The Mystery OAST Host Behind a Regionally Focused Exploit

The Mystery OAST Host Behind a Regionally Focused Exploit Operation Source: www.vulncheck.com/blog/myst… Out-of-band application security testing (OAST) endpoints are common in large-scale exploit scanning, with most threat actors favouring public services such as oast.fun because they require no dedicated infrastructure. That is why callbacks to detectors-testing.com stood out in VulnCheck’s Canary Intelligence telemetry. The activity suggested an attacker was operating a private OAST domain as part of a regionally targeted exploit campaign. VulnCheck observed approximately 1,400 exploit attempts tied to this infrastructure, covering more than 200 CVEs. Although most payloads resembled standard Nuclei templates, the attacker’s hosting decisions, tooling, and regional focus deviated from typical OAST behaviour.

Edward Kiledjian @ekiledjian