) service running and accessible on the Internet.
We are also sharing SSH port 830 data in our Accessible SSH reporting - this includes potential NETCONF instances www.shadowserver.org/what-we-do/n...
Around 90K SSH instances seen exposed, but this includes generic SSH population (NETCONF uses SSH).
Background: www.ncsc.gov.uk/news/exploit...
27.02.2026 14:51
π 0
π 0
π¬ 1
π 0
INFO: Device Identification Report | The Shadowserver Foundation
DESCRIPTION LAST UPDATED: 2023-12-06 DEFAULT SEVERITY LEVEL: INFO This report contains a list of devices we have identified in our daily Internet scans. The assessment is made based on all our Interne...
Cisco SD-WAN incidents: we are sharing data on identified Cisco SD-WAN IPs Device ID reporting - www.shadowserver.org/what-we-do/n...
~5.5K Cisco SD-WAN IPs (control plane) (dashboard.shadowserver.org/statistics/i...) & over 270 management interfaces (dashboard.shadowserver.org/statistics/i...)
27.02.2026 14:51
π 12
π 2
π¬ 1
π 0
CRITICAL: Compromised Website Report | The Shadowserver Foundation
This report is a list of all the websites we (or our collaborative partners) have been able to identify and verify to be compromised.
IP data in our Compromised Website report, tagged 'freepbx-compromised' - www.shadowserver.org/what-we-do/n...
Compromised FreePBX tracker: dashboard.shadowserver.org/statistics/c...
Compromises are likely via CVE-2025-64328
Additional background from Fortinet: www.fortinet.com/blog/threat-...
24.02.2026 19:19
π 2
π 0
π¬ 0
π 0
Thanks to collaboration with the Canadian Centre for Cyber Security we can share more comprehensive information on FreePBX instances running webshells, with still over 900 IPs seen compromised.
Dashboard Victim overview (Tree map) dashboard.shadowserver.org/statistics/c...
24.02.2026 19:19
π 8
π 3
π¬ 2
π 1
Massive increase in sources attempting Ivanti EPMM CVE-2026-1281 exploitation, with over 28.3K source IPs seen on 2026-02-09. IP data on attackers shared in our www.shadowserver.org/what-we-do/n... (with vulnerability_id set to CVE-2026-1281). 20.4K IPs seen from US networks.
10.02.2026 18:36
π 7
π 5
π¬ 1
π 1
#CyberCivilDefense
08.02.2026 19:23
π 0
π 0
π¬ 0
π 0
Running End-of-Life devices or apps is a major security risk. @CISACyber has recently released a Directive on the topic: www.cisa.gov/news-events/...
It's worth mentioning we share many End-of-Life devices/apps in our daily reporting, tagged 'eol'.
See: dashboard.shadowserver.org/statistics/c...
08.02.2026 19:23
π 6
π 3
π¬ 1
π 0
Ivanti Innovators Hub
If you receive an alert from us, please review the security advisory and guidance from Ivanti at hub.ivanti.com/s/article/Se... including the ExploitationΒ Detection RPM Package co-developed by Ivanti & NCSC.nl
07.02.2026 16:22
π 2
π 0
π¬ 0
π 0
We have started to report webshells (or other artifacts) found on Ivanti EPMM devices, likely compromised via CVE-2026-1281. 56 IPs found on 2026-02-06
Data in shadowserver.org/what-we-do/n...
Tree Map view: dashboard.shadowserver.org/statistics/c...
Thank you to the KSA NCA for the heads up!
07.02.2026 16:22
π 27
π 8
π¬ 2
π 1
These reports help people defend the country against cyber attacks and also helps people fight scammer networks
#CyberCivilDefense #take9
05.02.2026 11:53
π 14
π 4
π¬ 0
π 0
SolarWinds Trust Center Security Advisories | CVE-2025-40551
See advisory and patch info from SolarWinds: www.solarwinds.com/trust-center...
If you receive an alert from us, make sure to review for compromise.
NVD entry: nvd.nist.gov/vuln/detail/...
Thank you to Validin for collaboration on the scan.
05.02.2026 10:54
π 0
π 0
π¬ 0
π 0
For the last few days, we have been sharing SolarWinds Help Desk CVE-2025-40551 RCE vulnerable IPs (version check based) - ~ 170 seen. This vuln is now on CISAKEV. Data in Vulnerable HTTP reports: www.shadowserver.org/what-we-do/n...
Dashboard Tree Map: dashboard.shadowserver.org/statistics/c...
05.02.2026 10:54
π 4
π 1
π¬ 1
π 1
SolarWinds Trust Center Security Advisories | CVE-2025-40551
See advisory and patch info from SolarWinds: www.solarwinds.com/trust-center...
If you receive an alert from us, make sure to review for compromise.
NVD entry: nvd.nist.gov/vuln/detail/...
Thank you to Validin for collaboration on the scan.
05.02.2026 10:51
π 0
π 0
π¬ 0
π 0
Tree map by country Β·
IoT device statistics Β·
The Shadowserver Foundation
Dashboard Tree Map view: dashboard.shadowserver.org/statistics/i...
OpenClaw Dashboard exposure tracker (for past data, select vendor Moltbot on the Dashabord):
dashboard.shadowserver.org/statistics/i...
03.02.2026 17:35
π 1
π 0
π¬ 0
π 0
Hacking Moltbook: AI Social Network Reveals 1.5M API Keys | Wiz Blog
Learn how a misconfigured Supabase database at Moltbook exposed 1.5M API keys, private messages, and user emails, enabling full AI agent takeover.
Most instances are across various cloud providers.
Our reporting is for awareness purposes.
OpenClaw has had various security risks highlighted recently (such as for example www.wiz.io/blog/exposed... & CVE-2026-25253 (1-Click RCE via Authentication Token Exfiltration)
03.02.2026 17:35
π 2
π 0
π¬ 1
π 0
We are scanning & reporting out exposed OpenClaw/Clawdbot/Moltbot instances, with ~25K seen 2026-02-02. We report these out in our Device Identification reporting, with vendor set to OpenClaw for all cases: www.shadowserver.org/what-we-do/n...
World Map: dashboard.shadowserver.org/statistics/i...
03.02.2026 17:35
π 6
π 3
π¬ 1
π 0
CISA Adds One Known Exploited Vulnerability to Catalog | CISA
CVE-2026-1281 has been added to CISA Known Exploited Vulnerability catalog: www.cisa.gov/news-events/...
Additional background from watchTowr: labs.watchtowr.com/someone-know...
31.01.2026 15:32
π 0
π 0
π¬ 0
π 0
INFO: Device Identification Report | The Shadowserver Foundation
DESCRIPTION LAST UPDATED: 2023-12-06 DEFAULT SEVERITY LEVEL: INFO This report contains a list of devices we have identified in our daily Internet scans. The assessment is made based on all our Interne...
IP data on exposed instances shared in Device ID (device_vendor Ivanti, device_model EPMM ): www.shadowserver.org/what-we-do/n...
Dashboard World Map of exposed instances: dashboard.shadowserver.org/statistics/i...
Tree Map breakdown of exposed instances: dashboard.shadowserver.org/statistics/i...
31.01.2026 15:32
π 0
π 0
π¬ 1
π 0