Attackers launch dual campaign on GlobalProtect portals and SonicWall APIs
Overview
A hacking campaign has been targeting GlobalProtect logins and scanning SonicWall APIs since December 2, 2025. The attack is significant due to its scale, involving over 7,000 IP addresses linked to a German hosting provider, indicating a coordinated effort that poses a serious threat to the security of affected systems.
Key Takeaways
- Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
- Affected Systems: Palo Alto GlobalProtect portals, SonicWall SonicOS API endpoints
- Action Required: Organizations should implement strong authentication measures, monitor access logs for unusual login attempts, and ensure that their SonicWall APIs are properly secured and updated.
- Timeline: Ongoing since December 2, 2025
Original Article Summary
A hacking campaign is targeting GlobalProtect logins and scannig SonicWall APIs since December 2, 2025. A campaign began on December 2 targeting Palo Alto GlobalProtect portals with login attempts and scanning SonicWall SonicOS API endpoints. The activity came from over 7,000 IPs tied to German hosting provider 3xK GmbH, which operates its own BGP network […]
Impact
Palo Alto GlobalProtect portals, SonicWall SonicOS API endpoints
Exploitation Status
This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.
Timeline
Ongoing since December 2, 2025
Remediation
Organizations should implement strong authentication measures, monitor access logs for unusual login attempts, and ensure that their SonicWall APIs are properly secured and updated.
Additional Information
This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.
Related Topics: This incident relates to Palo Alto.