Beware of older cyber attacks: Footprinting and brute
Transcription
Beware of older cyber attacks: Footprinting and brute
Beware of older cyber attacks Footprinting and brute force attacks are still in use IBM X-Force® Research Managed Security Services Report Click here to start ▶ ◀ Previous Next ▶ Contents Executive overview Executive overview Covering more than 18 years of vulnerability data, the IBM® X-Force® database surpassed 100,000 entries in Q2 2016.1 That means there are a lot of attack vectors at a criminal’s disposal. With much of the media focus on new and emerging threats, it’s easy to see how security teams might lose sight of older, less newsworthy vulnerabilities and attack vectors. Footprinting Top 10 ports Brute force password attacks Secure shell (SSH) brute force attacks Persistence of SSH brute force top 20 attacker IP addresses SSH brute force top five IP addresses File Transfer Protocol (FTP) brute force attacks Top five FTP brute force attacker IP addresses Recommendations Protect your enterprise while reducing cost and complexity About IBM Security About the author References An assessment of recent data from IBM Managed Security Services (IBM MSS), which continuously monitors billions of events reported by more than 8,000 client devices in over 100 countries, reveals some interesting findings about attack vectors no longer discussed much. One example is the TCP/ UDP port scan and TCP/UDP service sweep, which are part of an attack pattern known as footprinting.2 Another is the password brute force attack pattern,3 one of the brute force attacks4 we saw emerge decades ago and still see today. While many products and services today require strong passwords, weak passwords are still being used, aiding criminals in carrying out successful brute force attacks.5 6 7 Fortunately, many tools and mitigation techniques to thwart these older kinds of cyber attack have been developed over the years. Organizations that apply them in their environments will be better equipped to deal with the ongoing threat. About this report This IBM® X-Force® Research report was created by the IBM Managed Security Services Threat Research group, a team of experienced and skilled security analysts working diligently to keep IBM clients informed and prepared for the latest cybersecurity threats. This research team analyzes security data from many internal and external sources, including event data, activity and trends sourced from thousands of endpoints managed and monitored by IBM. 2 ◀ Previous Next ▶ Contents Footprinting Executive overview Looking at the Common Attack Pattern Enumeration and Classification (CAPEC) mechanisms of attack8, we see an attack pattern hierarchy. Footprinting9 is considered a meta attack pattern that falls under one of the top level categories, “Gather Information.” Often viewed as more of a pre-attack used to gather information on potential targets, the term encompasses several attack techniques, among them network topology mapping, host discovery, account footprinting, and port scanning. Generally, multiple ports are scanned in a port scan. Footprinting Top 10 ports Brute force password attacks Secure shell (SSH) brute force attacks Persistence of SSH brute force top 20 attacker IP addresses SSH brute force top five IP addresses File Transfer Protocol (FTP) brute force attacks Top five FTP brute force attacker IP addresses Recommendations Protect your enterprise while reducing cost and complexity About IBM Security About the author There’s also something called a service (or port) sweep, in which multiple hosts in a network are checked for a specific open service port. Service sweeps are often ignored, since they occur so regularly and aren’t something that warrants an immediate response. The placement of network sensors also impacts whether footprinting activity can be detected. If a sensor is behind a firewall and the firewall is not configured to map ports to internal systems, the scan activity won’t be logged. Commonly used footprinting tools Most security analysts will agree that “nmap,” made available in 1997, is the best known and most widely used network footprinting tool.10 “Scanrand” (2002)11, “amap” (2003)12, “Unicornscan” (2005)13, “zmap” (2012)14 and “masscan” (2013) are also popular. Newer tools such as “zmap” (2012) claim the ability to scan the entire Internet in times ranging from five minutes to an hour.15 And masscan claims to do it in three minutes.16 Scanning tools existed before 1997, for example the Internet Security Scanner (ISS) version 1.x that first appeared as a shareware product in 1992 and later inspired a commercial product.17 Another way to glean footprinting data is to use a search engine that is searching data from ongoing Internet mapping projects. Shodan (2009) is one of the most popular projects and is thought by many to be the most comprehensive.18 Censys (2015) is geared towards computer scientists and researchers.19 Thingful (2013) is for Internet of Things (IoT) devices.20 Internet mapping search engines such as these allow attackers to gain access to footprinting information without actually sending packets to the victim, who then remains unaware they’re being targeted. References 3 ◀ Previous Next ▶ Contents Top 10 ports Executive overview In a sampling of IBM Managed Security Services customers over two days in Q1 2016, the telnet port (TCP port 23) received the most number of sweeps, accounting for 79 percent of the events. Port 80 is excluded from the network IDS signature represented in this data due to the likelihood of false positives because legitimate web traffic also uses port 80.21 Popular ports such as 25 (SMTP), 21 (FTP), 53 (DNS), 135 (RPC), 137 (NETBIOS), 139 (NETBIOS), 445 (Microsoft-DS), and others ranked lower than the top 10. This is shown in Figure 1 and Table 1. Footprinting Top 10 ports 1 • 2 • 3 • 4 • 5 • 6 • 7 Brute force password attacks Secure shell (SSH) brute force attacks Persistence of SSH brute force top 20 attacker IP addresses SSH brute force top five IP addresses File Transfer Protocol (FTP) brute force attacks Top five FTP brute force attacker IP addresses Recommendations Top 10 TCP service sweep destination ports 3128 (Active API) 1.00% 3389 (MS WBT) 1.54% 3306 (MySQL) 1.59% 1433 (SQL Server) 2.61% 8080 (HTTP-alt) 2.14% 443 (HTTP over SSL) 0.90% 5900 (RmtFrameBuffer) 0.61% 9200 (WAP) 0.56% 21320 (N/A) 0.54% Other 9.87% Protect your enterprise while reducing cost and complexity Internet Assigned Numbers Authority Destination Rank Sweeps (IANA)-assigned TCP port service description and popular use22 1 23 78.65% telnet 2 1433 2.61% Microsoft SQL Server 3 8080 2.14% HTTP alternate for port 80 4 3306 1.59% MySQL 5 3389 1.54% MS WBT Server, Windows Remote Desktop 6 3128 1.00% Active API Server Port, some proxy servers (squid-http, 3proxy) 7 443 0.90% http protocol over TLS/SSL 8 5900 0.61% Remote framebuffer, VNC (virtual network computing), Apple Remote Desktop 9 9200 0.56% WAP connectionless session service, EMC2 (Legato) Networker or Sun Solstice Backup 10 21320 0.54% N/A All other 9.87% All other TCP ports combined Table 1. Rank, destination TCP port, sweeps and service description and popular use for the top 10 ports. Source: IBM MSS data. About IBM Security About the author References 23 (telnet); 78.65% Figure 1. Top 10 TCP service sweep destination ports. Source: IBM MSS data. 4 ◀ Previous Next ▶ Contents Executive overview Footprinting Top 10 ports 1 • 2 • 3 • 4 • 5 • 6 • 7 Brute force password attacks Ports provide multiple pieces of useful information. Attackers may be seeking: • Specific vulnerabilities for known services, such as Heartbleed on web servers • Services that can be exploited for a brute force password attack • Information on a target, such as what can be found in a login banner Secure shell (SSH) brute force attacks Persistence of SSH brute force top 20 attacker IP addresses SSH brute force top five IP addresses Banners can be particularly revealing. “Welcome to the ACME central bank system running Widgets OS version 3.43.23c” reveals that the attacker has found both a prime target and an easy path to unauthorized access via what may be its operating system’s many known vulnerabilities. Certain malware are also known to use many common ports. Table 2 highlights those associated with the top 10 TCP destination ports revealed in Table 1. Rank Destination Sweeps TCP port Trojans, worms or malware using the port 1 23 78.65% ADM worm (May 1998), Aphex’s Remote Packet Sniffer, AutoSpY, ButtMan , Fire HacKer, My Very Own Trojan, Pest, RTB 666, Tiny Telnet Server - TTS, Truva Atl, Backdoor.Delf variants, Backdoor.Dagonit (2005.10.26) 2 1433 2.61% Digispid.B.Worm (2002.05.21), W32.Kelvir.R (2005.04.12), Voyager Alpha Force 3 8080 2.14% Top five FTP brute force attacker IP addresses Reverse WWW Tunnel Backdoor, RingZero, Screen Cutter, Mydoom.B (2004.01.28), W32.Spybot. OFN (2005.04.29), W32.Zotob.C@mm (2005.08.16), W32.Zotob.E(2005.08.16), Backdoor.Naninf.D (2006.02.01), Backdoor.Naninf.C (2006.01.31), W32.Rinbot.A (2007.03.02), Android.Acnetdoor (2012.05.16), Feodo/Geodo (a.k.a. Cridex or Bugat), Backdoor.Tjserv.D (2005.10.04), RemoConChubo, Brown Orifice, Feutel, Haxdoor, Hesive, Nemog, Ryknos, W32.Kelvir, W32.Mytob, W32.Opanki, W32. Picrate, W32.Spybot, W32.Zotob, Webus 4 3306 1.59% Nemon backdoor (discovered 2004.08.16), W32.Mydoom.Q@mm, W32.Spybot Recommendations 5 3389 1.54% Backdoor.Win32.Agent.cdm, TSPY_AGENT.ADDQ Protect your enterprise while reducing cost and complexity 6 3128 1.00% Masters Paradise, Reverse WWW Tunnel Backdoor, RingZero, Mydoom.B (2004.01.28), W32.HLLW. Deadhat (2004.02.06) 7 443 0.90% W32.Kelvir.M (2005.04.05), Slapper, Civcat, Tabdim, W32.Kelvir, W32.Kiman About IBM Security 8 5900 0.61% Backdoor.Evivinc, W32.Gangbot (2007.01.22) 9 9200 0.56% Unknown 10 21320 0.54% Spybot, TopArcadeHits malware installing unapproved proxy File Transfer Protocol (FTP) brute force attacks About the author References Table 2. Illegitimate uses of the top 10 ports. Rank, destination TCP port, sweeps. Source: IBM MSS data. Trojans, worms, malware using port. Source: Various.23 24 25 5 ◀ Previous Next ▶ Contents Executive overview Footprinting Top 10 ports 1 • 2 • 3 • 4 • 5 • 6 • 7 Brute force password attacks Secure shell (SSH) brute force attacks Persistence of SSH brute force top 20 attacker IP addresses SSH brute force top five IP addresses File Transfer Protocol (FTP) brute force attacks Top five FTP brute force attacker IP addresses Recommendations Protect your enterprise while reducing cost and complexity About IBM Security About the author References Telnet: TCP port 23 Telnet, which has been around since the beginning of the ARPANET in 1969 in what evolved to be the Internet in 1982, accounts for more than threequarters of the sweep traffic we analyzed. People might wonder “How could that be? I thought telnet didn’t get used much anymore.” That’s true enough, but only partly so. While telnet is no longer enabled by default in many UNIX/Linux distributions, as it once was, it still gets enabled by naïve administrators, and it can be found enabled by default on many IoT devices such as refrigerators, DVRs, televisions, beds, toothbrushes and some older SCADA (Supervisory Control And Data Acquisition) devices. Telnet doesn’t encrypt its communications, making it easy for someone to sniff the traffic for user IDs and passwords. Telnet servers aren’t limited to only UNIX/Linux; some telnet servers connected to the Internet are running on Windows systems ranging from Windows 10 all the way back to Windows XP. Many embedded system applications are used in equipment such as routers, VOIP phones and industrial control systems (ICSs). People think of ICS as infrastructure—in utility or manufacturing environments—but ICS is used in other industries, for example at the car wash. At least one car wash system has been known to have a telnet server listening and reachable from the Internet.26 When you pull into