Internet Scan Shows Decline in Insecure Network Services

  /     /     /  
Publicated : 23/11/2024   Category : security


Internet Scan Shows Decline in Insecure Network Services


While telnet, rsync, and SMB, exposure surprisingly have dropped, proper patching and encryption adoption remain weak worldwide.



A comprehensive study of Internet-connected devices conducted over nearly four weeks in late March and early April shows that organizations surprisingly have become better about not exposing the most insecure services to the Internet.
Rapid7 today released a massive 165-page report on the state of security on the Net that found easy-to-exploit protocols — such as server message block (SMB), file transfer protocol (FTP), and telnet — have declined anywhere from 2% to 16%, despite the move to remote work after the start of the coronavirus pandemic, according to Rapid7s National/Industry/Cloud Exposure Report (NICER). Given that Asia and Europe were firmly in lockdowns and the United States had just started entering its own lockdown, the researchers expected a lot more chaos.
The Internets security situation has definitely improved, says Tod Beardsley, director of research for Rapid7. We saw a fairly large drop in SMB and telnet, our favorite vulnerable punching bags — things that you should never, ever, ever put on the Internet, he says. So, at least structurally, on a protocol and service basis, the Internet seems to be going in the right direction, which was surprising to us.
But a great deal of security problems continue to be apparent, Rapid7 found. Most organizations continue to delay patches, with 3.6 million SSH servers apparently running software version that are between 5- and 14-years old,
the report found
. More websites continue to offer the insecure HTTP protocol, rather than enforcing encrypted connections. 
For most protocols, millions of servers are running vulnerable versions of software or configured to allow the use of no encryption. Often, the infrastructure seems to be left vulnerable through neglect, the report stated. More than 3 million databases allow unencrypted queries, while nearly 3 million networking devices  — such as routers and switches — accept unencrypted telnet connections.
The internet is not an automatic money- and culture-generating machine, the report stated. It depends on the heroic efforts of thousands and thousands of professionals who are committed to its well-being, even in the face of daily attacks from a wide array of technically savvy criminals and spies.
The report also measured every country and industry based on the relative security of their Internet endpoints. Using a measure of vulnerable attack-surface area consisting of the number of Internet addresses, vulnerable software at those addresses, and the total number of vulnerabilities found in a specific device, Rapid7 created a measure of relative vulnerability for each country and industry. 
The United States and China sit at the top of the chart, which is unsurprising, given that the two countries own a great deal of Internet address space.
With more endpoints, you have more chances to fail, because you have more patches you have to keep up with, Beardsley says
Rapid7 also graded each industry for its relative security posture, by combining the number of endpoints exposed with the number of vulnerabilities detected per endpoint. The aerospace and auto-parts manufacturing industries made top marks for security, while telecommunications, financial services, and healthcare sat at the bottom of the grading chart.  
The majority of instances of insecure protocols occurred in vulnerable versions of the Apache Web server, which for many organizations may represent an embedded server on a network appliance or other device. More than 80% of these vulnerable devices were more the three years old, Rapid7 says. 
The company argued that well-informed policy makers could help companies better secure their systems by issuing guidance on insecure protocols, share threat information about known weak protocols with other countries, and study how such protocols can affect national economies. 
Overall, what we are finding is that businesses are slowly going in the right direction, Beardsley says. The distribution is pretty lumpy, some countries are doing things better than other countries. There is work to be done here.
Related Content
Attackers Scan for Vulnerable BIG-IP Devices After Flaw Disclosure
New Shodan Tool Warns Organizations of Their Internet-Exposed Devices
Researchers Unite To #ScanAllTheThings
How Enterprises Are Developing and Maintaining Secure Applications
 
 
 
Register now for this years fully virtual Black Hat USA, scheduled to take place August 1–6, and get more information about the event on the Black Hat website. Click for details on
conference information
 and
to register
.

Last News

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security

▸ Researchers create BlackForest to gather, link threat data. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Internet Scan Shows Decline in Insecure Network Services