Ukrainian Network FDN3 Conducts Widespread Brute-Force Attacks on SSL VPN and RDP Devices

Date: Sep 02, 2025
Category: Cyber Attack / Botnet

Cybersecurity experts have identified a Ukrainian IP network engaging in extensive brute-force and password spraying campaigns against SSL VPN and RDP devices between June and July 2025. The operations are traced back to the Ukraine-based autonomous system FDN3 (AS211736), according to French cybersecurity firm Intrinsec. “We have high confidence that FDN3 is part of a larger malicious infrastructure that includes two other Ukrainian networks, VAIZ-AS (AS61432) and ERISHENNYA-ASN (AS210950), as well as a Seychelles-based system, TK-NET (AS210848),” the report stated. “All of these were allocated in August 2021 and frequently exchange IPv4 prefixes to bypass blocklisting and sustain their abusive operations.” AS61432 currently announces a single prefix, 185.156.72[.]0/24, while AS210950 has two prefixes: 45.143.201[.]0/24 and 185.193.89[.]0/24. These autonomous systems were allocated in May…

Ukrainian Network FDN3 Targets SSL VPN and RDP Devices with Coordinated Brute-Force Attacks

On September 2, 2025, cybersecurity experts reported significant brute-force and password spraying campaigns linked to a Ukrainian IP network known as FDN3 (AS211736). These attacks were specifically aimed at SSL VPN and Remote Desktop Protocol (RDP) devices during a concentrated period from June to July 2025. The network’s origins trace back to an autonomous system in Ukraine, highlighting a concerning trend in the tactics employed by cyber adversaries in the region.

According to findings released by the French cybersecurity firm Intrinsec, there is a strong indication that FDN3 is part of a larger infrastructure that includes two additional Ukrainian networks, VAIZ-AS (AS61432) and ERISHENNYA-ASN (AS210950), as well as a Seychelles-based system known as TK-NET (AS210848). All components of this malicious infrastructure were allocated in August 2021, and they have been found to frequently exchange IPv4 prefixes among themselves. This collaboration allows them to circumvent blocklisting measures and maintain their illicit activities.

Specifically, AS61432 currently broadcasts a single prefix, 185.156.72[.]0/24, while AS210950 operates two prefixes, 45.143.201[.]0/24 and 185.193.89[.]0/24. The presence of these networks raises alarm over the potential scale of coordinated cyber operations that could impact numerous organizations relying on secure communication channels.

The primary targets of these attacks are SSL VPNs and RDP devices, which are critical for remote access, particularly in an increasingly digital work environment. Given the rise in remote work, attackers often focus on these services due to their importance in business continuity. If successful, such brute-force attacks can lead to unauthorized access to sensitive data and critical business systems.

From a tactical perspective, the activities associated with FDN3 align with several adversary techniques outlined in the MITRE ATT&CK framework. Initial access could be achieved through password spraying, utilizing compromised credentials to infiltrate systems. Furthermore, persistence is a key concern, as attackers may establish backdoors that allow continued access even after initial detection. Privilege escalation techniques could also come into play, enabling attackers to exploit small entry points to gain broader access within an organization’s infrastructure.

As businesses navigate the complexities of cybersecurity threats, the case of FDN3 emphasizes the need for robust security protocols and diligent monitoring of remote access technologies. Organizations must remain vigilant, implementing strong authentication mechanisms and staying informed about potential risks associated with VPN and RDP services. With the increasing sophistication of cyber-attacks, understanding the tactics employed by adversaries can empower business owners to adopt proactive measures against potential breaches.

The implications of this coordinated attack are extensive, highlighting the vulnerabilities inherent in remote access solutions. As the cyber landscape continues to evolve, collaboration between cybersecurity professionals and informed decision-making by business leaders will be crucial in thwarting such threats.

Source link