Figure 1: Trendline of attacks against Finland

To get a sense of how infrequently Finland is attacked, we compared a week of attacks from 7/10/2018 – 7/16/2018, against what Canada received in that same time period (Canada is routinely a top 10 attacked country, but not typically in the top 3–5). Aside from the attacks on 7/12 and 7/14, Finland doesn’t even register on the chart.

Figure 2: Finland attack traffic in comparison to Canada

Top Attack Source Countries

China is typically the top attacking country on a regular basis (see 5/12/2018 – 7/13/2018 in the table below). This was also the case during the spike in attack traffic around the Trump-Putin meeting (7/14/2018 – 7/16/2018), however during that time, China launched a higher percentage of the attacks than normal. The US was consistently in the number two attacking position. Russia fell from its #3 baseline position to #5 during the attack spike. Given that the targeted meeting included Putin, it is not surprising that Russia would back off their attacks. Noticeably, Italy and Germany jumped from their 13th and 14th positions into the 4th and 7th positions respectively during the Trump-Putin traffic spike.

Top 20 Finland Attacking Countries
5/12/2018 – 7/13/2018 7/14/2018 – 7/16/2018
Pos # Country % of Total Pos # Country % of Total
1 China 29% 1 China 34%
2 United States 14% 2 United States 12%
3 Russia 14% 3 France 9%
4 France 10% 4 Italy 8%
5 Canada 4% 5 Russia 7%
6 United Kingdom 4% 6 Netherlands 5%
7 Netherlands 4% 7 Germany 4%
8 Vietnam 3% 8 Vietnam 3%
9 Republic of Korea 3% 9 Canada 3%
10 Hong Kong 2% 10 United Kingdom 3%
11 India 2% 11 India 2%
12 Indonesia 2% 12 Greece 2%
13 Italy 2% 13 Indonesia 1%
14 Germany 1% 14 Republic of Korea 1%
15 Brazil 1% 15 Brazil 1%
16 Singapore 1% 16 Poland 1%
17 Ukraine 1% 17 Singapore 1%
18 Taiwan 1% 18 Mexico 1%
19 Thailand 1% 19 Ukraine 1%
20 Poland 1% 20 Hong Kong 1%

Attacking Networks

F5 Labs continually monitors top attacking networks. A handful of networks shown in the table below (highlighted in yellow) are not consistently top threat actor networks (see F5 Labs IoT Hunt research series). This indicates consistency of threat actors, and the networks they choose to launch their attacks from.

ChinaNet was the top attacking network both before the Trump-Putin meeting and during the attack spike. ChinaNet is also consistently at the top of the threat actor network list globally. It is our opinion that since attacks from China go unpunished, threat actors from around the world feel confident to use their networks to launch attacks, as well.

Pos # ASN Name Country % of Total Pos # ASN Name Country % of Total
1 Chinanet China 19% 1 Chinanet China 34%
2 OVH SAS France 18% 2 Aruba S.p.A. Italy 11%
3 JSC Internet-Cosmos Russia 11% 3 OVH SAS France 10%
4 Chinanet (SiChuan DC) China 9% 4 CNCGROUP China169 Backbone China 7%
5 Online S.a.s. France 7% 5 Online S.a.s. France 7%
6 Henan Telcom Union Technology Co., LTD China 5% 6 Paradise Networks LLC US 6%
7 Kassir, Ltd. Russia 4% 7 myLoc managed IT AG Germany 3%
8 CNCGROUP China169 Backbone China 3% 8 Forthnet Greece 2%
9 EDIS GmbH Austria 2% 9 Netversor GmbH Germany 2%
10 Korea Telecom Korea 2% 10 ChinaNet (Jiangx DC) China 2%
11 Digital Ocean, Inc. Netherlands 2% 11 Hostkey B.v. Netherlands 2%
12 Aruba S.p.A. Italy 2% 12 HostPalace Web Solution PVT LTD India 2%
13 VNPT Corp Vietnam 2% 13 VNPT Corp Vietnam 2%
14 ColoCrossing US 2% 14 Digital Ocean, Inc. Netherlands 2%
15 MediaServicePlus LLC Russia 2% 15 NForce Entertainment B.V. Netherlands 1%
16 Henan Mobile Communications China 2% 16 MediaServicePlus LLC Russia 1%
17 PT Telekomunikasi Indonesia Indonesia 2% 17 Wowrack.com US 1%
18 B2 Net Solutions Inc. Canada 2% 18 PT Telekomunikasi Indonesia Indonesia 1%
19 Wowrack.com US 2% 19 IT Expert LLC Ukraine 1%
20 Hostkey B.v. Netherlands 2% 20 PJSC Rostelecom Russia 1%

Attacked Ports

The top 5 attacked ports before and during the Finland attack spike were SSH, SMB, SIP, HTTP, and MySQL. SSH brute force attacks are commonly used to exploit systems and IoT devices online. They accounted for the majority of the attacks against Finland and are something we see consistently across global attack traffic. This is why we choose to publish the top 50 admin credentials used in SSH brute force attacks in our Hunt for IoT report series.

Note: We have no data to suggest the attacks against Finland were successful. That would require access to the targeted systems, which is illegal. We collect attack data and publish the threat intelligence in an effort to educate the security community on attackers’ efforts and targets so they can protect themselves.

5/12/2018 – 7/13/2018 7/14/2018 – 7/16/2018
Pos # Port Protocol % of Total Pos # Port Protocol % of Total
1 22 SSH 50% 1 22 SSH 62%
2 5060 SIP 21% 2 445 SMB 12%
3 445 SMB 16% 3 5060 SIP 10%
4 80 HTTP 4% 4 80 HTTP 6%
5 3306 MySQL 3% 5 3306 MySQL 4%
6 1433 SQL 3% 6 1433 SQL 2%
7 23 Telnet 1% 7 5061 SIP-TLS 1%
8 8080 HTTP < 1% 8 8090 HTTP 1%
9 3389 RDP < 1% 9 23 Telnet 1%
10 25 SMTP < 1% 10 3389 RDP < 1%
11 21 FTP < 1% 11 8291 TCP < 1%
12 8291 TCP < 1% 12 25 SMTP < 1%
13 8088 TCP < 1% 13 443 HTTPS < 1%
14 443 HTTPS < 1% 14 53 DNS < 1%
15 7547 TCP < 1% 15 7547 TCP < 1%
16 81 UDP/TCP < 1% 16 21 FTP < 1%
17 9200 UDP/TCP < 1% 17 135 RCP < 1%
18 53 DNS < 1% 18 8080 HTTP < 1%
19 135 RCP < 1% 19 9200 UDP/TCP < 1%
20 8089 TCP < 1% 20 81 UDP/TCP < 1%

The common use of the ports shown in the table below is an indicator of what the attackers are after. IoT devices are moving to SSH for remote administration because it’s more secure than Telnet—although “protecting” with default admin credentials doesn’t secure anything. Just check out the top attacked admin credentials list, which typically includes default username and passwords that are the name of the manufacturer or software provider. The SIP protocol, although in the top 3, did not account for a large percentage of the attacks in the Finland attacks. Since we are not aware of a SIP vulnerability that would give attackers instant access to a phone inside a meeting room, we’re not surprised SSH attacks accounted for the majority of the attacks surrounding the Trump-Putin meeting.

Port Protocol Description
21 FTP File Transfer Protocol (FTP)
22 SSH SSH remote management port
23 Telnet Remote management port
25 SMTP Simple Message Transfer Protocol (SMTP)
53 DNS DNS and facetime
80 HTTP HTTP
81 UDP/TCP Alternate web server port for host-host communication
135 RCP Remote Procedure Call (RCP)
443 HTTPS HTTPS
445 SMB Server Message Block (SMB) port
1433 SQL SQL database port
3306 MySQL MySQL database port
3389 RDP Remote Desktop Protocol
5060 SIP Clear text Session Initiation Protocol (SIP) port commonly used by VoIP phones and video conferencing systems
5061 SIP-TLS Secure SIP
7547 TCP TCP port used by ISP’s to remotely manage routers via the TR-069 protocol
8080 HTTP Alternate web server port often used for a proxy or caching, some routers use for remote management.
8088 TCP Apple software update and Lord of the Rings game
8089 TCP Mac OS X Web email rules, Splunk management port, MyDiskServer
8090 HTTP Alternate web server port often used for Webcams
8291 TCP Remote management port commonly used by MikroTik routers
9200 UDP/TCP WAP Connectionless Wireless Session Protocol

Conclusion

Using technology—most specifically, IoT devices—to target people of interest or spy on large portions of populations isn’t new. This practice should be expected, but we write the stories to prove a point about the necessity for security that impacts everyone from the President of the United States to an unassuming civilian standing by a hacked wireless IP camera. You don’t need a smart home to be personally impacted by insecure technology. Every business is impacted by insecure technology as they become attack pivots, relays, and botnet hosts that attack businesses, which drives up the costs of doing business for everyone.

All businesses should be securing all of their Internet connected infrastructure. All? This spans from servers in a rack in a data center (and everything installed on them), to security cameras, wireless access points, phone systems (including mobile devices), video conferencing systems, entertainment systems, TVs, DVRs, HVAC systems, fish tanks, vending machines, etc. Every “thing” that is Internet-connected.

At a minimum, securing means:

  • Protect remote administration to any device on your network with a firewall, VPN, or restrict to a specified management network. Never allow open communication to the entire Internet.
  • For home IoT, leverage network address translation (NAT) if you can’t install a home firewall (note that home firewalls have also been targeted by thingbots).
  • Always change vendor default administration credentials.
  • Stay up to date with any security patches released by the manufacturer.

Authors & Contributors

Sara Boddy (Author)

,

Justin Shattuck (Author)

,