PDI’s Weekly Threat Intelligence Summary is compiled by our expert threat analysts, highlighting the key threat events you should know about and offering mitigation recommendations.
Q: What is the Grafana Ghost vulnerability (CVE-2025-4123)?
A: CVE-2025-4123 is a critical flaw in Grafana that enables account takeovers via malicious links; over 46,000 instances remain exposed as of June 2025.
Q: What vulnerabilities should IT teams patch immediately?
A: Critical flaws in Next.js, Kubernetes, Windows CLFS, SAP NetWeaver, and Erlang/OTP should be patched now to prevent high-impact exploits.
Q: Why is ipify[.]org flagged in threat hunts?
A: Threat actors may abuse ipify[.]org to identify infected systems’ public IP addresses, even though it’s commonly used for legitimate purposes.
Over 46,000 Grafana Instances Exposed to Malicious Account Takeover Attacks
Threat Brief (High):
Over 46,000 Grafana Instances Exposed to Malicious Account Takeover Attacks
On June 15, 2025, security experts warned about a critical vulnerability affecting over 46,000 publicly accessible Grafana instances worldwide, with 36% of all public-facing deployments vulnerable to complete account takeover attacks. The vulnerability, tracked as CVE-2025-4123, affects multiple versions of the open-source platform used for monitoring and visualizing infrastructure and application metrics.
According to research analysis, attackers can exploit the vulnerability by luring victims into clicking malicious URLs resulting in arbitrary JavaScript execution. This can lead to user session takeovers, account credential modifications, and server-side request forgery attacks.
CVE-2025-4123, also dubbed “The Grafana Ghost,” was discovered and patched back in May 2025. However, as of this writing, at least 46,506 instances are still running vulnerable versions, leaving them open to potential exploitation.
Organizations should immediately upgrade to patched Grafana versions to mitigate this critical vulnerability.
The Threat Hunting Team at PDI utilizes trends and actionable intelligence to determine which hunts to prioritize. Here are the most significant hunts from the past week, along with the necessary log dependencies and a brief summary of each:
Vulnerabilities
Below are the top five trending vulnerabilities of the week. Trends are determined by criticality, activity, mentions, and exploitability. If your organization uses any of these technologies, you should prioritize patching against these threats.
InfoStealer Malware
PDI’s Threat Intelligence Team is constantly analyzing data from dark web marketplaces to keep a pulse on InfoStealer malware trends. The team identifies and studies these covert threats to arm our clients and guide our threat hunting operations. Our analysis of these cybercriminal exchanges aids in predicting and countering these InfoStealer threats, safeguarding our clients’ digital assets.
Top 5 Infostealers
Ransomware Actors
Ransomware Extortion Published
Q: What is the Grafana Ghost vulnerability (CVE-2025-4123) and why does it matter?
A: CVE-2025-4123 is a critical Grafana flaw that enables account takeovers via malicious links—over 46,000 servers remain exposed as of June 2025.
Q: How many Grafana servers are still vulnerable?
A: More than 46,000 Grafana instances are still open to account takeover and server-side forgery attacks from CVE-2025-4123.
Q: What should organizations do about CVE-2025-4123?
A: To stay secure, upgrade immediately to Grafana 10.4.18+security-01 or newer.
Q: Why is ipify[.]org showing up in threat hunts?
A: Attackers may use ipify[.]org to discover infected machines’ public IPs—despite its legitimate use, it can signal compromise.
Q: What vulnerabilities should be patched right now?
A: Patch critical flaws in Next.js, Kubernetes, Windows CLFS, SAP NetWeaver, and Erlang/OTP to prevent high-impact exploits.
Q: What’s new in InfoStealer malware activity?
A: PDI tracks InfoStealer trends via dark web sources to counter emerging credential theft and data leaks.
Q: How is PDI tracking ransomware threats?
A: PDI monitors ransomware extortion sites for real-time threat insights to help retailers stay ahead of attacks.