Threat Research

Oh, Behave! Who Made It to Rapid7 Labs' Naughty List(s) in 2019?

|Last updated on Jan 24, 2024|1 min read
LinkedInFacebookX
Oh, Behave! Who Made It to Rapid7 Labs' Naughty List(s) in 2019?

We all know jolly ol’ St. Nick just loves lists, which is an attribute he shares with the researcher elves here at Rapid7 Labs. Unlike Sir Kringle, our lists aren’t focused on normalizing the inevitability of a pervasive surveillance state nor intended to establish the acceptance of—and participation in—a global social credit system, but have more to do with cataloging (mostly) naughty aspects of internet infrastructure and activity through our core research platforms, Projects Sonar and Lorelei.

The Labs team thought it might be fun to give folks a glimpse into who made it to some of our naughtiest lists in 2019 with a “year in review” look at insights gleaned from both our research projects.

The top 20 ‘naughtiest’ countries

There are many ways to track attacker activity, one of which is to look at which source country IPv4 assigned network blocks that traffic comes from. This doesn’t mean that said nation state is performing the attacking, just that poorly secured devices or servers and/or deliberate attacker infrastructure just happen to be found sitting on addresses in a country’s IPv4 blocks.

Our first two lists came from making distributions of the total and unique (by source IPv4 address) connections from each country. We plotted a dot for the counts for each day, for the entire year, which produced these ornament-like views of who led the top of the naughty charts for overall activity:

2019-heisenberg-top-20-countries.png

Daily Total Count Summaries

CountryMeanMedianMax
South Korea3,767,28063,062474,401,326
Italy2,893,13760,906250,177,457
Vietnam2,059,6891,152,24013,059,591
Russia1,912,321647,86611,929,010
Netherlands1,908,403293,01056,580,766
United States1,766,281877,33225,671,173
India1,533,114662,44011,326,275
China1,371,649447,37918,696,263
Japan1,223,30129,43837,018,858
Germany1,194,439307,20339,021,995
Brazil1,133,831430,0588,508,665
Ireland1,116,8731,366,4783,312,785
Indonesia1,116,656607,5467,276,011
Ukraine746,586111,5196,751,413
Taiwan672,776194,7805,970,135
Thailand623,691347,9533,813,670
Turkey622,893170,43812,959,915
Venezuela344,164108,7153,039,704
Mexico324,235144,3122,431,246
France312,848173,2546,646,730

Italy usually isn’t in the overall top 20 by total volume, nor has it ever been in the No. 2 position for the year in our four-year history of running our Lorelei honeypot network. We’ll talk about just what IPv4s in Italy (and the Netherlands, since they are making an unusual Top 5 appearance as well) were doing to achieve this top spot in an upcoming report, along with what’s going on with some of those huge max count numbers..

South Korea and Vietnam both have scads of horribly configured Internet of Things (IoT) devices, which make them ideal sources of botnet and other attacker activity. Russia and China are, well, Russia and China, and both the U.S. and India are hotbeds of similarly horribly configured physical and virtual hosts.

We continue our Christmas ornament distribution plots with a similar look at unique source IPv4 addresses from each country:

2019-heisenberg-daily-unique-top-20-countries.png

Daily Unique Count Summaries

CountryMeanMedianMax
China15,15214,96137,250
Vietnam8,6669,27013,015
United States6,9025,841133,100
Brazil6,6476,74212,275
India6,0766,4238,672
Russia5,4385,5047,623
Indonesia5,2215,6527,508
Taiwan3,2242,9427,218
Iran2,6412,06410,350
Thailand2,3772,3696,090
Egypt1,9261,3145,718
South Korea1,8451,7735,029
Turkey1,7811,6389,688
Ukraine1,4551,4782,458
Mexico1,3621,3253,245
France1,2911,2724,842
Venezuela1,2661,2822,067
Italy1,0851,0343,989
Hong Kong SAR China1,07797423,988
Germany1,04977279,167

It’s amazing that so few nodes can generate such high volumes of activity, yet we still have no single authority that can do much of anything about it.

The most common unique vs. total activity usually hits a sweet spot of around 100 nodes to 10,000 connections across our fleet of ~250 honeypots (points are colored by date similar to the previous charts, with recent activity in dark orange; the density layer shows the most concentrated hot spots of port/pair counts with fitted GAM curve on top):

unique-vs-total-daily-connections.png

(This also happens to be the exact path Kris Kringle takes across the Milky Way in his sleigh.)

But just what were these sources going after? For that, we need to take a look at another list.

The usual [naughty] suspects

Anyone who has ever run even a single honeypot knows there are a handful of ports, protocols, and services that most opportunistic attackers seem to gravitate toward. Whether it be brute forcing/credential stuffing SSH, Telnet, or RDP, holding compromised SMB territory with EternalBlue attacks, or trying to slurp up records from MySQL, Postgres, MS SQL and other databases, opportunistic attackers are just that: opportunistic and always on the lookout for new, pwnable quarry. We call these ports+protocol+service the “usual suspects,” and the members of this year’s suspects list of most naughty activity looks a bit different than 2018.

We’ll first return to our ornament distribution plots to look at this year’s top 20 usual suspects by daily unique sources and daily total connections:

2019-heisenberg-daily-unique-top-20-usual-suspects.png

2019-heisenberg-daily-total-top-20-usual-suspects.png

A few items stand out on these charts.

First, we see DNS over TLS activity making it into both top 20 usual suspects lists for the first time ever. In fact, it slid into the Top 5 by total counts due to a series of campaigns starting around midyear. We talked a bit about this in our 2019 Q3 Threat Report and will be taking a deeper dive in our 2019 Q4 and year-end round up threat report (remember, patience is a virtue and helps keep you on Santa’s “nice” list).

Next, we note that when we cycled our honeypot nodes throughout the year, we were assigned IP addresses that used to be part of the Ethereum network, but also caught some interesting activity there, which we’ll likely expand on in the aforementioned forthcoming threat report.

The star of the show, however, is MS SQL Server compromise activity that began in October right after stories about a possible backdoor emerged. While we regularly see credential stuffing/brute forcing (and other activity) against our MS SQL Server honeypots, the October surprise ended up becoming the “new normal” for MS SQL Server activity as seen here in this non-log10-scaled chart:

2019-heisenberg-daily-total-connections.png

If you’re wondering if there’s anything wrong with your eyes, fear not. You’re definitely seeing several orders of magnitude of increased activity that quite literally dwarfed all previous activity (even if you sum up all of the activity the previous year!).

Now, let’s turn to Project Sonar to see who is putting naughty things on the internet.

Naughty ports/protocols/services

Microsoft SMB

While we, thankfully, continue to see a slow but steady drop in counts of hosts exposing SMB to the internet (due, in part, to more ISPs blocking inbound 139 and 445 connections) there are still quite a few of them out there:

hosts-2019-responding-microsoft-smb-scans.png

Just looking at port SMB port 445 hosts, the U.S. is still doing its best to make SMB great again and continues to hold its place at the top of the charts:

SMB Port 445 Host Counts by Country • Dec. 13, 2019 Study

Country# SMB Hosts
United States255,485
Russia92,862
Germany31,376
Hong Kong28,838
Japan27,445
Taiwan23,724
Brazil14,544
United Kingdom11,724
France10,398
India9,749
Canada9,455
China8,741
United Arab Emirates8,149
South Africa7,903
Netherlands7,197
Italy6,957
Turkey6,109
Mexico5,489
Poland5,381
Singapore4,691
Spain4,531
Ukraine4,366
Finland4,191
Argentina4,171
Australia3,978

There’s no legitimate reason to run SMB on the internet in 2019 (or beyond), and these servers do not just sprout up and host themselves. They live somewhere, and while most are spread across a vast array of autonomous systems, there are some network/hosting providers that house between 1% and 10% of these naughty servers:

SMB Port 445 Hosting Organizations/Networks • Dec. 13, 2019 Study

Hosting Org# SMB Hosts%
Rostelecom73,07310.76%
EGIHosting53,2587.85%
CNSERVERS LLC40,2115.92%
PEG TECH INC35,9825.30%
Eonix Corporation18,0842.66%
Data Communication Business Group17,3172.55%
ICIDC NETWORK15,0162.21%
Enzu Inc10,3511.52%
QuickPacket, LLC10,1601.50%
DediPath9,7311.43%
Input Output Flood LLC9,4191.39%
Tencent Building, Kejizhongyi Avenue9,1841.35%
NTT Communications Corporation8,5081.25%
Emirates Telecommunications Corporation8,0541.19%
MULTACOM CORPORATION7,4011.09%
Hetzner Online GmbH6,8761.01%

Telnet (Port 23)

The last naughty port/service/protocol we’ll look at is SMB’s older sibling: Telnet. There are far more secure and robust protocols to use than Telnet to talk to servers or devices over the internet, yet we still see just over 3 million of these nodes in each scan:

hosts-2019-responding-to-telnet-scans.png

China continues to lead the pack, mostly due to the sheer number of routers and VoIP devices exposing Telnet (the same is true for Japan, Brazil, and most EU countries on the Telnet list):

Telnet Port 23 Host Counts by Country • Dec. 13, 2019 Study

Country# Telnet Hosts
China735,043
United States310,905
Argentina213,463
Japan175,352
South Korea161,904
Brazil140,221
India93,902
Russia84,602
United Kingdom73,242
Taiwan68,130
Canada60,343
Mexico55,780
Vietnam52,461
Italy50,977
Hong Kong43,809
France43,176
New Zealand39,672
Thailand36,141
Spain32,048
Germany27,407
Poland25,509
Turkey24,092
Chile23,914
Indonesia23,684
Iran20,905

Given the large number of China-network hosted Telnet systems/devices, it’s no surprise Chinese autonomous systems tend to show up as having the largest percentage of hosts exposing this cleartext protocol.

Telnet Port 23 Hosting Organizations/Networks • Dec. 13, 2019 Study

Hosting Org# Telnet Hosts%
No.31,Jin-rong Street272,3698.79%
CHINA UNICOM China169 Backbone164,4225.31%
Shenzhen Tencent Computer Systems Company Limited109,2963.53%
Korea Telecom105,9603.42%
Prima S.A.95,7613.09%
CABLEVISION S.A.93,2193.01%
Data Communication Business Group50,6371.63%
NTT Communications Corporation42,8061.38%
Guangdong Mobile Communication Co.Ltd.41,4321.34%
FreeBit Co.,Ltd.40,7731.32%
University of Canterbury37,3971.21%
Hathway IP Over Cable Internet35,4171.14%
VNPT Corp34,8361.12%
China Mobile communications corporation31,7731.03%

Santa would never use Telnet to connect to his global surveillance infrastructure, and neither should you.

FIN

We’ve made our lists, checked them twice, and shown you who has been naughty (i.e., not nice). Lorelei sees what folks are hacking; knows what they’re trying to take; Sonar identified hosts that’ve been bad (i.e. not good), now it’s time for the Labs’ elves to take a well-earned break.

You’d better watch out, because we still see WannaCry; you’d better not pout, I’m telling you why: Rapid7 Labs is coming to town in 2020, with even more data and insights to help you understand the makeup of the internet and help defend your organization.

Happy holidays to all, and to all a good night!

Related blog posts