Home » 251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch

251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch

by Samantha Rowland
2 minutes read

Cybersecurity experts are on high alert following a recent revelation of a sophisticated scanning operation that took aim at vulnerable systems earlier this month. GreyNoise, a renowned cybersecurity firm, uncovered this coordinated attack on May 8, 2025, shedding light on a concerning development in the realm of digital security.

What sets this incident apart is the scale and precision with which it was executed. The scanning activity, orchestrated by a network of 251 malicious IP addresses, all traced back to Japan and hosted on Amazon’s cloud infrastructure, targeted 75 specific “exposure points.” This level of organization and focus indicates a well-planned and determined effort to exploit vulnerabilities in popular software frameworks.

Of particular concern are the findings that these malicious IPs were engaged in triggering 75 distinct behaviors, including the exploitation of known vulnerabilities such as those associated with ColdFusion, Struts, and Elasticsearch. These exploits, often linked to common vulnerabilities and exposures (CVEs), underscore the importance of promptly addressing security patches and maintaining robust cybersecurity measures.

The choice of targets in this scanning campaign—ColdFusion, Struts, and Elasticsearch—reflects a strategic approach to compromising systems widely used in web development and data management. ColdFusion, a rapid web application development platform, Struts, a popular framework for creating Java web applications, and Elasticsearch, a distributed search and analytics engine, are all integral components in many organizations’ IT infrastructure.

The use of Amazon-hosted IPs adds another layer of complexity to this threat landscape. While cloud services offer flexibility and scalability, they also present challenges in monitoring and securing network traffic. The involvement of Amazon’s infrastructure in this malicious activity highlights the need for cloud users to implement robust security protocols and closely monitor traffic patterns for any suspicious behavior.

In response to this alarming discovery, cybersecurity professionals are advising organizations to remain vigilant and proactive in safeguarding their systems. This includes promptly applying security patches, conducting regular vulnerability assessments, and leveraging threat intelligence tools to detect and mitigate potential risks.

As the digital landscape continues to evolve, threats to cybersecurity are becoming increasingly sophisticated and pervasive. Incidents like the recent scanning activity serve as a stark reminder of the importance of staying informed, proactive, and prepared to defend against emerging threats. By staying ahead of potential vulnerabilities and adopting a comprehensive cybersecurity strategy, organizations can mitigate risks and protect their valuable assets from malicious actors.

You may also like