Is Your Perimeter Secure Against 212 Attacks Per Second?

Is Your Perimeter Secure Against 212 Attacks Per Second?

The digital border between internal corporate networks and the chaotic public internet has become a theater of relentless, automated aggression where security sensors now log nearly 3 billion malicious sessions over a single six-month observation window. This translates to a staggering 212 exploitation attempts every second, a tempo that renders traditional human-led response cycles completely obsolete. Modern edge infrastructure, including virtual private networks and remote access gateways, serves as the primary frontline for these incursions, acting as both a gateway and a high-value target for sophisticated threat actors. The sheer volume of these attacks suggests that the internet is no longer just a connectivity medium but a dense environment of continuous scanning and exploitation. As organizations transition through 2026, the necessity of understanding this hostile landscape becomes paramount for maintaining operational continuity and data integrity against an adversary that never sleeps and relies on the massive scale of automation to find a single crack in the armor.

Targeted Exploitation of Enterprise Connectivity Solutions

Enterprise-grade VPN platforms have transitioned from being secure tunnels to becoming the most sought-after entry points for adversaries seeking direct access to internal corporate environments. Recent data indicates a disproportionate focus on Palo Alto Networks’ GlobalProtect infrastructure, which faced a volume of exploitation attempts exceeding the combined traffic directed at its major competitors like Cisco and Fortinet. This strategic targeting highlights a shift where attackers move beyond opportunistic scanning to focus on assets that provide the highest level of administrative control. Many of these campaigns specifically leverage legacy vulnerabilities that persist across the global internet due to delayed patching cycles or forgotten shadow IT assets. By focusing on these specific technologies, threat actors can automate the delivery of secondary payloads once the perimeter is breached. This systematic pursuit of high-value entry points demonstrates that attackers prioritize platforms with wide enterprise adoption, knowing that a single successful exploit can grant them lateral movement capabilities within a target’s most sensitive segments.

While specific enterprise software remains a primary target, the endurance of foundational protocols like Secure Shell (SSH) in attack statistics is remarkable, accounting for over 639 million recorded sessions. This persistence indicates that basic credential harvesting and brute-force attempts remain a cost-effective cornerstone of global cybercrime operations. However, the sophistication arises in how these attempts are delivered, particularly through the use of “fresh” infrastructure for high-severity maneuvers like remote code execution or SQL injection. Attackers frequently rotate their IP addresses to ensure that high-impact exploitation attempts originate from sources with no prior history of malicious activity. This strategy effectively blinds detection systems that rely on historical reputation data or static blocklists, forcing security teams to analyze the intent of the traffic in real-time. By utilizing infrastructure that has not yet been flagged as malicious, actors can bypass traditional perimeter defenses that are tuned to recognize known bad actors, making the initial stage of an attack much harder to stop.

Strategic Distribution and the Rise of Stealthy Infrastructure

The landscape of global malicious traffic reveals a surprising level of concentration within a few specific autonomous systems, offering a unique opportunity for tactical defense. For instance, the provider UCLOUD alone was recently identified as the source for approximately 14% of all observed activity, a figure that surprisingly surpasses the combined malicious output of much larger hyperscale providers like Amazon Web Services or Microsoft Azure. This clustering suggests that threat actors favor specific hosting environments that perhaps offer more lenient terms of service or slower abuse response times. For defenders, this concentration provides a clear path toward coarse-grained blocking strategies at the ASN level, which can mitigate a significant portion of background noise and large-scale automated campaigns. Identifying these hotspots allows organizations to apply more aggressive traffic filtering to specific regions of the internet without disrupting legitimate business operations. Understanding where the majority of automated threats originate is essential for prioritizing defensive resources and narrowing the focus of security monitoring.

Complementing the use of centralized hosting providers is the rapid expansion of massive residential botnets that leverage hundreds of thousands of compromised consumer devices. These networks are largely concentrated in regions like Brazil and Argentina, providing attackers with a vast pool of domestic IP addresses that appear legitimate to most geographic filters. By distributing credential-spraying attempts and vulnerability probes across a massive web of residential nodes, threat actors ensure that each individual IP address stays well below the thresholds that would trigger an automated block. This decentralized approach makes it nearly impossible to maintain effective static blocklists, as the source IPs are constantly shifting and belong to actual home internet users. These residential proxy networks allow attackers to blend in with legitimate traffic patterns, making the distinction between a valid user and a malicious bot increasingly difficult. The rise of these botnets necessitates a move toward behavioral analysis, where the action being performed is scrutinized more than the origin of the request itself.

Modern Attack Vectors and Adaptive Defense Strategies

As artificial intelligence becomes deeply integrated into corporate workflows, the infrastructure supporting these technologies has emerged as a fresh and lucrative component of the attack surface. Large Language Model inference servers, such as those running Ollama, are now being integrated into the routine scanning cycles of automated botnets. Attackers actively probe for exposed application programming interfaces and tool-calling features that might allow them to hijack computational resources or access sensitive training data. This trend signals that as AI adoption continues to grow, these servers will be treated with the same level of scrutiny as traditional edge components like web servers or databases. The speed at which attackers have incorporated AI-specific probes into their repertoires highlights their adaptability and the need for security teams to secure these new assets before they are fully deployed. Neglecting the security of AI-related APIs could lead to a new class of data breaches where the model itself becomes the vector for exfiltration or internal network compromise.

The evidence gathered from the most recent threat observations confirmed that relying on static defenses and historical reputation data was no longer sufficient for securing the modern perimeter. Organizations moved toward a more dynamic, behavior-based security posture that prioritized real-time intent analysis over simple IP filtering. Implementation of automated patching for edge devices became a non-negotiable standard to close the window of opportunity for attackers targeting legacy vulnerabilities in VPNs and routers. Furthermore, defenders began to utilize autonomous system blocking to neutralize large volumes of traffic from known high-risk hosting providers without affecting legitimate users. The integration of advanced monitoring for AI infrastructure ensured that newly deployed technologies did not become unmonitored entry points. By shifting focus toward these proactive and granular strategies, security professionals established a more resilient defense capable of withstanding the relentless pace of hundreds of attacks every second. This evolved approach focused on minimizing the attack surface while maximizing the cost of entry for the adversary.

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later