At The Edge Clear: March 16-23, 2026

Table of Contents
Loading nav...

At The Edge is GreyNoise's weekly intelligence brief produced exclusively for customers incorporating complete IOCs, infrastructure attribution, detection guidance, and role-based recommendations. At The Edge Clear is a preview highlighting a couple insights and is available to the public.

Criminal Scanning Infrastructure Regenerates on Demand.

Analysis Period: March 16-23, 2026

The MEVSPACE RDP operator returned from a 99.8% collapse, reconstituting scanning capacity on demand. Two new coordinated campaigns emerged simultaneously — IoT botnet recruitment and evasion-optimized scanning — revealing an industrialized attack supply chain.

By The Numbers:

  • 200.9M Total Sessions Observed
  • 21+ CVEs Weaponized in IOT Worm
  • 5,854 Max Unique JA3 Fingerprints Per Node
  • 9 Weeks Consecutive VPN Crednetial Pressue

Preview Findings:

MEVSPACE RDP Operator Returns After Collapse

A single IP generated 7,975,241 sessions — the highest of any source — across 10,000+ ports before going dark. Tracked since January 2026, the operator shows a repeating surge-withdraw-reconstitute cycle, reinforcing that well-resourced operators can reconstitute capacity within days. Deploy RDP Bruteforce Attempt blocklists.

VPSVAULT.HOST IoT Botnet Recruitment

Two IPs weaponized 21+ CVEs against routers, cameras, and embedded devices from 12+ manufacturers — 2,042,092 sessions linked to the RondoDox threat operator. TP-Link CVE-2023-1389 carries 13 botnet associations. Track IoT Default Password Attempt tags.

Omegatech TLS Fingerprint Randomization

Five nodes generated up to 5,854 unique JA3 fingerprints each to evade detection while conducting path traversal reconnaissance across 4,106,542 sessions. Organizations relying on fingerprint-based correlation should add behavioral heuristics. Review Path Traversal Attempt detections.

Sophos Firewall Exploitation — Fifth Consecutive Week

CVE-2022-1040 exploitation reached 638,654 sessions with an additional 402,098 User Portal scanning sessions — over 1 million combined. After four weeks of acceleration, activity is stabilizing at an elevated baseline. Patch immediately and restrict management interfaces. Deploy Sophos CVE-2022- 1040 RCE blocklists.

Want the full brief?

GreyNoise customers get detailed briefs with complete IOCs, infrastructure attribution, detection guidance, and role-based recommendations every week.

Request a demo to learn more about GreyNoise's data and intelligence.

Read the transcript

At The Edge is GreyNoise's weekly intelligence brief produced exclusively for customers incorporating complete IOCs, infrastructure attribution, detection guidance, and role-based recommendations. At The Edge Clear is a preview highlighting a couple insights and is available to the public.

Criminal Scanning Infrastructure Regenerates on Demand.

Analysis Period: March 16-23, 2026

The MEVSPACE RDP operator returned from a 99.8% collapse, reconstituting scanning capacity on demand. Two new coordinated campaigns emerged simultaneously — IoT botnet recruitment and evasion-optimized scanning — revealing an industrialized attack supply chain.

By The Numbers:

  • 200.9M Total Sessions Observed
  • 21+ CVEs Weaponized in IOT Worm
  • 5,854 Max Unique JA3 Fingerprints Per Node
  • 9 Weeks Consecutive VPN Crednetial Pressue

Preview Findings:

MEVSPACE RDP Operator Returns After Collapse

A single IP generated 7,975,241 sessions — the highest of any source — across 10,000+ ports before going dark. Tracked since January 2026, the operator shows a repeating surge-withdraw-reconstitute cycle, reinforcing that well-resourced operators can reconstitute capacity within days. Deploy RDP Bruteforce Attempt blocklists.

VPSVAULT.HOST IoT Botnet Recruitment

Two IPs weaponized 21+ CVEs against routers, cameras, and embedded devices from 12+ manufacturers — 2,042,092 sessions linked to the RondoDox threat operator. TP-Link CVE-2023-1389 carries 13 botnet associations. Track IoT Default Password Attempt tags.

Omegatech TLS Fingerprint Randomization

Five nodes generated up to 5,854 unique JA3 fingerprints each to evade detection while conducting path traversal reconnaissance across 4,106,542 sessions. Organizations relying on fingerprint-based correlation should add behavioral heuristics. Review Path Traversal Attempt detections.

Sophos Firewall Exploitation — Fifth Consecutive Week

CVE-2022-1040 exploitation reached 638,654 sessions with an additional 402,098 User Portal scanning sessions — over 1 million combined. After four weeks of acceleration, activity is stabilizing at an elevated baseline. Patch immediately and restrict management interfaces. Deploy Sophos CVE-2022- 1040 RCE blocklists.

Want the full brief?

GreyNoise customers get detailed briefs with complete IOCs, infrastructure attribution, detection guidance, and role-based recommendations every week.

Request a demo to learn more about GreyNoise's data and intelligence.