one of those automated car washes with no attendant anywhere in sight, one could wonder whether there’s some criminal in control from hundreds or thousands of miles away. A report created on 4 April 2016 from the world’s first search engine for internet-connected devices, Shodan, shows that telnet is still alive and serving (see Figure 2).27 28 Once an attacker discovers an open telnet port, she or he may have several options: • See if the banner reveals something about the system and the entity that owns it • If authentication isn’t required, gain immediate access to the system • Try common default accounts such as root/root, system/system, manager/manager, or operator/ operator to gain unauthorized access • Perform brute force attacks to obtain passwords for common user accounts or system (root or Administrator) accounts. An attacker with unauthorized access will normally explore the system to view its features, see what data it contains, and gain experience with the technologies used, building up a toolbox and learning additional ways to exploit the targeted organization. 6 ◀ Previous Next ▶ Contents Telnet port 23 search results Executive overview Footprinting Top 10 ports 1 • 2 • 3 • 4 • 5 • 6 • 7 Brute force password attacks Secure shell (SSH) brute force attacks Persistence of SSH brute force top 20 attacker IP addresses SSH brute force top five IP addresses File Transfer Protocol (FTP) brute force attacks Top five FTP brute force attacker IP addresses Top Countries 1 . China 5,199,724 2 . United States 1,327,980 3 . Brazil 1,257,974 4 . Republic of Korea 1,030,702 5 . India 723,424 Recommendations 6 . Spain 526,469 7 . Russian Federation 467,227 Protect your enterprise while reducing cost and complexity 8 . Viet Nam 409,888 9 . Italy 350,927 10 . Dominican Republic 296,118 About IBM Security About the author Figure 2. A search for port 23 on 5 April 2016 returned over 16 million results. Source: Shodan. References 7 ◀ Previous Next ▶ Contents Executive overview Footprinting Top 10 ports 1 • 2 • 3 • 4 • 5 • 6 • 7 Brute force password attacks Telnet vulnerabilities “Common Vulnerabilities and Exposures” (CVE ) is a dictionary of common names (also called CVE Identifiers) for publicly known cybersecurity vulnerabilities.29 Vulnerabilities related to telnet have been disclosed every year since its launch in 1999, and by the end of 2015 they totaled 266 (see Figure 3). While their disclosure has slowed over Secure shell (SSH) brute force attacks 40 35 SSH brute force top five IP addresses 25 Top five FTP brute force attacker IP addresses Recommendations Protect your enterprise while reducing cost and complexity A few of the telnet server vulnerabilities disclosed in 2015 could impact many organizations without their ever suspecting such a vulnerability exists. This includes CVE-2015-2874 and CVE-2015-3459. Count of telnet CVE IDs Persistence of SSH brute force top 20 attacker IP addresses File Transfer Protocol (FTP) brute force attacks time, there has been a small resurgence in number during the past few years. It should be interesting to see the count for 2016. ® 30 20 15 10 5 0 99 19 00 20 01 20 02 20 20 03 20 04 05 20 20 06 20 07 08 20 20 09 10 20 11 20 12 20 13 20 14 20 15 20 Figure 3. Total number of telnet vulnerabilities since 1999. Source: CVE Project, MITRE Corporation.30 About IBM Security About the author References 8 ◀ Previous Next ▶ Contents Executive overview Footprinting Top 10 ports 1 • 2 • 3 • 4 • 5 • 6 • 7 Brute force password attacks Secure shell (SSH) brute force attacks Persistence of SSH brute force top 20 attacker IP addresses SSH brute force top five IP addresses File Transfer Protocol (FTP) brute force attacks Top five FTP brute force attacker IP addresses Recommendations Protect your enterprise while reducing cost and complexity About IBM Security CVE-2015-2874 is associated with a vulnerability in a few Seagate portable hard drives used to share content with mobile devices such as cell phones and tablets.31 The vulnerability is also linked to a common weakness enumeration ID, CWE-798, which is for “Use of Hard-Coded Credentials.”32 An attacker could exploit this vulnerability by establishing a telnet session into a vulnerable device and typing in the default username and password to gain root privileges to the system and access all the files stored on the drive. A firmware update to remediate the issue is now available from the manufacturer. CVE-2015-3459 is associated with a vulnerability affecting the Hospira LifeCare PCA Infusion System prior to version 7.0. Vulnerable systems do not require authentication for root telnet sessions, potentially allowing a remote attacker to modify the pump configuration. The implications are life-threatening: a malicious actor could bypass authentication and relatively easily change the upper limit of a drug being administered to a patient. According to the vendor, version 7.0 has the telnet port disabled by default to prevent unauthorized access.33 2015 saw the disclosure of several other telnet vulnerabilities where admin access could be gained fairly easily (see Table 3). CVE ID Product Vulnerability CVE-2015-0924 Ceragon FiberAir IP-10 bridges Default password for the root account CVE-2015-2897 Sierra Wireless AirLink ES, GX, and LS devices Hardcoded root accounts CVE-2015-7251 ZTE ZXHN H108N R1A devices Hardcoded password of root for the root account CVE-2015-7289 Arris DG860A, TG862A, and TG862G devices Hardcoded administrator password derived from a serial number Table 3. Additional notable telnet vulnerabilities. Note that specific software or firmware versions of vulnerable products are not noted in the table. Refer to the IBM X-Force Exchange for more information. About the author References 9 ◀ Previous Next ▶ Contents Executive overview Footprinting Top 10 ports 1 • 2 • 3 • 4 • 5 • 6 • 7 Brute force password attacks Secure shell (SSH) brute force attacks Persistence of SSH brute force top 20 attacker IP addresses SSH brute force top five IP addresses File Transfer Protocol (FTP) brute force attacks Top five FTP brute force attacker IP addresses SQL Server: port 1433 The number two ranked destination port for TCP service sweeps, at only three percent of the traffic, is 1433, commonly used for Microsoft SQL Server. In addition to the common footprinting tools noted earlier, a freely available software package called Metasploit34 has an auxiliary module, mssql ping, used to discover exposed Microsoft SQL Server instances. Metasploit also includes modules named mssql_login and mssql_hashdump used to gain unauthorized access to a Microsoft SQL Server instance. An open source penetration tool called sqlmap35 will locate and exploit SQL injection flaws of database servers such as Microsoft SQL Server. Another tool to exploit Microsoft SQL Server installations is sqlninja.36 Both sqlmap and sqlninja are included in the current releases of Kali Linux, a Linux distribution designed to be used for penetration testing.37 Other ports Some of the ports noted in the top 10 are associated with well-known older attacks such as MyDoom, Slapper, SQL Slammer, and Spybot. While these attacks may or may not still be active in the wild, the services with which they are associated are still of interest to today’s attackers. Malware may use some of these ports because some organizations’ firewalls already have rules allowing these services to go through. Recommendations Protect your enterprise while reducing cost and complexity About IBM Security About the author References Telnet vulnerabilities persist, largely because of administrators activating telnet ports and because of open ports on IoT devices. 10 ◀ Previous Next ▶ Contents Brute force password attacks Executive overview A brute force password attack is a tactic in which an intruder tries to guess a username and password combination in order to gain unauthorized access to a system or data. The attacker will try a litany of common usernames and passwords, well-known default credentials, and passwords derived from a dictionary. The target could be a local console, an encrypted file or a service across a network, such as a social media account or a secure shell (SSH) access to a remote system. Footprinting Top 10 ports Brute force password attacks Secure shell (SSH) brute force attacks Persistence of SSH brute force top 20 attacker IP addresses SSH brute force top five IP addresses File Transfer Protocol (FTP) brute force attacks Top five FTP brute force attacker IP addresses Recommendations Protect your enterprise while reducing cost and complexity About IBM Security About the author References Brute force password attacks have been around since the early days of the Internet and are still a significant presence in the wild. Often an attacker will come across a new system during a footprinting attack against a targeted network and see a login screen banner. A banner that reveals the operating system version will give the attacker an idea of what system-level account names to begin trying. Many brute force password hacking and cracking programs exist. Some of the more popular remote network password hacking tools are Brutus38, Medusa39, Ncrack40 (alpha), and THC Hydra41. They work against a variety of protocols which may include FTP, SSH, SMB, telnet, MySQL, Microsoft SQL, SMTP and VNC, and might find a simple dictionary password in less than a second. The data included in this report shows that brute force password hacking attacks occurred consistently throughout 2015. Some of the top attackers carried out the same type of brute force attacks against many targets every day for months, even for a full year in some cases. Several times an attacker carrying out an SSH brute force attack came back months later looking for another service to target, such as a database server. Even though attacks may come from a compromised system or an anonymous proxy rather than the attacker’s own IP address, the persistence we’ve seen in brute force attacks means that it’s wise to block the source IP address of the attacking system. Brute force password attackers can be very persistent, continuing their attacks for months or even a full year. 11 ◀ Previous Next ▶ Contents Executive overview Footprinting Top 10 ports Brute force password attacks Secure shell (SSH) brute force attacks 1 • 2 • 3 Persistence of SSH brute force top 20 attacker IP addresses SSH brute force top five IP addresses File Transfer Protocol (FTP) brute force attacks Top five FTP brute force attacker IP addresses Recommendations Secure shell (SSH) brute force attacks Attackers favor SSH because it provides shell account access across the network. SSH brute force attacks peaked in May 2015, then trended downward for the rest of the year except for a slight increase in December over November (see Figure 4). It’s likely that the botnet known as SSHPsychos was responsible for much of the activity early in the year, and the downward trend in later months reflected efforts by members of the security community to mitigate this threat.42 SSH brute force attacks 20% 15% 10% Protect your enterprise while reducing cost and complexity 5% About IBM Security 0% About the author References The number of unique attacker IP addresses associated with SSH brute force attacks also peaked in May (see Figure 5). While there was a pronounced downward trend in attacks from June through December, the unique attacker count was closer to trending flat during that time period. The main point is that SSH brute force attacks aren’t limited to a small set of attackers, and protecting your systems from such attacks is important. Ja a nu ry b Fe a ru ry M ch ar ril Ap ay M ne Ju ly Ju t us g Au em pt e S r be er O ob ct r r be m ve No be m ce De Figure 4. Percentage of SSH brute force attacks for each month in 2015 (1 January 2015 – 31 December 2015). Source: IBM MSS data. 12 ◀ Previous Next ▶ Contents Executive overview Footprinting Unique attacker IP count 1000 800 Top 10 ports Brute force