Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

KRVTZ-NET IDS alerts for 2026-02-09

0
Low
Published: Mon Feb 09 2026 (02/09/2026, 00:00:00 UTC)
Source: CIRCL OSINT Feed
Vendor/Project: tlp
Product: clear

Description

The KRVTZ-NET IDS alerts from February 9, 2026, report reconnaissance and scanning activities targeting network infrastructure, particularly Fortigate VPN devices and submission services. Indicators include repeated connection attempts from IP 152. 32. 151. 39 suggesting brute force attacks, and IP 2001:470:1:332::148 performing repeated GET requests to the /remote/logincheck endpoint, exploiting CVE-2023-27997. Additional IPs use Google Webcrawler user-agent spoofing to evade detection while scanning. Although no active exploitation or ransomware campaigns are reported, these activities represent early-stage reconnaissance that could lead to more severe attacks. The threat is currently assessed as low severity but poses risks to confidentiality and integrity if left unmitigated. European organizations using Fortigate VPNs are particularly at risk. Proactive patching, enhanced monitoring, MFA, and network segmentation are recommended to mitigate potential impacts.

AI-Powered Analysis

AILast updated: 02/16/2026, 13:36:43 UTC

Technical Analysis

The KRVTZ-NET IDS alerts for 2026-02-09 document network reconnaissance activities detected by intrusion detection systems, highlighting multiple suspicious IP addresses. The key technical concern is the repeated GET requests from IP 2001:470:1:332::148 targeting the /remote/logincheck endpoint on Fortigate VPN devices, associated with CVE-2023-27997, a critical vulnerability allowing unauthenticated attackers to execute arbitrary commands or gain unauthorized access. Despite the feed indicating no patch availability, Fortinet has released patches for this CVE, and organizations should verify their update status. Another notable indicator is IP 152.32.151.39 connecting approximately 15 times per hour to a submission service over TCP, suggesting brute force attempts to compromise credentials. Additional IPs (165.165.120.46, 14.176.76.54, 14.244.210.136) perform scans using the Google Webcrawler user-agent string (Mediapartners-Google), a common evasion technique to blend malicious scanning with legitimate traffic and evade detection. These activities fall under the reconnaissance phase of the cyber kill chain, representing preliminary steps attackers use to gather information before launching more damaging attacks. No confirmed exploitation or ransomware use is reported in this feed. The alerts serve as early warnings of ongoing probing that could precede targeted attacks. The use of evasion techniques complicates detection and may allow attackers to bypass traditional security controls. Overall, the threat underscores the importance of proactive defense, rapid patch management, and enhanced monitoring to prevent exploitation and maintain operational continuity.

Potential Impact

For European organizations, the primary impact lies in the potential compromise of VPN infrastructure and submission services through brute force or exploitation of CVE-2023-27997 in Fortigate VPNs. Successful exploitation could lead to unauthorized access, data exfiltration, lateral movement within networks, and disruption of secure remote access capabilities. Given the widespread deployment of Fortigate VPNs across European enterprises and government agencies—especially in sectors requiring secure remote connectivity such as finance, healthcare, and public administration—the threat could significantly affect the confidentiality and integrity of sensitive information. The reconnaissance activity increases the risk of follow-on attacks, including credential stuffing, targeted exploitation, or ransomware deployment if initial access is gained. The use of Google Webcrawler user-agent spoofing complicates detection efforts, potentially allowing attackers to evade security controls and persist undetected. Although the current severity is low, failure to address these indicators could escalate risk and lead to operational disruptions or data breaches. The threat highlights the need for continuous vigilance and rapid response to emerging reconnaissance and exploitation attempts.

Mitigation Recommendations

1. Immediately verify and apply all available patches for Fortigate VPN devices, specifically addressing CVE-2023-27997, to eliminate known vulnerabilities. 2. Implement strict rate limiting and account lockout policies on submission and VPN login endpoints to mitigate brute force attempts. 3. Enhance network monitoring to detect anomalous connection patterns, including repeated access attempts from single IPs and suspicious user-agent strings mimicking legitimate crawlers. 4. Deploy multi-factor authentication (MFA) on all VPN and submission services to reduce risk from credential compromise. 5. Use threat intelligence feeds to block or scrutinize traffic from IPs identified in the KRVTZ-NET alerts and other suspicious sources. 6. Conduct regular security audits and penetration tests focusing on remote access infrastructure to identify and remediate weaknesses. 7. Educate security teams on recognizing evasion techniques such as user-agent spoofing to improve incident detection and response. 8. Segment VPN and submission services from critical internal networks to limit lateral movement if compromise occurs. 9. Maintain comprehensive logging and enable alerting for repeated failed login attempts and unusual access patterns. 10. Collaborate with ISPs and national CERTs to share intelligence and respond promptly to emerging threats.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Uuid
98ab93e1-24e2-4e29-82e3-a4c616761583
Original Timestamp
1770630010

Indicators of Compromise

Ip

ValueDescriptionCopy
ip152.32.151.39
haproxy: 152.32.151.39 connecting to (submission/TCP) 15x in hour, possible bruteforcing.
ip2001:470:1:332::148
ET EXPLOIT Fortigate VPN - Repeated GET Requests to /remote/logincheck (CVE-2023-27997)
ip165.165.120.46
ET SCAN Google Webcrawler User-Agent (Mediapartners-Google)
ip14.176.76.54
ET SCAN Google Webcrawler User-Agent (Mediapartners-Google)
ip14.244.210.136
ET SCAN Google Webcrawler User-Agent (Mediapartners-Google)

Threat ID: 6989d35e4b57a58fa14c3f67

Added to database: 2/9/2026, 12:30:22 PM

Last enriched: 2/16/2026, 1:36:43 PM

Last updated: 2/21/2026, 12:19:28 AM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats