Trends in Internet Exposure
Map of Industrial Control Systems on the Internet (shodan.io)

Trends in Internet Exposure

More companies are going remote due to COVID-19 and as a result there's been a lot of speculation around how this impacts the exposure of companies and the Internet as a whole (in terms of publicly-accessible services). I was actually already working on creating trends for various services due to a presentation I gave late last year so let me share with you some updated charts on how the Internet has evolved over the past few years (up to March 29, 2020).

Methodology

Just quickly I'll mention a bit about how the data itself is generated:

  1. Shodan infrastructure is globally distributed to prevent being geographically biased
  2. Crawlers run 24/7 and don't do sweeps of IP ranges the same way a network scanner would
  3. Crawlers attempt full protocol-specific handshakes to validate that a port is responding. Depending on the protocol Shodan also performs additional steps to validate the response. For example, in the case of RDP the crawlers grab a screenshot, perform OCR on that screenshot and do a variety of basic security checks.

Timeframe

Shodan keeps a full history of every IP in the Internet that it's ever seen. We store that archive in a variety of formats and for this purpose I reprocessed our data going back to the beginning of 2017. You can also access that historical data via the API, CLI, or the new beta website.

Aggregation

I binned the results by unique IPs per month for each port/ tag. This means that data is not based on point-in-time scans but rather an aggregate view of the active IPs during a month.

Remote Desktop

The Remote Desktop Protocol (RDP) is a common way for Windows users to remotely manage their workstation or server. However, it has a history of security issues and generally shouldn't be publicly accessible without any other protections (ex. firewall whitelist, 2FA).

No alt text provided for this image

The number of devices exposing RDP to the Internet has grown significantly over the past month (41.5%) which makes sense given how many organizations are moving to remote work.

It's surprising how the number of RDP instances actually went up after the initial Microsoft bulletin on Bluekeep in May 2019. And then it dropped sharply in August once a series of issues were revealed (DejaBlue) that impacted newer versions of RDP.

A common tactic we've seen in the past by IT departments is to put an insecure service on a non-standard port (aka security by obscurity). To that point, this is how the exposure for RDP looks like on an alternate port (3388) that we've seen organizations use:

No alt text provided for this image

It follows very similar growth (36.8%) as seen for the standard port (3389). The last thing I wanted to point out is that 8% of the results remain vulnerable to BlueKeep (CVE-2019-0708).

VPNs

No alt text provided for this image

The above chart encompasses a few different VPN protocols and ports (IKE, PPTP etc.). VPNs are a secure way to allow remote workers access to your network and it's not surprising to see that number grow as well the past month.

Industrial Control Systems

No alt text provided for this image

We've observed significant growth in other protocols (HTTPS) but one of the important areas where we've seen a worrying increase in exposure is for industrial control systems (ICS). The growth (16.4%) is not as large as for other protocols but these are ICS protocols that don't have any authentication or security measures. We had actually seen a stagnation in the ICS exposure up until now. And there have been significant advancements in OT security so there are plenty of secure options to choose from.

We're also keeping our country-wide exposure dashboards up-to-date if you'd like to see breakdowns by country.

Conclusion

I hope the above data provides a more data-driven view of how the exposure of those ports has changed the past few years. There aren't any earth-shattering surprises in the data but it's good to validate what many already assumed. If you're an organization that is concerned with your Internet exposure and wants to keep track of what you have connected to the Internet then please check out our Shodan Monitor service.

RDP exposure increasing on the Internet is like a Wildebeest migration. Watch the waters.... https://www.youtube.com/watch?v=nSynuQQnUxc

回复
David Larsen

IT Audit Professional (Principal Specialist Role), CISA, GFACT, CERT ITPM, CC, CISSP (Pending)

4 年

Imagine if there were fines or enforcement for certain critical companies that show up on these scans. They might start to comply. But there’s no enforcement incentive yet until it’s too late.

回复
Cris D.

Head of Cybersecurity (pls, no unsolicited emails or additions to mailing lists)

4 年

There are very few posts I read every time. John Matherly's are one of them. Nice analytics! #shipping #offshore #ports

Arthur Carp

Founder and CEO of Quantalytics, Inc.

4 年

ICS exposure. frightening! And growing at a double digit rate.

David Larsen

IT Audit Professional (Principal Specialist Role), CISA, GFACT, CERT ITPM, CC, CISSP (Pending)

4 年

Great post, thank you.

要查看或添加评论,请登录

John Matherly的更多文章

  • Introducing Shodan Trends

    Introducing Shodan Trends

    Shodan was originally designed as a tool to understand how technology use is changing on the Internet. The information…

  • Analyzing Post-WannaCry SMB Exposure

    Analyzing Post-WannaCry SMB Exposure

    It's been a month since the WannaCry ransomware attack wrecked havoc across Windows networks via SMB and I'd like to…

    5 条评论
  • Understanding SSL Usage by Country

    Understanding SSL Usage by Country

    Real-world borders don't necessarily translate to the Internet but it can still reveal useful information as shown by…

    2 条评论
  • 49,153 PB of Memory Available

    49,153 PB of Memory Available

    I've written and presented on the topic of insecure databases for nearly 2 years now. The example I use the most to…

  • 684.8 TB of Data Exposed by Publicly Accessible MongoDB Servers

    684.8 TB of Data Exposed by Publicly Accessible MongoDB Servers

    In light of the recent incident of MacKeeper exposing 13 million accounts through a public, unauthenticated MongoDB…

    2 条评论
  • Tracking HTTP/2.0 Adoption

    Tracking HTTP/2.0 Adoption

    HTTP/2.0 is the next version of the protocol powering websites and it promises many improvements over HTTP/1.

    5 条评论
  • Top 10 Website Hackers for June

    Top 10 Website Hackers for June

    I wanted to revisit the results of an earlier post this year on how to track website defacements and see how things…

    4 条评论
  • Challenges in Taking Things Offline

    Challenges in Taking Things Offline

    Shodan has been in the news for the past few years largely due to the discoveries that security researchers have made…

    8 条评论
  • Hiding in Plain Sight

    Hiding in Plain Sight

    A common reaction I get when talking about devices exposed on the Internet is something like the following:…

    2 条评论

社区洞察

其他会员也浏览了