The Surge in SSRF Exploitation: Why It Appears Coordinated

Introduction

On March 9, 2025, cybersecurity researchers at GreyNoise observed a surge in Server-Side Request Forgery (SSRF) attacks, with over 400 unique IP addresses exploiting multiple known vulnerabilities across widely used platforms. The scale and precision of this attack suggest that it was not a random event but a coordinated campaign targeting organizations worldwide.

How Do We Know the Attack Was Coordinated?

1. Large-Scale Involvement of Unique IPs

One of the most telling signs of coordination is the sheer volume of attackers involved. GreyNoise detected over 400 different IPs participating in the exploitation of various SSRF vulnerabilities. The large number of distinct sources suggests the use of a botnet or distributed attack infrastructure, rather than isolated threat actors working independently.

2. Simultaneous Targeting of Multiple CVEs

Instead of focusing on a single vulnerability, the attackers simultaneously exploited multiple SSRF-related CVEs, including:

  • Zimbra Collaboration Suite (CVE-2020-7796)
  • GitLab CE/EE (CVE-2021-22214, CVE-2021-39935, CVE-2021-22175)
  • DotNetNuke (CVE-2017-0929)
  • VMware vCenter (CVE-2021-21973)
  • Ivanti Connect Secure (CVE-2024-21893)
  • BerriAI LiteLLM (CVE-2024-6587)

The fact that several unrelated platforms were exploited simultaneously indicates pre-planned attack automation rather than random scanning.

3. Geographic Dispersion of Targets

The attacks were global, with organizations in the United States, Germany, Singapore, India, and Japan experiencing high levels of exploitation attempts. Additionally, Israel saw similar SSRF attack activity as early as January 2025, hinting at an ongoing, multi-phase operation rather than a spontaneous event.

4. Automation and Pattern Recognition

Many of the same IP addresses targeted multiple SSRF vulnerabilities in rapid succession, a hallmark of automated attack scripts or botnets. This suggests that the attackers were using a pre-programmed toolset designed to systematically exploit vulnerable systems.

5. Connection to Earlier Reconnaissance Activity

GreyNoise reported an increase in path traversal exploit attempts against Grafana prior to the SSRF attacks. This indicates that attackers were likely mapping out internal network infrastructures first before launching SSRF exploits. This multi-stage approach is commonly used in advanced persistent threats (APTs).

6. Use of Unassigned CVEs

Some of the exploited vulnerabilities had no CVEs assigned yet, including SSRF attempts in OpenBMCS 2.4 and Zimbra Collaboration Suite. This strongly suggests that the attackers had inside knowledge or access to zero-day vulnerabilities, further reinforcing the theory of an organized, well-funded campaign.

Defensive Measures Against SSRF Exploits

With SSRF attacks on the rise, organizations must take proactive steps to mitigate risks:

  • Apply Security Patches: Ensure all systems are updated with the latest patches for known vulnerabilities.
  • Restrict Outbound Connections: Limit server-side requests to only necessary endpoints.
  • Monitor for Anomalous Traffic: Deploy security tools to detect and alert on unusual outbound requests.
  • Use Web Application Firewalls (WAFs): Configure WAFs to block unauthorized HTTP requests that could be used for SSRF.
  • Leverage Threat Intelligence: Track emerging threats and block known malicious IPs to prevent SSRF attacks.

Conclusion

This SSRF exploitation surge demonstrates a high level of coordination, automation, and planning by threat actors. The attack’s scale, multi-stage approach, and simultaneous targeting of multiple platforms indicate a structured cyber threat operation rather than a random set of opportunistic attacks. Organizations must remain vigilant, prioritize security patches, and implement strong detection measures to mitigate these evolving risks.

Have you observed any unusual network activity related to SSRF attempts? Share your insights in the comments below.

Leave a comment

I’m Rinzl3r

Hello! I’m Matthew, an experienced engineer at Decian, a leading Managed Service Provider (MSP) dedicated to revolutionizing IT solutions for businesses. With a passion for technology and a wealth of experience in the MSP industry, I’ve embarked on a journey to demystify the world of managed services through this blog.

My career at Decian has been a journey of constant learning and growth. Over the years, I’ve honed my skills in various aspects of IT management, from network security and cloud services to data analytics and cybersecurity. Working in an environment that fosters innovation and customer-focused solutions, I’ve had the privilege of contributing to numerous projects that have helped businesses optimize their IT strategies and enhance operational efficiency.

The inspiration to start this blog came from my interactions with business owners and clients who often expressed a need for clearer understanding and guidance in working with MSPs. Whether it’s navigating the complexities of digital transformation, ensuring cybersecurity, or leveraging technology for business growth, I realized that there’s a wealth of knowledge to be shared.

Through this blog, I aim to bridge the gap between MSPs and their clients. My goal is to provide insights, tips, and practical advice that can help business owners make informed decisions about their IT needs and how best to collaborate with an MSP like Decian. From explaining basic concepts to exploring advanced IT solutions, I strive to make this space a valuable resource for both seasoned professionals and those new to the world of managed services.

Join me on this informative journey, as we explore the dynamic and ever-evolving world of MSPs. Whether you’re an MSP client, a business owner, or just curious about the role of technology in business today, I hope to make this blog your go-to source for all things MSP.

Welcome to the blog, and let’s unravel the complexities of managed IT services together!

Let’s connect