At The Edge Clear: Feb 9-16, 2026

Table of Contents
Loading nav...

‍

At The Edge is GreyNoise's weekly intelligence brief produced exclusively for customers incorporating complete IOCs, infrastructure attribution, detection guidance, and role-based recommendations. At The Edge Clear is a preview highlighting a couple insights and is available to the public.

‍

IoT, Edge, Credentials. All Surging at Once.

Analysis Period: February 9-16, 2026

Three attack surfaces accelerated simultaneously: IoT botnet recruitment surged up to 91%, Fortinet VPN brute-forcing nearly doubled, and credential harvesting more than doubled to 8.28 million sessions. Meanwhile, a coordinated Iranian scanner cluster deployed custom tooling unknown to any public database, and an 84-day C2 operation was uncovered hiding behind cryptocurrency exchange API traffic.

‍

By The Numbers:

  • 91% IOT Default Password Surge
  • 98% Fortinet VPNΒ Brute-Force Increase
  • 8.28M Credential Harvesting Sessions
  • 84 Days Of Cypto C2 Beaconing

‍

Preview Findings:

IoT botnet recruitment accelerating for second straight week

Five IoT-related tag categories surged 53–91% WoW β€” Telnet Protocol, IoT Default Password, and ADB Check all rose in lockstep, consistent with centralized botnet orchestration.

‍

Enterprise edge under multi-vendor credential storm

Fortinet SSL VPN brute-forcing nearly doubled. A brand-new SonicWall scanning campaign emerged from zero to 199,743 sessions. Cisco and Palo Alto pressure steady.

‍

Credential harvesting more than doubled across every category

ENV Crawler surged 112% to 4.29 million sessions. WordPress Enumeration up 273%. AWS credentials, Git repos, and Spring Boot actuators all targeted.

‍

84-day crypto exchange C2 operation uncovered

A Japanese-hosted server impersonated BitMart, KuCoin, and Bitget APIs across four parallel channels β€” sending identical static trading payloads to disguise C2 callbacks as legitimate financial API traffic.

‍

‍

‍

Want the full brief?

GreyNoise customers get detailed briefs with complete IOCs, infrastructure attribution, detection guidance, and role-based recommendations every week.

‍Request a demo to learn more about GreyNoise's data and intelligence.

‍

‍

‍

‍

‍

Read the transcript

Summary

‍

At The Edge is GreyNoise's weekly intelligence brief produced exclusively for customers incorporating complete IOCs, infrastructure attribution, detection guidance, and role-based recommendations. At The Edge Clear is a preview highlighting a couple insights and is available to the public.

‍

IoT, Edge, Credentials. All Surging at Once.

Analysis Period: February 9-16, 2026

Three attack surfaces accelerated simultaneously: IoT botnet recruitment surged up to 91%, Fortinet VPN brute-forcing nearly doubled, and credential harvesting more than doubled to 8.28 million sessions. Meanwhile, a coordinated Iranian scanner cluster deployed custom tooling unknown to any public database, and an 84-day C2 operation was uncovered hiding behind cryptocurrency exchange API traffic.

‍

By The Numbers:

  • 91% IOT Default Password Surge
  • 98% Fortinet VPNΒ Brute-Force Increase
  • 8.28M Credential Harvesting Sessions
  • 84 Days Of Cypto C2 Beaconing

‍

Preview Findings:

IoT botnet recruitment accelerating for second straight week

Five IoT-related tag categories surged 53–91% WoW β€” Telnet Protocol, IoT Default Password, and ADB Check all rose in lockstep, consistent with centralized botnet orchestration.

‍

Enterprise edge under multi-vendor credential storm

Fortinet SSL VPN brute-forcing nearly doubled. A brand-new SonicWall scanning campaign emerged from zero to 199,743 sessions. Cisco and Palo Alto pressure steady.

‍

Credential harvesting more than doubled across every category

ENV Crawler surged 112% to 4.29 million sessions. WordPress Enumeration up 273%. AWS credentials, Git repos, and Spring Boot actuators all targeted.

‍

84-day crypto exchange C2 operation uncovered

A Japanese-hosted server impersonated BitMart, KuCoin, and Bitget APIs across four parallel channels β€” sending identical static trading payloads to disguise C2 callbacks as legitimate financial API traffic.

‍

‍

‍

Want the full brief?

GreyNoise customers get detailed briefs with complete IOCs, infrastructure attribution, detection guidance, and role-based recommendations every week.

‍Request a demo to learn more about GreyNoise's data and intelligence.

‍

‍

‍

‍

‍