At The Edge Clear: March 23-30, 2026

Table of Contents
Loading nav...

‍

At The Edge is GreyNoise's weekly intelligence brief produced exclusively for customers incorporating complete IOCs, infrastructure attribution, detection guidance, and role-based recommendations. At The Edge Clear is a preview highlighting a couple insights and is available to the public.

‍

IoT Exploitation Arsenal Expands. Perimeter Defenses Mapped.

Analysis Period: March 23-30, 2026

A 22-CVE botnet recruitment platform, a coordinated scanner fleet mapping enterprise perimeter defenses, and vulnerability chaining in the React/Next.js campaign mark a week defined by specialization across the exploitation supply chain.

‍

By The Numbers:

  • 188M Total Sessions Observed
  • 22 CVEs in IOT Exploit Arsenal
  • 4X Mid-Week Session Surge
  • 14 Weeks of React Campaign

‍

Preview Findings:

VPSVAULT IoT Platform Deploys 22-CVE Arsenal

Four source IPs from AS215925 collectively exploit 22+ vulnerabilities targeting Hikvision cameras, MikroTik routers, TP-Link devices, D-Link NAS, and consumer DVRs. Combined 3,347,443 sessions in a systematic botnet recruitment operation including Generic IoT Default Password Attempt activity.
‍

VisionHeight Fleet Maps Enterprise Perimeters

Six AWS-hosted IPs sharing identical fingerprints and rDNS (scan.visionheight[.]com) mapped management interfaces across Palo Alto, Sophos, Ivanti, Citrix, F5, and ConnectWise platforms. 5,892,055 combined sessions checking for authentication bypass vulnerabilities including Palo Alto Networks Login Scanner.
‍

React/Next.js Vulnerability Chaining Emerges

CVE-2025-55182 (CVSS 10.0) now chained with Next.js CVE2025-29927 (CVSS 9.1), defeating both authentication and application security layers in a single operation. 1,338,336 sessions in week 14 via React Server Components CVE-2025- 55182 RCE Attempt.
‍

Mid-Week Surge Reveals Multi-Operator Activation

Daily sessions quadrupled from 8.5M to 36.6M between Tuesday and Thursday as at least four independent scanning operations β€” including ICS/SCADA protocol reconnaissance β€” activated new infrastructure simultaneously.

‍

‍

Want the full brief?

GreyNoise customers get detailed briefs with complete IOCs, infrastructure attribution, detection guidance, and role-based recommendations every week.

‍Request a demo to learn more about GreyNoise's data and intelligence.

‍

‍

Read the transcript

‍

At The Edge is GreyNoise's weekly intelligence brief produced exclusively for customers incorporating complete IOCs, infrastructure attribution, detection guidance, and role-based recommendations. At The Edge Clear is a preview highlighting a couple insights and is available to the public.

‍

IoT Exploitation Arsenal Expands. Perimeter Defenses Mapped.

Analysis Period: March 23-30, 2026

A 22-CVE botnet recruitment platform, a coordinated scanner fleet mapping enterprise perimeter defenses, and vulnerability chaining in the React/Next.js campaign mark a week defined by specialization across the exploitation supply chain.

‍

By The Numbers:

  • 188M Total Sessions Observed
  • 22 CVEs in IOT Exploit Arsenal
  • 4X Mid-Week Session Surge
  • 14 Weeks of React Campaign

‍

Preview Findings:

VPSVAULT IoT Platform Deploys 22-CVE Arsenal

Four source IPs from AS215925 collectively exploit 22+ vulnerabilities targeting Hikvision cameras, MikroTik routers, TP-Link devices, D-Link NAS, and consumer DVRs. Combined 3,347,443 sessions in a systematic botnet recruitment operation including Generic IoT Default Password Attempt activity.
‍

VisionHeight Fleet Maps Enterprise Perimeters

Six AWS-hosted IPs sharing identical fingerprints and rDNS (scan.visionheight[.]com) mapped management interfaces across Palo Alto, Sophos, Ivanti, Citrix, F5, and ConnectWise platforms. 5,892,055 combined sessions checking for authentication bypass vulnerabilities including Palo Alto Networks Login Scanner.
‍

React/Next.js Vulnerability Chaining Emerges

CVE-2025-55182 (CVSS 10.0) now chained with Next.js CVE2025-29927 (CVSS 9.1), defeating both authentication and application security layers in a single operation. 1,338,336 sessions in week 14 via React Server Components CVE-2025- 55182 RCE Attempt.
‍

Mid-Week Surge Reveals Multi-Operator Activation

Daily sessions quadrupled from 8.5M to 36.6M between Tuesday and Thursday as at least four independent scanning operations β€” including ICS/SCADA protocol reconnaissance β€” activated new infrastructure simultaneously.

‍

‍

Want the full brief?

GreyNoise customers get detailed briefs with complete IOCs, infrastructure attribution, detection guidance, and role-based recommendations every week.

‍Request a demo to learn more about GreyNoise's data and intelligence.

‍

‍