Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Critical Nginx-ui MCP Flaw Actively Exploited in the Wild

April 15, 2026

China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware

April 15, 2026

Researchers Spot Surge in Brute-Force Attacks from Middle East

April 15, 2026
Facebook X (Twitter) Instagram
Wednesday, April 15
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Researchers Spot Surge in Brute-Force Attacks from Middle East
News

Researchers Spot Surge in Brute-Force Attacks from Middle East

Team-CWDBy Team-CWDApril 15, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Security researchers have detected a “sharp rise” in brute-force attempts to hijack SonicWall and Fortinet devices, with the vast majority (88%) appearing to come from the Middle East.

Barracuda said most of these attempts were unsuccessful as they were either blocked outright by security tools or directed at invalid usernames. 

Although these attacks may simply have been routed through servers and networks in the region, the timing would seem to coincide with US and Israeli hostilities against Iran.

There have been various reports of attacks from Iranian-affiliated hackers over recent weeks, including raids against US critical infrastructure providers and medtech firms.

The line between state-backed efforts and financially motivated cybercrime is increasingly blurred, as evidenced by the re-emergence of the Pay2Key ransomware group.

Read more on Middle East threats: Hybrid Middle East Conflict Triggers Surge in Global Cyber Activity.

Edge devices such as the VPNs and firewall appliances manufactured by vendors like SonicWall and Fortinet are a popular target for attack given that they are internet-facing but also provide a foothold inside corporate networks.

Barracuda said over half (56%) of all confirmed incidents from February to March related to this type of brute-force attack.

“Attackers are aggressively scanning and testing perimeter devices for weak or exposed credentials,” warned Barracuda senior cybersecurity analyst, Laila Mubashar. “Even when attacks fail, persistent probing raises the risk that a single weak password or misconfiguration could lead to compromise.”

She urged organizations to:

  • Enforce strong, unique passwords on all network and security devices
  • Enable multi-factor authentication (MFA) on all VPNs, firewalls and remote access services
  • Monitor and investigate repeated failed login attempts
  • Restrict management interfaces to trusted IP ranges where possible

Rise in ClickFix Attacks

Barracuda also sounded the alarm over a surge in a category of social engineering attacks known as “ClickFix,” in which users are tricked into copying and executing a malicious script in a bid to fix a non-existent technical issue.

Mubashar explained that such attacks exploit user trust and anxiety.

“The attackers use familiar elements and language such as pop-ups, prompts and running a fix,” she added. “Because ClickFix attacks rely on duping users into adding malicious commands themselves, such attacks are harder for automated security systems to spot.”

Organizations should improve end-user education, restrict who can run PowerShell, scripts or command-line tools, and deploy tools to monitor for unusual behavior, Barracuda advised.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleFlowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed
Next Article China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware
Team-CWD
  • Website

Related Posts

News

Critical Nginx-ui MCP Flaw Actively Exploited in the Wild

April 15, 2026
News

China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware

April 15, 2026
News

Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed

April 15, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 27, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views
Our Picks

Beware of threats lurking in booby-trapped PDF files

October 7, 2025

‘What happens online stays online’ and other cyberbullying myths, debunked

September 11, 2025

How to tell if a voice call is AI or not

February 23, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.