Cyber Threats Targeting Russia, Winter 2019
- by nlqip
Attack Types of Top Attacking IP Addresses
Many of the IP addresses attacking Russian systems during the winter of 2019 were involved in abusive port scanning activity. As noted in the top attacked ports section, Microsoft SMB on port 445 was the highest targeted port, and that was seen across all of the top attacking IP addresses. We continued to observe high levels of attack traffic pointed towards VNC/RFB port 5900, although those levels are notably lower in Russia. As our sensor stack has evolved, we’ve noticed more IP addresses that are targeted on SMB port 445 at higher rates.
RM Engineering, which hosts a number of the top attacking IP addresses, does appear in the Russian threat landscape during this time period. One reason they don’t appear in the top attacking ASNs list could be that the attacks were at a lower volume. RM Engineering launched credential stuffing attacks that targeted RFB port 5900 and were received by systems all over the world. RM Engineering is new to our top threat actor network tracking as of June 2019, when the global campaign targeting RFB began, unlike OVH SAS, which has routinely shown up on top attacking network lists in our Hunt for IoT Report series for years.
Source IP address | Attack Type | ASN | Source Country | Russia Count |
193.233.63.46 | Port Scanning: SMB port 445, MS SQL port 1433 | Smart Telecom S.A.R.L | Argentina | 873,668 |
217.19.18.4 | Port Scanning: WebLogic port 7001, MS SMB port 445, MS SQL port 1433 | Cambrium IT Services B.V. | Netherlands | 650,419 |
148.251.20.137 | Port Scanning: HTTPS port 443, HTTP port 80, SSH port 22, SMTP port 25 | Hetzner Online GmbH | Germany | 539,707 |
148.251.20.134 | Port Scanning: HTTPS port 443, SSH port 22, HTTP port 80, SMTP port 25 | Hetzner Online GmbH | Germany | 538,668 |
71.46.230.178 | Port Scanning: MS SQL port 1433, SMB port 445 | Charter Communications | United States | 391,305 |
212.80.217.139 | Port Scanning: 48 unique ports | Serverius Holding B.V. | Netherlands | 340,171 |
5.153.2.228 | Port Scanning: SSH port 22, Credential Stuffing: SSH port 22 | SoftLayer Technologies | Netherlands | 300,110 |
5.153.18.254 | Port Scanning: SMB port 445, HTTPS port 443, SMTP port 25, SSH port 22, HTTP port 80 | SoftLayer Technologies | Netherlands | 289,462 |
130.198.67.114 | Port Scanning: MS SMB port 445, WebLogic port 7001, MS SQL port 1433, HTTP port 80 HTTP Attacks: Alt-HTTP port 8080 |
SoftLayer Technologies | United States | 286,093 |
169.54.190.139 | Port Scanning: MS SMB port 445, MS SQL port 1433 | SoftLayer Technologies | United States | 285,236 |
213.33.244.218 | Port Scanning: MS SMB port 445 | OOO Tecom | Russia | 279,386 |
95.90.230.133 | Port Scanning: ICB/SWX port 7326 | Vodafone Kabel Deutschland | Germany | 233,842 |
185.40.13.3 | Port Scanning: RFB/VNC port 5900 & 5901 | GTECH S.p.A. | Italy | 231,174 |
211.44.226.158 | Port Scanning: SMB port 445, MS SQL port 1433 | SK Broadband Co Ltd | South Korea | 207,491 |
92.118.37.67 | Port Scanning: SMB port 445, WebLogic port 7001, MS SQL port 1433, 8080 | Donner Oleg Alexeevich | Romania | 204,043 |
112.175.124.2 | Port Scanning: 61 unique ports | Korea Telecom | South Korea | 201,434 |
185.82.220.115 | Port Scanning: MS SMB port 445, WebLogic port 7001, MS SQL port 1433, Alt-HTTP port 8080, HTTP port 80 HTTP Attacks: Alt-HTTP port 8080 |
Dgn Teknoloji A.s. | Turkey | 196,841 |
72.69.223.115 | Port Scanning: SMB port 445, MS SQL port 1433, WebLogic port 7001 HTTP Attacks: Alt-HTTP port 8080 |
MCI DBA Verizon | United States | 191,969 |
52.58.75.133 | Port Scanning: 443, 445, HTTP port 80 | Amazon.com | Germany | 173,994 |
74.88.7.125 | Port Scanning: ICB/SWX port 7326 | Cablevision Systems Corp. | United States | 173,943 |
213.170.88.82 | Port Scanning: RFB/VNC port 5900 Credential Stuffing: RFB/VNC port 5900 |
Quantum CJSC | Russia | 169,726 |
141.98.11.12 | Port Scanning: 40048 unique ports | UAB Host Baltic | Lithuania | 161,719 |
69.14.153.121 | Port Scanning: RFB/VNC port 5900 | WideOpenWest Finance LLC | United States | 161,433 |
185.175.32.163 | Port Scanning: RFB/VNC port 5900, Credential Stuffing: RFB/VNC port 5900 | ITC NG ltd | Israel | 150,800 |
185.222.211.54 | Port Scanning: Netbios port 139, HTTP port 80, 137, 138, SMB port 445 | Alviva Holding Limited | United Kingdom | 146,538 |
Table 1. Top Attacking IP addresses and their attack types targeting Russian Systems, October 1, 2019 – December 31, 2019
Top Targeted Ports
Looking at top targeted ports and services can provide insight as to where attackers are focusing resources and what services they’re after. Russia had possibly the most distinct top attacked ports over this time period. As in most of the rest of the world, SMB port 445 was the number one attacked port in Russia (consistent with global attack activity since the Eternal Blue exploit was released in April 2017). We noticed a large uptick in volume of SMB port 445 attack traffic in this time period compared to the volume noted in our fall 2019 regional threat perspectives article about Russia. This can be attributed to our continuously evolving sensor network where we are observing the regional threat landscape from different postures.
In a distant second position was the Swiss Exchange port 7326. This traffic was first noticed in October. and is only targeting Russia. This is notable, given the potential financial implications and the fact that this was not a top attacked port anywhere else in the world during this time period. When looking at attacks on Russian systems, the only other port only targeted port was 21455.
In third position was SSH port 22. This activity was consistent all over the world—and we expect to see this. SMB port 445 and SSH port 22 are commonly targeted because exploiting a vulnerability on either port can give a malicious actor access to the entire system. Many of the remaining top targeted ports were those used for web applications, access, and email. This clearly indicate attackers went after applications and access to applications in Russia (as they did all across the world).
Notable in the Russian threat landscape was the relatively smaller number of attacks targeted towards VNC port 5900. This activity is atypical and was first noticed in July 2019. We are actively engaged in an ongoing investigation of this activity, much of which appears to be coming from Russia, although with the use of proxies and VPNs, we cannot be sure of attribution.
Source link
lol
Attack Types of Top Attacking IP Addresses Many of the IP addresses attacking Russian systems during the winter of 2019 were involved in abusive port scanning activity. As noted in the top attacked ports section, Microsoft SMB on port 445 was the highest targeted port, and that was seen across all of the top attacking…
Recent Posts
- Arm To Seek Retrial In Qualcomm Case After Mixed Verdict
- Jury Sides With Qualcomm Over Arm In Case Related To Snapdragon X PC Chips
- Equinix Makes Dell AI Factory With Nvidia Available Through Partners
- AMD’s EPYC CPU Boss Seeks To Push Into SMB, Midmarket With Partners
- Fortinet Releases Security Updates for FortiManager | CISA