TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

GreyNoise

GreyNoise 2025 Mass Internet Exploitation Report: Attackers Are Moving Faster Than Ever — Are You Ready?

2025-02-27 · Read original ↗

ATT&CK techniques detected

5 predictions
T1190Exploit Public-Facing Application
90%
"rethink patching priorities. greynoise tracked the most frequently observed vulnerability exploitation attempts across the internet in 2024. some of the most targeted vulnerabilities included : - cve - 2018 - 10561 ( gpon router worm ) – 96, 042 unique ips - cve - 2014 - 8361 ( r…"
T1588.006Vulnerabilities
78%
"massive botnets used in cyberattacks. - legacy vulnerabilities remain among the most widely exploited, with attackers continuing to target publicly known flaws, sometimes dating back to the 1990s. - greynoise observed multiple cves showing signs of exploitation before being added…"
T1190Exploit Public-Facing Application
42%
"greynoise 2025 mass internet exploitation report : attackers are moving faster than ever — are you ready? mass internet exploitation in 2024 : a rapidly escalating threat in 2024, attackers didn ’ t just exploit vulnerabilities — they automated them at scale, turning the internet…"
T1587.004Exploits
36%
"massive botnets used in cyberattacks. - legacy vulnerabilities remain among the most widely exploited, with attackers continuing to target publicly known flaws, sometimes dating back to the 1990s. - greynoise observed multiple cves showing signs of exploitation before being added…"
T1588.006Vulnerabilities
36%
"greynoise 2025 mass internet exploitation report : attackers are moving faster than ever — are you ready? mass internet exploitation in 2024 : a rapidly escalating threat in 2024, attackers didn ’ t just exploit vulnerabilities — they automated them at scale, turning the internet…"

Summary

Attackers are automating exploitation at scale, targeting both new and old vulnerabilities — some before appearing in KEV. Our latest report breaks down which CVEs were exploited most in 2024, how ransomware groups are leveraging mass exploitation, and why real-time intelligence is critical.