Feeds

Gaping network port with easy-to-guess password? You ARE the 79%

Nearly all 2011 hack victims selected themselves

Securing Web Applications Made Simple and Scalable

High-profile, sophisticated hackers stealing industrial secrets tend to hog the headlines but opportunistic hackers searching for routine vulnerabilities can create a world of hurt for victims, often small businesses.

Verizon’s Data Breach Investigations Report found that 79 per cent of attacks during 2011 were classified as ‘opportunistic’, where the victim is not pre-selected as a target. Victims are selected purely because they exhibit basic weaknesses that are easy to exploit. Over the last two months, the Verizon RISK team has been examining these type of attacks, looking at the source and characteristics of opportunistic attacks.

Most of the opportunistic attacks started after the miscreants scanned a few well-known ports. The most commonly scanned ports were: TCP port 3389, Microsoft’s Remote Desktop Protocol (RDP), MS SQL server (port 1433) and VNC for remote desktop, said the researchers.

Jay Jacobs, principal at Verizon’s RISK Team, said opportunistic hackers are looking for open network ports with default or easy to guess passwords. If these two conditions were met, then attackers either planted custom malware on compromised systems or used them to relay spam. the custom malware often contains key-logging software but is only occasionally derived from banking Trojan toolkits, such as Zeus.

The Verizon team also looked at the geographical location of attackers. Around 21 per cent of opportunistic attacks came from IP addresses in China. Chinese hackers prefer to go after remote access services such as RDP or MS SQL. The next most common source of attack traffic was the the US (associated with 14 per cent of attacks). IP addresses originating from the US generally prefer to target spamming/proxy services like the TDSS Proxy or McAfee’s port 6515, the researchers said.

Other common sources of attack include the Russian Federation (8 per cent) and South Korea (4 per cent).

Jacobs said in some cases, Eastern European crooks might have been scanning for victims using compromised machines in China, so Verizon's figures should only be taken as indicative rather than a precise breakdown of the actual physical location of opportunistic hackers. He said that a mix of different criminal hacking groups – from small to large and well organised – were involved in the attacks.

Most of the attacks are profit-orientated. Jacobs said that hacktivists such as Anonymous were generally interested in targeted attacks.

Opportunistic attackers use very simple techniques, looking for a single vulnerability across many hosts before moving on if they don't immediately locate a problem (97.4 per cent of IP addresses that sent packets only checked one port). Hackers of this ilk latch onto the first target that is susceptible to the single style of attack they use. Opportunistic hackers typically use automated tools to carry out these scans, which produce a huge treasure trove of information which most hackers are ill-equipped to handle.

Jacobs said defending against this type of attack is not particularly difficult, even for small businesses. Keeping unnecessary services off the internet and ensuring that strong passwords are used throughout an organisation are probably enough to keep small business safe from opportunistic attacks. Since basic security controls and practices are enough to block opportunistic hackers their victims are more likely to be small businesses, without any security policies in place.

"Opportunistic hackers are the internet equivalent of car thieves who walk through a parking lot trying car doors," Jacobs said. "Although they might appear to be mundane, the impact of these financially motivated smash and grab attacks on victims can be catastrophic." ®

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
NIST told to grow a pair and kick NSA to the curb
Lrn2crypto, oversight panel tells US govt's algorithm bods
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.