Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Scanning Webserver with /$(pwd)/ as a Starting Path, (Sun, Jan 25th)

0
Medium
Vulnerabilityweb
Published: Mon Jan 26 2026 (01/26/2026, 00:59:32 UTC)
Source: SANS ISC Handlers Diary

Description

Starting mid-January 2026, threat actors have been scanning web servers using the unusual path pattern /$(pwd)/ to probe for sensitive configuration files such as . env files, terraform state files, and docker-compose. yml. These scans aim to identify exposed environment files that may contain secrets, credentials, or infrastructure details. The activity has been limited so far, involving a small number of IP addresses and scans. No known exploits have been observed in the wild yet, and the threat level is currently assessed as medium. The scanning technique leverages command substitution syntax in URLs, possibly to bypass naive filters or identify misconfigured servers that expose sensitive files. European organizations running web servers with publicly accessible configuration files or development/staging environments are at risk of information disclosure. Mitigation requires immediate review and restriction of access to environment and infrastructure files, enhanced web server configuration, and monitoring for suspicious scanning activity. Countries with significant cloud adoption and web infrastructure, such as Germany, France, the UK, and the Netherlands, are more likely to be targeted.

AI-Powered Analysis

AILast updated: 01/26/2026, 01:05:19 UTC

Technical Analysis

This threat involves scanning activity detected starting January 13, 2026, targeting web servers with URL paths containing the pattern /$(pwd)/. The scanning attempts to access sensitive files commonly used in development and deployment environments, including .env files (e.g., .env.staging, .env.production), terraform.tfstate, docker-compose.yml, and netlify.toml. These files often contain environment variables, secrets, API keys, database credentials, and infrastructure state information that, if exposed, can lead to further compromise. The use of the /$(pwd)/ pattern suggests attackers are probing for servers that may improperly expose files via command substitution or path traversal vulnerabilities. The scanning activity has been limited to a few IP addresses (notably 185.177.72.52 and 185.177.72.23) and a small number of probes, indicating either early-stage reconnaissance or targeted scanning rather than widespread exploitation. No known exploits leveraging this scanning have been reported in the wild yet. The threat was reported by the SANS Internet Storm Center and is categorized as medium severity. The scanning is detected via web logs and honeypots, and the analysis includes visualization of scanning relationships using tools like Gephi and Elasticsearch queries. The primary risk is information disclosure that could facilitate subsequent attacks such as credential theft, lateral movement, or infrastructure compromise.

Potential Impact

For European organizations, the impact of this threat primarily concerns confidentiality breaches due to exposure of sensitive environment and infrastructure files. Disclosure of environment variables and terraform state files can reveal secrets, credentials, and cloud infrastructure details, enabling attackers to escalate privileges, access databases, or manipulate cloud resources. This can lead to data breaches, service disruption, or financial loss. Organizations with publicly accessible development, staging, or misconfigured production environments are at higher risk. The limited current scanning activity suggests early reconnaissance, but if successful, attackers could leverage the information for targeted attacks. The impact on integrity and availability is indirect but possible if attackers use the disclosed information to deploy malware or disrupt services. Given the medium severity and no known exploits, the immediate risk is moderate but could escalate if exploitation techniques emerge. European entities with significant web infrastructure, cloud deployments, and DevOps practices are particularly vulnerable.

Mitigation Recommendations

European organizations should immediately audit their web servers and associated infrastructure for exposure of environment files (.env), terraform state files, docker-compose.yml, and similar sensitive files. Access controls must be enforced to restrict public access to these files, including proper web server configuration to deny serving dotfiles and configuration files. Implement strict URL filtering and input validation to prevent command substitution or path traversal exploitation. Use network monitoring and intrusion detection systems to identify scanning activity matching the /$(pwd)/ pattern or originating from the identified IP addresses. Employ web application firewalls (WAFs) with custom rules to block suspicious requests. Regularly rotate secrets and credentials stored in environment files and consider using secret management solutions to avoid storing sensitive data in plain files. Conduct penetration testing focused on environment file exposure and misconfigurations. Finally, maintain up-to-date logging and alerting to detect reconnaissance and respond promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://isc.sans.edu/diary/rss/32654","fetched":true,"fetchedAt":"2026-01-26T01:05:05.783Z","wordCount":339}

Threat ID: 6976bdc14623b1157c134d6e

Added to database: 1/26/2026, 1:05:05 AM

Last enriched: 1/26/2026, 1:05:19 AM

Last updated: 1/26/2026, 8:10:27 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats