The Mystery OAST Host Behind a Regionally Focused Exploit Operation
Nov. 28, 2025, 10:22 a.m.
Description
A long-running, attacker-operated OAST service on Google Cloud has been observed driving a focused exploit operation. The actor combines stock Nuclei templates with custom payloads to expand their reach. All observed activity targeted canaries deployed in Brazil, indicating a deliberate regional focus. The operation involves roughly 1,400 exploit attempts spanning more than 200 CVEs. The attacker uses a private OAST domain, detectors-testing.com, which has been active for at least a year. The infrastructure is hosted on US-based Google Cloud, providing practical benefits for the attacker. The actor demonstrates willingness to modify common exploit components, as evidenced by a custom Fastjson payload. This sustained scanning effort suggests a more structured operation than typical exploit spraying.
Tags
Date
- Created: Nov. 28, 2025, 2:45 a.m.
- Published: Nov. 28, 2025, 2:45 a.m.
- Modified: Nov. 28, 2025, 10:22 a.m.
Indicators
- 34.42.21.27
- 34.172.194.72
- 34.136.22.26
- 34.16.7.161
- 34.133.225.171
- 26.22.136.34
- i-sh.detectors-testing.com
- d4bqsd6e47mo47d93lpgq55d3j111y6em.i-sh.detectors-testing.com
- 20d4bqsd6e47mo47d93lpgq55d3j111y6em.i-sh.detectors-testing.com
Attack Patterns
Additional Informations
- Serbia
- Brazil