The Mystery OAST Host Behind a Regionally Focused Exploit Operation

Nov. 28, 2025, 10:22 a.m.

Description

A long-running, attacker-operated OAST service on Google Cloud has been observed driving a focused exploit operation. The actor combines stock Nuclei templates with custom payloads to expand their reach. All observed activity targeted canaries deployed in Brazil, indicating a deliberate regional focus. The operation involves roughly 1,400 exploit attempts spanning more than 200 CVEs. The attacker uses a private OAST domain, detectors-testing.com, which has been active for at least a year. The infrastructure is hosted on US-based Google Cloud, providing practical benefits for the attacker. The actor demonstrates willingness to modify common exploit components, as evidenced by a custom Fastjson payload. This sustained scanning effort suggests a more structured operation than typical exploit spraying.

Date

  • Created: Nov. 28, 2025, 2:45 a.m.
  • Published: Nov. 28, 2025, 2:45 a.m.
  • Modified: Nov. 28, 2025, 10:22 a.m.

Indicators

  • 34.42.21.27
  • 34.172.194.72
  • 34.136.22.26
  • 34.16.7.161
  • 34.133.225.171
  • 26.22.136.34
  • i-sh.detectors-testing.com
  • d4bqsd6e47mo47d93lpgq55d3j111y6em.i-sh.detectors-testing.com
  • 20d4bqsd6e47mo47d93lpgq55d3j111y6em.i-sh.detectors-testing.com

Attack Patterns

Additional Informations

  • Serbia
  • Brazil

Linked vulnerabilities