F5 Labs, in conjunction with our partner Baffin Bay Networks, set out to research the global attack landscape to get a better understanding of the threat landscape across multiple regions, identify consistencies in attackers and targeted ports, and discover what was unique in each region. In this research series we look at attacks over the same 90-day period in Europe, the United States, Canada, and Australia. This article covers attack traffic destined for European IP addresses from December 1, 2018 through March 1, 2019, and how it compares to the other regions.
- The majority of attacks against Europe came from IP addresses in the Netherlands, followed by the United States, China, Russia, and France (in that order).
- The networks of the top attacking IP addresses were used to target destinations all over the globe. However, the IP addresses used in the attacks against European destinations were not seen attacking other regions in the same period.
- The top attacked ports were 5060 for SIP, 445 for Microsoft Server Message Block (SMB), and 2222 for non-standard SSH access—very similar to what we saw in Australia and Canada.
- Europe received more attacks from within its own geographic region than any other region.
Top Attacking Countries
Systems deployed in Europe are targeted by IPs all over the world. Looking at the source countries of attacks by region on a global heatmap, the source countries of European attacks are very similar to source countries of attacks against Australia and Canada. The US receives far fewer attacks from European IPs than Europe, Canada, or Australia does.
The Netherlands was the top source traffic country of attacks against European systems from Dec 1, 2018 through March 1, 2019. IPs in the Netherlands launched 1.5 times more attacks against European systems than IPs in the US or China, and 6 times more attacks than IPs in Indonesia in the tenth position.
Top Attacking Networks (ASNs)
The Netherlands-based network of HostPalace Web Solutions (ASN 133229) launched the largest number of attacks destined for European IP addresses, followed by France’s Online SAS (ASN 12876), and NForce Entertainment (ASN 43350), also from the Netherlands. All three of these companies are web hosting providers whose networks routinely show up in our top threat actor networks lists.
To get a sense of attack volume by ASN, Figure 2 shows the top 25 ASNs in ranking order of attack count.
The following table shows the top 50 attacking ASNs in order of highest to lowest number of attacks. Seventy-two percent of these ASNs are Internet service providers, 28% are web hosting providers.
|133229||HostPalace Web Solution PVT LTD||Netherlands||Hosting|
|43350||NForce Entertainment B.V.||Netherlands||ISP|
|56005||Henan Telcom Union Technology Co., LTD||China||Hosting|
|17974||PT Telekomunikasi Indonesia||Indonesia||ISP|
|4837||CNCGROUP China169 Backbone||China||ISP|
|44244||Iran Cell Service and Communication Company||Iran||ISP|
|3462||Data Communication Business Group||Taiwan||ISP|
|197207||Mobile Communication Company of Iran PLC||Iran||ISP|
|58271||FOP Gubina Lubov Petrivna||Ukraine||Hosting|
|4766||Korea Telecom||South Korea||ISP|
|12880||Information Technology Company (ITC)||Iran||ISP|
|18403||The Corporation for Financing & Promoting Tech...||Vietnam||ISP|
|6739||Vodafone Ono, S.A.||Spain||ISP|
|45090||Shenzhen Tencent Computer Systems Company Limited||China||ISP|
|206792||IP Khnykin Vitaliy Yakovlevich||Russia||ISP|
|23650||CHINANET jiangsu province backbone||China||ISP|
|9829||National Internet Backbone||India||ISP|
|31549||Aria Shatel Company Ltd||Iran||ISP|
|8151||Uninet S.A. de C.V.||Mexico||ISP|
|49877||RM Engineering LLC||Russia||Hosting|
|9299||Philippine Long-Distance Telephone Company||Philippines||ISP|
|4812||China Telecom (Group)||China||ISP|
|4808||China Unicom Beijing Province Network||China||ISP|
|16125||UAB Cherry Servers||Lithuania||Hosting|
|29073||Quasi Networks LTD.||Netherlands||Hosting|
|9498||BHARTI Airtel Ltd.||India||ISP|
|7922||Comcast Cable Communications, LLC||United States||ISP|
|44050||Petersburg Internet Network ltd.||Russia||ISP|
|60781||LeaseWeb Netherlands B.V.||Netherlands||Hosting|
|393406||Digital Ocean, Inc.||United States||Hosting|
|43754||Asiatech Data Transfer Inc PLC||Iran||Hosting|
|23969||TOT Public Company Limited||Thailand||ISP|
|18881||TELEFÔNICA BRASIL S.A||Brazil||ISP|
|16509||Amazon.com, Inc.||United States||Hosting|
|55577||Atria Convergence Technologies pvt ltd||India||ISP|
Note that Quasi Networks (ASN 29073), a known bulletproof hosting provider that did not respond to abuse complaints, has been “unassigned” as of March 24, 2019.
Top Attacking IP Addresses
Whereas we see consistency in the networks being used to launch attacks, the IP addresses used to target systems in Europe were unique, with the exception of 184.108.40.206 and 220.127.116.11. This can indicate that attackers are using specific (hosting) networks from which they know they can successfully launch attacks (and spinning up new systems or getting dynamic IPs from which to launch attacks), or they are exploiting vulnerabilities in systems resolving to ISPs, like residential or commercial IoT devices, and keep using new systems. Both scenarios result in new IPs from the same networks. The chart in Figure 4 shows the top 50 IP addresses attacking destinations in Europe from Dec 1, 2018 through March 1, 2019.
Organizations should check their network logs for connections from these IP addresses, and the owning networks should investigate these IP addresses for abuse.
|Source IP||ASN Organization||ASN||ISP||Country|
|18.104.22.168||Henan Telcom Union Technology Co., LTD||56005||CNISP-Union Technology (Beijing) Co.||China|
|22.214.171.124||MediaServicePlus LLC||50113||MediaServicePlus LLC||Russia|
|126.96.36.199||HostPalace Web Solution PVT LTD||133229||Estro Web Services Private Limited||Netherlands|
|188.8.131.52||HostPalace Web Solution PVT LTD||133229||Estro Web Services Private Limited||Netherlands|
|184.108.40.206||Online S.a.s.||12876||Free SAS||France|
|220.127.116.11||UGB Hosting OU||206485||Russia|
|18.104.22.168||HostPalace Web Solution PVT LTD||133229||Estro Web Services Private Limited||Netherlands|
|22.214.171.124||OVH SAS||16276||OVH Hosting||Canada|
|126.96.36.199||MediaServicePlus LLC||50113||MediaServicePlus LLC||Russia|
|188.8.131.52||Online S.a.s.||12876||Free SAS||France|
|184.108.40.206||OVH SAS||16276||OVH Hosting||Canada|
|220.127.116.11||HostPalace Web Solution PVT LTD||133229||Estro Web Services Private Limited||Netherlands|
|18.104.22.168||Online S.a.s.||12876||Free SAS||France|
|22.214.171.124||Online S.a.s.||12876||Free SAS||France|
|126.96.36.199||Online S.a.s.||12876||Free SAS||France|
|188.8.131.52||Online S.a.s.||12876||Free SAS||France|
|184.108.40.206||HostPalace Web Solution PVT LTD||133229||Estro Web Services Private Limited||Netherlands|
|220.127.116.11||HostPalace Web Solution PVT LTD||133229||Estro Web Services Private Limited||Netherlands|
|18.104.22.168||Online S.a.s.||12876||Free SAS||France|
|22.214.171.124||FOP Gubina Lubov Petrivna||58271||FOP Gubina Lubov Petrivna||Ukraine|
|126.96.36.199||NForce Entertainment B.V.||43350||NFOrce Entertainment B.V.||Netherlands|
|188.8.131.52||NForce Entertainment B.V.||43350||NFOrce Entertainment B.V.||Netherlands|
|184.108.40.206||NForce Entertainment B.V.||43350||NFOrce Entertainment B.V.||Netherlands|
|220.127.116.11||NForce Entertainment B.V.||43350||NFOrce Entertainment B.V.||Netherlands|
|18.104.22.168||NForce Entertainment B.V.||43350||NFOrce Entertainment B.V.||Netherlands|
|22.214.171.124||NForce Entertainment B.V.||43350||NFOrce Entertainment B.V.||Netherlands|
|126.96.36.199||NForce Entertainment B.V.||43350||NFOrce Entertainment B.V.||Netherlands|
|188.8.131.52||Korea Telecom||4766||LG DACOM Corporation||Republic of Korea|
|184.108.40.206||NForce Entertainment B.V.||43350||NFOrce Entertainment B.V.||Netherlands|
|220.127.116.11||OVH SAS||16276||OVH Hosting||Canada|
|18.104.22.168||NForce Entertainment B.V.||43350||NFOrce Entertainment B.V.||Netherlands|
|22.214.171.124||Online S.a.s.||12876||Free SAS||France|
|126.96.36.199||NForce Entertainment B.V.||43350||NFOrce Entertainment B.V.||Netherlands|
|188.8.131.52||OVH SAS||16276||OVH Hosting||Canada|
|184.108.40.206||Online S.a.s.||12876||Free SAS||France|
|220.127.116.11||HostPalace Web Solution PVT LTD||133229||Estro Web Services Private Limited||Netherlands|
|18.104.22.168||NForce Entertainment B.V.||43350||NFOrce Entertainment B.V.||Netherlands|
|22.214.171.124||NForce Entertainment B.V.||43350||NFOrce Entertainment B.V.||Netherlands|
|126.96.36.199||OVH SAS||16276||OVH SAS||France|
|188.8.131.52||Telemost LLC||42590||Telemost LLC||Ukraine|
|184.108.40.206||HostPalace Web Solution PVT LTD||133229||Estro Web Services Private Limited||Netherlands|
|220.127.116.11||Online S.a.s.||12876||Free SAS||France|
|18.104.22.168||Online S.a.s.||12876||Free SAS||France|
|22.214.171.124||NForce Entertainment B.V.||43350||NFOrce Entertainment B.V.||Netherlands|
|126.96.36.199||Online S.a.s.||12876||Free SAS||France|
Top Targeted Ports
Looking at the targeted ports gives us a sense of the types of systems the attackers are after. In Europe, the top attacked port was 5060, used by the SIP service for VoIP connectivity to phones and video conferencing systems. This is routinely a top attacked port when looking at attack traffic against a specific location during global dignitary events, such as when President Trump met with Kim Jung Un in Singapore in 2018 and with Vladimir Putin in Helsinki in 2018. The second most-attacked port in Europe is Microsoft SMB port 445, followed by port 2222, which is commonly used as a non-standard SSH port, but is also used by Industrial Control Systems.
Organizations should continually run external vulnerability scans to discover what systems are exposed publicly, and on which specific ports. Any systems exposed publicly with the top attacked ports open should be prioritized for vulnerability management. A lot of the attacks we see on ports supporting access services like SSH are brute force, so any public login page should have adequate brute force protections in place. Database ports like 1433 and 3306, which should not be exposed publicly, are top attacked ports. Organizations should do their best to protect databases and not expose them directly to the Internet. Furthermore, logs should be reviewed for any top attacking IP matches. If you are experiencing attacks from any of these top IP addresses, you should submit abuse complaints to the owners of the ASNs and ISPs so they can shut down the attacking systems.
For those interested in IP blocking, it can be troublesome not only to maintain large IP blocklists, but also to block IP addresses within ISPs that offer Internet service to residences that might be customers. In these cases, the attacking system is likely to be an infected IoT device that the resident doesn’t know is infected, and it likely won’t get cleaned up. Blocking traffic from entire ASNs or an entire ISP can be problematic for the same reason—blocking their entire network would block all of their customers from doing business with you. Unless of course it’s an ISP supporting a country you don’t do business with. In that case, geolocation blocking at a country level can be effective way to reduce a large amount of attack traffic and save your systems the unnecessary processing. For this reason, it is best to drop traffic based on the attack pattern on your network and web application firewalls.
We will continue to monitor global attacks and analyze at a regional level quarterly, and include the Asia-Pacific, Middle East and North Africa, and Latin American regions moving forward. If you are an implicated ASN or ISP, please reach out to us at F5LabsTeam@F5.com and we’ll be happy to share further information with you.