password attacks Secure shell (SSH) brute force attacks 1 • 2 • 3 Persistence of SSH brute force top 20 attacker IP addresses SSH brute force top five IP addresses File Transfer Protocol (FTP) brute force attacks Top five FTP brute force attacker IP addresses Recommendations Protect your enterprise while reducing cost and complexity About IBM Security About the author References 600 400 200 0 Ja a nu ry b Fe a ru ry M ch ar ril Ap ay M ne Ju ly Ju t us g Au em pt e S r be er O ob ct r r be m ve No be em c De Figure 5. Unique attacker IP count for SSH brute force attacks (1 January 2015 – 31 December 2015). Source: IBM MSS data. Note: A single IP address is considered unique and counted as “1” for each month that it appeared in the data. For example, the IP address 1.2.3.4 would be counted as “1” in both January and February if found in both months. The brute force attack source IP locations collected by IBM Managed Security Services covered 98 countries (see Figure 6), with 93 percent of the total brute force attack activity coming from the top 10 countries. Hong Kong and China combined represented 76 percent of the total—not surprisingly, since the networks most known as sources for the SSHPsychos botnet, 103.41.124.0/23 and 43.255.190.0/23, were from there.43 IP addresses hosted in the United States were targets in almost 67 percent of the attacks (see Figure 7). 13 ◀ Previous Next ▶ Contents Executive overview Footprinting Top 10 ports Brute force password attacks Top 10 source countries for SSH brute force attacks United Kingdom 1.04% Germany 1.15% Republic of Korea 1.31% France 2.50% Russian Federation 0.88% Netherlands 0.84% Brazil 0.72% Hong Kong 40.28% United States 8.76% Top 10 destination countries for SSH brute force attacks Japan 0.79% Italy 0.80% Denmark 1.26% France 0.43% Australia 0.22% Germany 0.17% Europe 0.03% Canada 1.95% United Kingdom 2.16% Secure shell (SSH) brute force attacks 1 • 2 • 3 Persistence of SSH brute force top 20 attacker IP addresses 1 • 2 SSH brute force top five IP addresses File Transfer Protocol (FTP) brute force attacks Top five FTP brute force attacker IP addresses Recommendations Protect your enterprise while reducing cost and complexity About IBM Security About the author China 35.51% United States 66.91% Figure 6. Top ten source countries for SSH brute force attacks (1 January 2015 – 31 December 2015). Source: IBM MSS data. Persistence of SSH brute force top 20 attacker IP addresses Attackers behind the top 20 IP addresses actively targeted their victims during two or more calendar months (see Table 4). Any amount of attack activity is a concern, but activity noted for three or more months from the same IP address may signify Figure 7. The top destination countries for SSH brute force attacks (1 January 2015 – 31 December 2015). Source: IBM MSS data. a more targeted and prolonged effort against a particular organization. According to the Talos Security Intelligence and Research Group,44 several IP addresses in the table are known to be associated with the SSHPsychos group. Talos reported that the SSHPsychos attacks involved targeting only the root account, trying over 300,000 passwords. References 14 ◀ Previous Next ▶ Total Customers Affected* Month Count 0% 0% 0% 0% 0% 29% 4 2 115.231.222.23 9% 22% 0% 0% 0% 0% 0% 0% 0% 0% 0% 0% 24% 2 Secure shell (SSH) brute force attacks 3 115.239.248.237 15% 13% 0% 0% 0% 0% 0% 0% 0% 0% 0% 0% 20% 2 4 115.239.248.205 10% 16% 0% 0% 0% 0% 0% 0% 0% 0% 0% 0% 20% 2 Persistence of SSH brute force top 20 attacker IP addresses 1 • 2 5 27.221.10.43 0% 0% 2% 7% 7% 9% 6% 7% 9% 2% 5% 3% 18% 10 6 88.150.240.59 0% 3% 14% 6% 0% 0% 0% 0% 0% 0% 0% 0% 17% 3 7 58.218.213.238 6% 10% 5% 0% 0% 0% 0% 0% 0% 0% 0% 0% 16% 3 8 103.41.124.63 7% 10% 10% 0% 0% 0% 0% 0% 0% 0% 0% 0% 16% 3 9 103.41.124.111 8% 8% 9% 0% 0% 0% 0% 0% 0% 0% 0% 0% 16% 3 10 43.255.190.147 0% 0% 0% 14% 5% 0% 0% 0% 0% 0% 0% 0% 15% 2 11 43.255.190.160 0% 0% 0% 15% 2% 0% 0% 0% 0% 0% 0% 0% 15% 2 12 218.26.11.118 0% 0% 10% 8% 0% 0% 0% 0% 0% 0% 0% 0% 15% 2 13 59.47.0.150 0% 7% 3% 8% 6% 9% 9% 5% 2% 0% 0% 0% 15% 8 14 218.65.30.61 0% 7% 7% 11% 13% 9% 7% 2% 3% 0% 0% 0% 15% 8 15 58.218.204.172 7% 9% 6% 0% 0% 0% 0% 0% 0% 0% 0% 0% 15% 3 16 43.255.190.125 0% 0% 0% 14% 3% 0% 0% 0% 0% 0% 0% 0% 15% 2 17 58.218.213.249 5% 13% 0% 0% 0% 0% 0% 0% 0% 0% 0% 0% 15% 2 18 43.255.190.134 0% 0% 0% 15% 2% 0% 0% 0% 0% 0% 0% 0% 15% 2 19 8.254.73.28 3% 9% 5% 1% 0% 0% 0% 0% 0% 0% 0% 0% 15% 4 20 103.41.124.48 7% 8% 8% 0% 0% 0% 0% 0% 0% 0% 0% 0% 15% 3 SSH brute force top five IP addresses File Transfer Protocol (FTP) brute force attacks Top five FTP brute force attacker IP addresses Recommendations Protect your enterprise while reducing cost and complexity About IBM Security About the author References Rank December 0% November 0% October 0% September 7% August 10% July 22% June 8% May 221.229.160.237 Top 10 ports April March 1 Footprinting January Brute force password attacks Executive overview Attacking IP February Contents Table 4. The top attacking IP addresses for SSH brute force in 2015 (1 January 2015 – 31 December 2015). Source: IBM MSS data. Note: Percentages shown represent the percentage of customers the attacking IP targeted during 2015. The red highlighting indicates a higher percentage, orange a lower percentage, and green indicates zero percentage. *Totals rounded to the nearest hundredth. 15 ◀ Previous Next ▶ Contents Executive overview Footprinting Top 10 ports Brute force password attacks Secure shell (SSH) brute force attacks Persistence of SSH brute force top 20 attacker IP addresses SSH brute force top five IP addresses 1 • 2 • 3 • 4 • 5 • 6 File Transfer Protocol (FTP) brute force attacks Top five FTP brute force attacker IP addresses Recommendations Protect your enterprise while reducing cost and complexity SSH brute force top five IP addresses The following section highlights the top five source IP addresses that conducted SSH brute force attacks in 2015. For each of the following tables, the signature names shown in the first column represent intrusion detection/protection system signatures from multiple vendors. These tables show that the same IP address that initiates TCP service sweeps also carries out brute force password attacks. While the network ranges of 103.41.124.0/23 (China) and 43.255.190.0/23 (Hong Kong) were previously noted as sources for much of the SSHPsycho botnet activity, the LongTail SSH Honeypot project confirms other IP addresses outside those ranges exhibiting the same patterns.45 It’s interesting that all top five source IP addresses reside in China and much of the activity happened within the first few months of the year. 1: Attacker IP address 221.229.160.237 Country location: China Most of the activity from this address occurred from January 2015 through June 2015, with a little showing up in September (see Table 5). While all its activity in January through April was focused on SSH, the TCP service sweeps in June (6/3 – 6/4) and September (9/17) targeted SQL Server (and were sourced from port 6000). Observations regarding this IP address include: • The SSH_Brute_Force signature directly indicates the SSH brute force attacks. • Brute force attacks require making many connections to a service. “Multiple Rapid SSH Connections,” “OpenSSH Repeated CRC DoS,” “SSH connection flood,” and “SSH_ Connection_DoS” signatures indirectly indicate SSH brute force attacks based on the large number of connections. • The footprinting signatures shown are “TCP_ Service_Sweep,” “SSH client scan,” “TCP_ Probe_SSH,” “Sweep Scan,” “SSH_Service_ Sweep,” and “TCP: SYN Host Sweep.” About IBM Security About the author References 16 ◀ Previous Next ▶ September December Top 10 ports Brute force password attacks 32.49% 8.44% 8.31% 0.00% 0.00% 0.00% 59.49% TCP_Service_Sweep 0.00% 0.00% 0.00% 0.00% 30.07% 0.34% 0.00% 30.41% Secure shell (SSH) brute force attacks Multiple Rapid SSH Connections 1.14% 4.50% 0.15% 0.00% 0.00% 0.00% 0.00% 5.79% OpenSSH Repeated CRC DoS 0.52% 3.52% 0.00% 0.00% 0.00% 0.00% 0.00% 4.04% Persistence of SSH brute force top 20 attacker IP addresses SSH connection flood 0.01% 0.07% 0.00% 0.00% 0.00% 0.00% 0.00% 0.08% SSH client scan 0.01% 0.05% 0.00% 0.00% 0.00% 0.00% 0.00% 0.07% SSH brute force top five IP addresses 1 • 2 • 3 • 4 • 5 • 6 Geo Protection 0.00% 0.00% 0.00% 0.00% 0.04% 0.00% 0.00% 0.04% TCP_Probe_SSH 0.01% 0.00% 0.01% 0.00% 0.00% 0.00% 0.00% 0.02% SSH_Connection_DoS 0.00% 0.00% 0.00% 0.02% 0.00% 0.00% 0.00% 0.02% File Transfer Protocol (FTP) brute force attacks Sweep Scan 0.00% 0.00% 0.00% 0.00% 0.01% 0.00% 0.00% 0.01% SSH_Service_Sweep 0.00% 0.00% 0.01% 0.00% 0.00% 0.00% 0.00% 0.01% Top five FTP brute force attacker IP addresses TCP: SYN Host Sweep 0.00% 0.00% 0.00% 0.00% 0.01% 0.00% 0.00% 0.01% Grand Total* 11.96% 40.63% 8.60% 8.33% 30.14% 0.34% 0.00% 100.00% Count* June 10.26% Footprinting Total Event March SSH_Brute_Force Signature April February Executive overview January Contents Recommendations Protect your enterprise while reducing cost and complexity Table 5. Activity from IP address 221.229.160.237 (1 January 2015 – 31 December 2015). Source: IBM MSS data. Note: Percentages shown represent signature event count generated from the attacking IP address. Red highlighting indicates a higher percentage, orange a lower percentage, and green indicates zero percentage. *Totals rounded to the nearest hundredth. About IBM Security About the author References 17 Executive overview Footprinting Top 10 ports Brute force password attacks Secure shell (SSH) brute force attacks Persistence of SSH brute force top 20 attacker IP addresses SSH brute force top five IP addresses 1 • 2 • 3 • 4 • 5 • 6 File Transfer Protocol (FTP) brute force attacks Top five FTP brute force attacker IP addresses Recommendations Protect your enterprise while reducing cost and complexity 2: Attacker IP address 115.231.222.23 Country location: China This attacker IP address was seen in the logs for only two months in 2015 conducting brute force attacks. It ranks number two based on the high count of customers targeted. Actual dates were 17 January 2015 through 25 February 2015 (see Table 6). 3: Attacker IP address 115.239.248.237 Country location: China This attacker IP was seen in logs at the same time as the previous attacker IP address, and most of the IDS signatures were the same (see Table 7). 4: Attacker IP address 115.239.248.205 Country location: China This attacker was logged primarily in January and February of 2015, with a little activity in July. All the activity in January and February centered on SSH scanning and brute force SSH attacks. In July the traffic triggered a different signature, indicating that the attacker was attempting to launch a denial of service (DoS) attack against the target’s DNS system (see Table 8). Signature Total Event Count* Contents February Next ▶ January ◀ Previous SSH_Brute_Force 34.19% 51.73% 85.92% Multiple Rapid SSH Connections 1.97% 6.67% 8.63% OpenSSH Repeated CRC DoS 0.20% 2.65% 2.85% Sequence Verifier 0.73% 1.49% 2.22% TCP_Probe_SSH 0.04% 0.06% 0.10% TCP Invalid Checksum 0.08% 0.00% 0.08% SSH client scan 0.02% 0.06% 0.08% SSH connection flood 0.00% 0.06% 0.06% TCP anomaly 0.04% 0.00% 0.04% OpenSSH maxstartup Threshold Connection Exhaustion denial of service 0.00% 0.02% 0.02% Grand Total* 37.26% 62.74% 100.00% Table 6. Activity from IP address 115.231.222.23 (1 January 2015 – 31 December 2015). Source: IBM MSS data. Note: Percentages shown represent signature event count generated from the attacking IP address. Red highlighting indicates a higher percentage, orange a lower percentage, and green indicates zero percentage. *Totals rounded to the nearest hundredth. About IBM Security About the author References 18 ◀ Previous Next ▶ Total Event Count* January February July Total Event Count* Top 10 ports SSH_Brute_Force 31.47% 49.76% 81.23% SSH_Brute_Force 31.46% 56.32% 0.00% 87.78% Brute force password attacks Multiple Rapid SSH Connections 5.33% 3.67% 9.01% 4.09% 2.75% 0.00% 6.84% OpenSSH Repeated CRC DoS 2.67% 5.26% 7.92% Multiple Rapid SSH Connections Secure shell (SSH) brute force attacks Sequence Verifier 0.81% 0.25% 1.06% OpenSSH Repeated CRC DoS 0.00% 4.41% 0.00% 4.41% TCP Invalid Checksum 0.10% 0.10% 0.20% Sequence Verifier 0.24% 0.08% 0.00% 0.32% TCP_Probe_SSH 0.15% 0.05% 0.20% SSH User Authentication Brute-force Attempt(40015) 0.24% 0.00% 0.00% 0.24% TCP anomaly 0.08% 0.10% 0.18% SSH connection flood 0.00% 0.12% 0.00% 0.12% SSH client scan 0.05% 0.08% 0.13% SSH client scan 0.00% 0.12% 0.00% 0.12% SSH connection flood 0.03% 0.05% 0.08% DNS ANY Queries Bruteforce DOS Attack(40033) 0.00% 0.00% 0.08% 0.08% Grand Total* 40.68% 59.32% 100.00% TCP_Probe_SSH 0.04% 0.02% 0.00% 0.06% SSH_Service_Sweep 0.02% 0.00% 0.00% 0.02% Grand Total* 36.09% 63.83% 0.08% Executive overview Signature Footprinting Persistence of SSH brute force top 20 attacker IP addresses SSH brute force top five IP addresses 1 • 2 • 3 • 4 • 5 • 6 File Transfer Protocol (FTP) brute force attacks Top five FTP brute force attacker IP addresses Recommendations Protect your enterprise while reducing cost and complexity About IBM Security January February Contents Table 7. Activity from IP address 115.239.248.237 (1 January 2015 – 31 December 2015). Source: IBM MSS data. Note: Percentages shown represent signature event count generated from the attacking IP address. Red highlighting indicates a higher percentage, orange a lower percentage, and green indicates zero percentage. *Totals rounded to the nearest hundredth. Signature 100.00% Table 8. Activity from IP address 115.231.248.205 (1 January 2015 – 31 December 2015). Source: IBM MSS data. Note: Percentages shown represent signature event count generated from the attacking IP address. Red highlighting indicates a higher percentage, orange a lower percentage, and green indicates zero percentage. *Totals rounded to the nearest hundredth. About the author References 19 Next ▶ June November December Total Event Count* 2.14% 7.43% 10.62% 11.40% 2.29% 9.05% 7.58% 2.97% 4.78% 0.71% 65.82% Brute force password attacks SSH_Brute_Force 0.30% 2.80% 2.37% 1.85% 1.04% 1.69% 2.93% 0.88% 0.96% 1.72% 20.69% TCP_Probe_SSH 0.06% 1.07% 1.12% 0.84% 0.38% 0.93% 0.66% 0.01% 0.01% 0.74% 7.61% Secure shell (SSH) brute force attacks SSH.Client.Request. Mimicking 0.51% 0.02% 0.01% 0.26% 0.00% 1.68% 2.10% 0.24% 0.00% 0.00% 4.81% Geo Protection 0.01% 0.04% 0.08% 0.08% 0.05% 0.04% 0.02% 0.01% 0.01% 0.00% 0.52% TCP: SYN Host Sweep 0.01% 0.03% 0.01% 0.01% 0.00% 0.02% 0.01% 0.01% 0.00% 0.18% 0.31% Sweep Scan 0.00% 0.03% 0.02% 0.01% 0.00% 0.01% 0.01% 0.01% 0.00% 0.08% 0.17% TCP SYN Host Sweep 0.00% 0.01% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.01% TCP_Service_Sweep 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.01% PSNG_TCP_PORTSWEEP_FILTERED 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% SSH_Connection_DoS 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% Grand Total* 3.03% 11.44% 14.23% 14.44% 3.78% 13.42% 13.30% 4.13% 5.78% 3.43% 100.00% Footprinting Persistence of SSH brute force top 20 attacker IP addresses SSH brute force top five IP addresses 1 • 2 • 3 • 4 • 5 • 6 File Transfer Protocol (FTP) brute force attacks Top five FTP brute force attacker IP addresses Recommendations Protect your enterprise while reducing cost and complexity About IBM Security About the author References October May SSH_Service_Sweep Signature August April Top 10 ports Executive overview July March Contents September ◀ Previous Table 9. Activity from IP address 27.221.10.43 (1 January 2015 – 31 December 2015). Source: IBM MSS data. Note: Percentages shown represent signature event count generated from the attacking IP address. Red highlighting indicates a higher percentage, orange a lower percentage, and green indicates zero percentage. Orange cells containing “0.00%” indicate a value greater than 0.00%, but less than 0.01%. *Totals rounded to the nearest hundredth. 5: Attacker IP address 27.221.10.43 Country location: China The first activity from this IP address appeared in March 2015 and continued throughout the year (see Table 9) and into the first months of 2016 (see Table 10). This attacker was still being seen as of March 2016, making it the most persistent attacking IP address identified for the period 1 January 2015 through 31 March 2016. 20 ◀ Previous Next ▶ January February March Contents Top 10 ports SSH_Service_Sweep 0.81% 5.54% 0.59% Brute force password attacks SSH_Brute_Force 0.65% 3.46% 0.03% TCP_Probe_SSH 0.82% 0.85% 0.13% Secure shell (SSH) brute force attacks Geo Protection 0.00% 0.16% 0.00% TCP: SYN Host Sweep 0.00% 0.03% 0.00% Sweep Scan 0.00% 0.01% 0.00% NetScreen_Dest_IP_Session_ Limit 0.00% 0.00% 0.00% Grand Total* 2.28% 9.99% 0.75% Executive overview Signature Footprinting Persistence of SSH brute force top 20 attacker IP addresses SSH brute force top five IP addresses 1 • 2 • 3 • 4 • 5 • 6 File Transfer Protocol (FTP) brute force attacks Top five FTP brute force attacker IP addresses Table 10. Activity from IP address 27.221.10.43 (1 January 2016 – 31 March 2016). Source: IBM MSS data. Note: Percentages shown represent signature event count generated from the attacking IP address. Red highlighting indicates a higher percentage, orange a lower percentage, and green indicates zero percentage. *Totals rounded to the nearest hundredth. Recommendations Protect your enterprise while reducing cost and complexity About IBM Security About the author References Often we see that the same IP address is associated with both TCP service sweeps and brute force password attacks. 