Attack Landscape H2 2019
Total Page:16
File Type:pdf, Size:1020Kb
ATTACK LANDSCAPE H2 2019 2019 wrapped up with high-impact ransomware attacks on enterprises, as well as continued high rates of attack traffic throughout our global network of honeypots. Honeypot traffic was driven by action aimed at the SMB and Telnet protocols, indicating continued attacker interest in the Eternal Blue vulnerability as well as plenty of infected IoT devices. The end of the year also served as the end of the decade, prompting a look back at where we’ve come since 2010. In this report, we cover the attack traffic seen by our global network of honeypots over the last six months of 2019, as well as malware seen by our customer endpoints throughout the year. We also take a trip down memory lane, revisiting cyber security highlights of the decade. Attack Landscape H2 2019 2 HONEYPOT ATTACK TRAFFIC: WHO’S AFTER WHO? In the first half of 2019, we documented1 a jump in cyber attack traffic to our global network of honeypots from millions of hits to 2.9 billion. In the second half of the year, this frenetic pace of attack traffic continued but at a slightly reduced rate, with 2.8 billion hits to our servers. DDoS attacks drove this deluge, accounting for two thirds of the traffic. Total Global Honeypot Attacks Per Period H1 2019 H2 2019 2900 M 2800 M Our honeypots are decoy servers set up in countries around the world to gauge trends and patterns in the global cyber attack landscape. Because honeypots are decoys not otherwise meant for real world use, an incoming connection registered by a honeypot is either the result of a mistyped IP address, which is rather uncommon, or of the service being found during an attacker’s scans of the network or the internet. 99.9% of traffic to our honeypots is automated traffic coming from bots, H2 2018 malware and other tools. Attacks may come from any sort of infected connected device – a traditional computer, smartwatch or even IoT H2 2017 813 M 546 M toothbrush can be a source. H1 2018 H1 2017 231 M 246 M 1 https://blog.f-secure.com/attack-landscape-h1-2019-iot-smb-traffic-abound/ Attack Landscape H2 2019 3 The country whose IP space played host to the greatest number of attacks was the US, followed by China and Russia. Germany, a regular to the top 10 list, dropped off the list to number 12 with 43 million attacks, while attacks from Ukraine’s IP space were enough to replace Germany in the number four spot. Top Source Countries H2 2019 Top Source Countries H1 2019 USA Top targeted port: 23 556 M China 702 M China Top targeted port: 1433 430 M United States 479 M Russia 22 335 M Russia 381 M Ukraine 445 121 M Germany 155 M Philippines 445 91 M Philippines 129 M United Kingdom 23 80 M Ukraine 92 M Singapore 445 78 M Netherlands 56 M Hong Kong 445 65 M Brazil 52 M France 23 55 M Armenia 45 M Netherlands 22 46 M India 44 M The list of source countries must be taken with a grain of salt, as attackers can route their attacks through proxies in other countries to avoid identification by authorities. In addition, we do not mean to imply that this activity is predominantly nation-state behavior. The majority of these attacks are instigated by cyber criminals who are carrying out DDoS attacks and sending malware for financial gain. Attack Landscape H2 2019 4 Top Destination Countries H2 2019 Top Destination Countries H1 2019 United Ukraine 357 M States 296 M China 239 M Austria 294 M Austria 230 M Ukraine 276 M United United States 190 M Kingdom 185 M Netherlands 185 M Netherlands 160 M Poland 161 M Italy 159 M United Kingdom 136 M Nigeria 119 M Italy 136 M Poland 109 M Hungary 107 M Czechia 104 M Bulgaria 89 M Ireland 94 M Ukraine was the top attack destination, followed by China, Austria and the US. The top aggressors hitting the Ukraine were the United States, the Ukraine itself, and Russia. In the number two spot, the top countries hitting China were China itself, the United States and France, while Austria was hit by China, Russia and the United States. Attacks hitting the United States came from primarily the US, followed by Russia and China. Attack Landscape H2 2019 5 PORTS AND PROTOCOLS Top TCP Ports Targeted H2 2019 SMB port 445 took the position as most-targeted port over the period, indicating that, as in the first half of the year, attackers are still keen to use SMB worms and exploits 445 - SMB 526 M such as Eternal Blue. For example, Trickbot, one of the top spam payloads we observed 23 - Telnet 523 M hitting endpoint devices, leverages Eternal Blue as a means of spreading. There were 526 22 - SSH 490 M million hits on SMB this period, slightly less than the previous period’s 556 million. 1433 - MSSQL 165 M 23145 8.3 M Top sources of SMB traffic 80 - HTTP 3.9 M 20 - FTP 3.3 M 3306 - MySQL 2.6 M 25 - SMTP 1.5 M 3389 - RDP 0.7 M Russia Top TCP Ports Targeted H1 2019 38 M 23 - Telnet 760 M 445 - SMB 556 M China 22 - SSH 456 M 81 M 1433 - MSSQL 260 M 3306 - MySQL 7.4 M Vietnam Venezuela 80 - HTTP 3.8 M 37 M 7547 - CWMP 2.3 M 41 M 25 - SMTP 1.7 M Philippines 20 - FTP 0.6 M 85 M 1 -agent 0.6 M Attack Landscape H2 2019 6 Telnet was a close second with 523 million hits. While that’s a reduction Malware found in honeypots from a high of 760 million in H1 of 2019, it’s a continued indicator that attacks on an ever-growing pool of IoT devices are still going strong. The ease with which attackers can acquire tools such as Mirai, which enable high-volume, low-sophistication attacks, continues to result in the Other:Malware-gen [Trj] compromise of large numbers of these poorly secured devices. Trojan.Linux.Mirai.K!c Backdoor.Linux.asqp Top sources of Telnet hits HEUR:Backdoor.Linux.Mirai.b UK Backdoor.Linux.Mirai.wan 19 M France HEUR:Backdoor.Linux.Mirai.ba 16 M Bulgaria United States 247 M 17 M Armenia Trojan.Linux.Mirai 26 M Most of the malicious traffic we see today is generated by Linux-based malware like Mirai. Attack Landscape H2 2019 7 SSH on port 22 followed with 490 million hits. SSH enables secure remote SQL-related attacks, which represent database attacks common in data breaches access and is commonly associated with full administrative access, as well as as well as attempts to spread cryptocurrency miners, remote access backdoors and IoT devices. Attacks against SSH represent attempts to brute force credentials, ransomware, followed, with China the overwhelming source of attacks on MSSQL. which are too often vendor default credentials of applications and devices. Russia, as usual, played host to the source of most of these attacks. Top Sources of SSH hits Top 10 Passwords used in honeypots admin taZz@23495859 vizxv 12345 default password Russia 263 M 1001chin ttnet Netherlands 29 M sh root Ireland 36 M Germany 29 M A great way to see what attackers are interested in is to check out the list of passwords they use. The everpresent “admin” is predictably in first place. The number two password of the period, “vizxv,” is a default for Dahua DVRs, and two other passwords on the list, “1001chin” and “taZz@23495859” represent the factory defaults for other Bulgaria 14 M embedded devices such as routers. Brute forcing factory default usernames and passwords of IoT devices continues to be an effective method for recruiting these devices into botnets that can be used in DDoS attacks. Attack Landscape H2 2019 8 THE YEAR IN MALWARE When it comes to malware, we turn to our customer endpoints to see what’s happening in the wild. In 2019, we identified four main infection vectors for the malware samples we have observed, most of which are ransomware variants. The most popular delivery method by far was via email and spam, which accounted for 43%. Nearly a quarter were second stage/followup payloads or were delivered manually through brute force or RDP attacks. We also saw delivery through exploit kits and malvertising as well as software cracks, fake installers, and bundled applications. Malware distribution methods 24% 43% Manually Installed / Email/Spam Second Stage Payload 10% Software Cracks / 10% Fake Installers / Exploit Kits / Bundled Applications Malvertising Attack Landscape H2 2019 9 With spam being the delivery method preferred by attackers, we saw three main types Spam payloads of malicious attachments, the most common being PDF attachments. ZIP files were also quite common. Malicious Word and Excel macro documents were also steady throughout the year, mainly serving as downloaders for malicious binaries such as emotet 18.69% Emotet, one of the most prevalent threats of the year. lokibot 12.34% remcos 8.32% Spam attachment file types agenttesla 7.76% Other trickbot 6.26% IMG/ISO 9% 2% azorult 5.23% Excel macro documents PDF formbook 5.23% 34% 7% ursnif 5.14% HTM/HTML hawkaye 4.95% 10% troldesh 4.67% nanocore 4.3% gandcrab 3.83% Word macro documents ZIP 21% 17% Emotet was observed in about 19% of first stage payloads. We also noticed a new trend in ISO and IMG files containing malicious executables. While low Like Emotet, Trickbot is delivered through malicious macro documents and has in volume, the trend was consistent throughout the year, probably because of its effectiveness infostealing capabilities.