Coordinated brute-force campaign targets Apache Tomcat Manager interfaces

Coordinated brute-force campaign targets Apache Tomcat Manager interfaces

A widespread and coordinated cyber campaign is actively targeting Apache Tomcat Manager interfaces exposed to the internet, according to threat intelligence company GreyNoise. The campaign, first observed on June 5, involves brute-force login attempts originating from hundreds of unique IP addresses.

Apache Tomcat is a widely used open-source web server platform, popular among enterprises and SaaS providers for hosting and managing Java-based web applications. Its accompanying Tomcat Manager is a web-based administration console designed for deploying and managing these applications. While Tomcat Manager is configured by default to restrict access to localhost (127.0.0.1) and lacks preset credentials, misconfigured or intentionally exposed interfaces are proving to be a valuable target for attackers.

GreyNoise analysts have tracked two separate yet coordinated campaigns. The first wave involved nearly 300 unique IP addresses, most of which were tagged as malicious, targeting exposed Tomcat Manager interfaces. A second, parallel campaign saw 250 additional IPs engage in brute-force attacks.

“Roughly 400 unique IPs were involved in the activity observed across both tags during this period of elevated activity,” GreyNoise said in its report. “Most of the activity originating from these IPs exhibited a narrow focus on Tomcat services. A significant portion of this activity originated from infrastructure hosted by DigitalOcean (ASN 14061).”

“While not tied to a specific vulnerability, this behavior highlights ongoing interest in exposed Tomcat services. Broad, opportunistic activity like this often serves as an early warning of future exploitation,” the company added.

Organizations running Tomcat Manager vulnerable interfaces should ensure strong authentication mechanisms and strict access controls are implemented. It's also recommended to regularly review login activity for any signs of suspicious or unauthorized access.

Back to the list

Latest Posts

Researchers caught embedding hidden AI prompts to sway research reviewers

Researchers caught embedding hidden AI prompts to sway research reviewers

The investigation analyzed English-language preprints published on the research platform arXiv and found concealed AI instructions in 17 papers.
7 July 2025
Brazilian programmer arrested for role in $185 million bank hack

Brazilian programmer arrested for role in $185 million bank hack

João Nazareno Roque, a junior back-end developer at C&M, was allegedly recruited by hackers in a bar in São Paulo.
7 July 2025
APT36 cyber-espionage campaign targeting Indian defense sector via BOSS Linux

APT36 cyber-espionage campaign targeting Indian defense sector via BOSS Linux

More recently, APT36 has shifted its focus to Linux-based environments.
7 July 2025