Menace intelligence agency GreyNoise is warning of a “notable surge” in scanning exercise focusing on Progress MOVEit Switch programs beginning Might 27, 2025—suggesting that attackers could also be making ready for an additional mass exploitation marketing campaign or probing for unpatched programs.
MOVEit Switch is a well-liked managed file switch resolution utilized by companies and authorities companies to share delicate knowledge securely. As a result of it typically handles high-value info, it has develop into a favourite goal for attackers.
“Previous to this date, scanning was minimal — sometimes fewer than 10 IPs noticed per day,” the corporate stated. “However on Might 27, that quantity spiked to over 100 distinctive IPs, adopted by 319 IPs on Might 28.”
Since then, every day scanner IP quantity has remained intermittently elevated between 200 to 300 IPs per day, GreyNoise added, stating it marks a “vital deviation” from typical habits.
As many as 682 distinctive IPs have been flagged in reference to the exercise over the previous 90 days, with 449 IP addresses noticed prior to now 24 hours alone. Of the 449 IPs, 344 have been categorized as suspicious and 77 have been marked malicious.
A majority of the IP addresses geolocate to the US, adopted by Germany, Japan, Singapore, Brazil, the Netherlands, South Korea, Hong Kong, and Indonesia.
GreyNoise additionally stated it detected low-volume exploitation makes an attempt to weaponize two identified MOVEit Switch flaws (CVE-2023-34362 and CVE-2023-36934) on June 12, 2025. It is price noting that CVE-2023-34362 was abused by Cl0p ransomware actors as a part of a widespread marketing campaign in 2023, impacting greater than 2,770 organizations.
The spike in scanning exercise is a sign that MOVEit Switch situations are as soon as once more beneath the risk actor’s scanner, making it important that customers block the offending IP addresses, be certain that the software program is up-to-date, and keep away from publicly exposing them over the web.