Scanning Webserver with /$(pwd)/ as a Starting Path, (Sun, Jan 25th)
Based on the sensors reporting to ISC, this activity started on the 13 Jan 2026. My own sensor started seeing the first scan on the 21 Jan 2026 with limited probes. So far, this activity has been limited to a few scans based on the reports available in ISC [5] (select Match Partial URL and Draw):
AI Analysis
Technical Summary
This threat involves scanning activity detected starting January 13, 2026, targeting web servers with URL paths containing the pattern /$(pwd)/. The scanning attempts to access sensitive files commonly used in development and deployment environments, including .env files (e.g., .env.staging, .env.production), terraform.tfstate, docker-compose.yml, and netlify.toml. These files often contain environment variables, secrets, API keys, database credentials, and infrastructure state information that, if exposed, can lead to further compromise. The use of the /$(pwd)/ pattern suggests attackers are probing for servers that may improperly expose files via command substitution or path traversal vulnerabilities. The scanning activity has been limited to a few IP addresses (notably 185.177.72.52 and 185.177.72.23) and a small number of probes, indicating either early-stage reconnaissance or targeted scanning rather than widespread exploitation. No known exploits leveraging this scanning have been reported in the wild yet. The threat was reported by the SANS Internet Storm Center and is categorized as medium severity. The scanning is detected via web logs and honeypots, and the analysis includes visualization of scanning relationships using tools like Gephi and Elasticsearch queries. The primary risk is information disclosure that could facilitate subsequent attacks such as credential theft, lateral movement, or infrastructure compromise.
Potential Impact
For European organizations, the impact of this threat primarily concerns confidentiality breaches due to exposure of sensitive environment and infrastructure files. Disclosure of environment variables and terraform state files can reveal secrets, credentials, and cloud infrastructure details, enabling attackers to escalate privileges, access databases, or manipulate cloud resources. This can lead to data breaches, service disruption, or financial loss. Organizations with publicly accessible development, staging, or misconfigured production environments are at higher risk. The limited current scanning activity suggests early reconnaissance, but if successful, attackers could leverage the information for targeted attacks. The impact on integrity and availability is indirect but possible if attackers use the disclosed information to deploy malware or disrupt services. Given the medium severity and no known exploits, the immediate risk is moderate but could escalate if exploitation techniques emerge. European entities with significant web infrastructure, cloud deployments, and DevOps practices are particularly vulnerable.
Mitigation Recommendations
European organizations should immediately audit their web servers and associated infrastructure for exposure of environment files (.env), terraform state files, docker-compose.yml, and similar sensitive files. Access controls must be enforced to restrict public access to these files, including proper web server configuration to deny serving dotfiles and configuration files. Implement strict URL filtering and input validation to prevent command substitution or path traversal exploitation. Use network monitoring and intrusion detection systems to identify scanning activity matching the /$(pwd)/ pattern or originating from the identified IP addresses. Employ web application firewalls (WAFs) with custom rules to block suspicious requests. Regularly rotate secrets and credentials stored in environment files and consider using secret management solutions to avoid storing sensitive data in plain files. Conduct penetration testing focused on environment file exposure and misconfigurations. Finally, maintain up-to-date logging and alerting to detect reconnaissance and respond promptly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
Scanning Webserver with /$(pwd)/ as a Starting Path, (Sun, Jan 25th)
Description
Based on the sensors reporting to ISC, this activity started on the 13 Jan 2026. My own sensor started seeing the first scan on the 21 Jan 2026 with limited probes. So far, this activity has been limited to a few scans based on the reports available in ISC [5] (select Match Partial URL and Draw):
AI-Powered Analysis
Technical Analysis
This threat involves scanning activity detected starting January 13, 2026, targeting web servers with URL paths containing the pattern /$(pwd)/. The scanning attempts to access sensitive files commonly used in development and deployment environments, including .env files (e.g., .env.staging, .env.production), terraform.tfstate, docker-compose.yml, and netlify.toml. These files often contain environment variables, secrets, API keys, database credentials, and infrastructure state information that, if exposed, can lead to further compromise. The use of the /$(pwd)/ pattern suggests attackers are probing for servers that may improperly expose files via command substitution or path traversal vulnerabilities. The scanning activity has been limited to a few IP addresses (notably 185.177.72.52 and 185.177.72.23) and a small number of probes, indicating either early-stage reconnaissance or targeted scanning rather than widespread exploitation. No known exploits leveraging this scanning have been reported in the wild yet. The threat was reported by the SANS Internet Storm Center and is categorized as medium severity. The scanning is detected via web logs and honeypots, and the analysis includes visualization of scanning relationships using tools like Gephi and Elasticsearch queries. The primary risk is information disclosure that could facilitate subsequent attacks such as credential theft, lateral movement, or infrastructure compromise.
Potential Impact
For European organizations, the impact of this threat primarily concerns confidentiality breaches due to exposure of sensitive environment and infrastructure files. Disclosure of environment variables and terraform state files can reveal secrets, credentials, and cloud infrastructure details, enabling attackers to escalate privileges, access databases, or manipulate cloud resources. This can lead to data breaches, service disruption, or financial loss. Organizations with publicly accessible development, staging, or misconfigured production environments are at higher risk. The limited current scanning activity suggests early reconnaissance, but if successful, attackers could leverage the information for targeted attacks. The impact on integrity and availability is indirect but possible if attackers use the disclosed information to deploy malware or disrupt services. Given the medium severity and no known exploits, the immediate risk is moderate but could escalate if exploitation techniques emerge. European entities with significant web infrastructure, cloud deployments, and DevOps practices are particularly vulnerable.
Mitigation Recommendations
European organizations should immediately audit their web servers and associated infrastructure for exposure of environment files (.env), terraform state files, docker-compose.yml, and similar sensitive files. Access controls must be enforced to restrict public access to these files, including proper web server configuration to deny serving dotfiles and configuration files. Implement strict URL filtering and input validation to prevent command substitution or path traversal exploitation. Use network monitoring and intrusion detection systems to identify scanning activity matching the /$(pwd)/ pattern or originating from the identified IP addresses. Employ web application firewalls (WAFs) with custom rules to block suspicious requests. Regularly rotate secrets and credentials stored in environment files and consider using secret management solutions to avoid storing sensitive data in plain files. Conduct penetration testing focused on environment file exposure and misconfigurations. Finally, maintain up-to-date logging and alerting to detect reconnaissance and respond promptly.
Affected Countries
Technical Details
- Article Source
- {"url":"https://isc.sans.edu/diary/rss/32654","fetched":true,"fetchedAt":"2026-01-26T01:05:05.783Z","wordCount":339}
Threat ID: 6976bdc14623b1157c134d6e
Added to database: 1/26/2026, 1:05:05 AM
Last enriched: 1/26/2026, 1:05:19 AM
Last updated: 2/7/2026, 2:38:59 PM
Views: 393
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2087: SQL Injection in SourceCodester Online Class Record System
MediumOrganizations Urged to Replace Discontinued Edge Devices
MediumCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.