Research Links Threat Actor Activity to Future Vulnerabilities

The data provides recommendations for proactively protecting networks before vulnerabilities are disclosed.

Computer Crime Concept 516607038 2125x1416 (1)

GreyNoise Intelligence, a provider of cybersecurity threat intelligence, recently released a research report exploring the correlation between spikes in attacker activity and subsequent disclosures of Common Vulnerabilities and Exposures (CVEs) in edge technologies. The research report, entitled “Early Warning Signals:  When Attacker Behavior Precedes New Vulnerabilities,” offers predictive value and recommendations on what defenders can do to proactively protect their networks, before vulnerabilities are even disclosed.

GreyNoise analyzed all of its tags (CVSS 6+ CVEs) associated with edge technologies to determine whether there was a consistent, repeatable pattern of significant spikes in opportunistic attacker activity (e.g. scanning, brute forcing, and exploitation attempts) against edge technologies preceding the disclosure of new vulnerabilities. GreyNoise only observed this pattern across a specific subset of enterprise edge products from eight vendors, though it did not limit its analysis to enterprise technologies. 

Key findings from the report include:

  • Spikes in attacker activity often precede new cyber vulnerabilities. In 80 percent of cases we analyzed, significant spikes in opportunistic attacker activity against edge technologies were followed by the disclosure of a new CVE affecting the same technology within six weeks. This recurring pattern may offer early warning value.
  • These spikes give defenders a defined window to prepare. The clustering of new CVEs within six weeks of attacker spikes provides defenders with a concrete timeframe to increase monitoring, harden systems, and preemptively act — even before a vulnerability is known. CISOs can use this window to justify early planning or investment.
  • Blocking early reconnaissance may keep systems off attacker inventories. Spikes may reflect exploit-based reconnaissance designed to identify exposed systems. Blocking the associated IPs during these phases may prevent inclusion in attacker inventories — reducing the likelihood of being targeted later, even if different IPs are used for exploitation of the new CVE emerging weeks later.
  • Enterprise edge technologies show the strongest patterns. After filtering out ambiguous cases and noise, all spike-CVE pairs we observed involved internet-facing assets commonly deployed in enterprise environments such as VPNs, firewalls, and products from vendors like Cisco, Fortinet, Citrix, and Ivanti.
  • Most spikes involved real exploits — not scanning. The majority of activity leading up to CVEs was not generic scanning but exploit attempts against previously known vulnerabilities. This supports two likely motives: testing inputs that may lead to new CVE discovery, or inventorying systems for future exploitation when a new flaw becomes known.
  • State-sponsored actors have repeatedly targeted edge infrastructure. Nation-state groups like the Typhoons have reportedly focused on enterprise-focused edge devices for pre-positioning, surveillance, and access persistence. All products studied in this analysis are enterprise-focused edge systems, highlighting both enterprise and national security stakes. 
More in Cybersecurity