21 ◀ Previous Next ▶ Contents Executive overview Footprinting Top 10 ports Brute force password attacks Secure shell (SSH) brute force attacks File Transfer Protocol (FTP) brute force attacks The service File Transfer Protocol (FTP) has been around a long time and isn’t used as it once was because it doesn’t encrypt either the authentication process or the data transfer. While FTP should be configured to deny access to administrator accounts, we have witnessed successful FTP brute force attacks against these accounts (see Figure 8). Persistence of SSH brute force top 20 attacker IP addresses SSH brute force top five IP addresses File Transfer Protocol (FTP) brute force attacks 1 • 2 • 3 12% 10% 8% 6% 4% Recommendations 2% Protect your enterprise while reducing cost and complexity 0% About the author Most months in 2015 had over 100 different attacker IP addresses (see Figure 9). July had the highest with 276, which is 55 percent above the monthly average. The second highest month was November at 236 unique attacker IP addresses. FTP brute force attacks Top five FTP brute force attacker IP addresses About IBM Security Figure 8 shows that brute force FTP attacks occurred throughout 2015, ranging from 3 to 12 percent of total attacks each month. nu Ja ar y ar Fe u br y M ch ar ril Ap ay M ne Ju ly Ju t us g Au em pt e S r be er O ob ct r r be m ve o N be em c De Figure 8. FTP brute force attacks as a percentage of all observed attacks (1 January 2015 – 31 December 2015). Source: IBM MSS data. References 22 ◀ Previous Next ▶ Contents Unique attacker IP count (FTP) Executive overview 300 Footprinting 250 Top 10 ports 200 Brute force password attacks Secure shell (SSH) brute force attacks Persistence of SSH brute force top 20 attacker IP addresses SSH brute force top five IP addresses File Transfer Protocol (FTP) brute force attacks 1 • 2 • 3 Top five FTP brute force attacker IP addresses Recommendations Protect your enterprise while reducing cost and complexity 150 100 50 0 Ja a nu ry b Fe a ru ry M ch ar ril Ap ay M ne Ju ly Ju t us g Au em pt e S r be er O ob ct r r be m ve No be m ce De Figure 9. Unique attacker IP counts for FTP brute force attacks (1 January 2015 – 31 December 2015). Source: IBM MSS data. China edges out the United States with just a two percent difference to take first place as the country where most FTP brute force attacks appeared to originate (see Figure 10). Interestingly, only four of the top source countries, United States, India, France, and United Kingdom, are also part of the top ten destination countries (see Figure 11). The top two destination countries for FTP brute force attacks were the United States and France with nearly 60 percent of the total attacks. About IBM Security About the author References 23 ◀ Previous Next ▶ Contents Top 10 source countries for FTP brute force attacks Executive overview Footprinting Top 10 ports Brute force password attacks Indonesia 3% United Kingdon 3% France 4% China 21% Top 10 destination countries for FTP brute force attacks Denmark 0.85% United Kingdom 0.93% Hong Kong 1.16% Australia 2.25% Brazil 5% Japan 6.74% Germany 0.62% Italy 0.23% India 0.15% United States 32.30% Vietnam 5% Secure shell (SSH) brute force attacks Persistence of SSH brute force top 20 attacker IP addresses SSH brute force top five IP addresses File Transfer Protocol (FTP) brute force attacks 1 • 2 • 3 Top five FTP brute force attacker IP addresses Ukraine 7% Russian Federation 7% United States 19% India 10% Figure 10. The top two source countries for FTP brute force attacks were China and the United States (1 January 2015 – 31 December 2015). Source: IBM MSS data. France 27.81% Figure 11. The top two destination countries for FTP brute force attacks were the United States and France (1 January 2015 – 31 December 2015). Source: IBM MSS data. Recommendations Protect your enterprise while reducing cost and complexity About IBM Security About the author References 24 Next ▶ Executive overview Footprinting Top 10 ports Brute force password attacks Secure shell (SSH) brute force attacks Top five FTP brute force attacker IP addresses January February March April May June July October November December Total Customers Affected* Month Count 1 27.251.65.195 4.76% 2.38% 4.76% 9.52% 2.38% 4.76% 7.14% 11.90% 0.00% 0.00% 0.00% 2.38% 28.57% 9 2 141.105.70.98 0.00% 0.00% 0.00% 2.38% 7.14% 0.00% 2.38% 9.52% 0.00% 0.00% 0.00% 0.00% 19.05% 4 Rank Attacking IP File Transfer Protocol (FTP) brute force attacks This attacker was seen in FTP brute force attack logs every month in 2015. The activity from this IP was made up largely of FTP brute force attacks, but there were also footprinting and SSH brute force attacks. (See Table 12.) The top five FTP brute force password attackers were seen conducting FTP brute force attacks spanning anywhere from 2 to 12 calendar months (see Table 11). Three out of the five IP addresses had several months of activity followed by a pause of one or more months, then resumed activity. Persistence of SSH brute force top 20 attacker IP addresses SSH brute force top five IP addresses 1: Attacker IP address 27.251.65.195 Country location: India September Contents August ◀ Previous Top five FTP brute force attacker IP addresses 1 • 2 • 3 • 4 • 5 • 6 • 7 3 113.20.30.182 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 2.38% 7.14% 2.38% 2.38% 2.38% 14.29% 5 4 211.109.1.231 0.00% 0.00% 0.00% 0.00% 9.52% 2.38% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 11.90% 2 Recommendations 5 141.105.70.96 0.00% 0.00% 0.00% 4.76% 2.38% 0.00% 9.52% 0.00% 0.00% 0.00% 0.00% 0.00% 11.90% 3 Protect your enterprise while reducing cost and complexity Table 11. The top attacking IP addresses for FTP brute force in 2015. Source: IBM MSS data. Note: Percentages shown represent the percentage of customers the attacking IP targeted during 2015. Red highlighting indicates a higher percentage, orange a lower percentage, and green indicates zero percentage. *Totals rounded to the nearest hundredth. About IBM Security About the author References 25 ◀ Previous Next ▶ September November December Total Event Count* 6.57% 0.00% 0.00% 9.26% 87.69% Brute force password attacks FTP_Auth_Failed 0.65% 0.20% 0.04% 2.40% 0.00% 3.53% 0.05% 1.15% 0.00% 0.00% 0.00% 8.11% FTP_User 0.09% 0.08% 0.12% 0.00% 0.09% 2.26% 0.00% 0.00% 0.00% 0.00% 0.00% 2.64% TCP_Service_Sweep 0.33% 0.08% 0.13% 0.01% 0.01% 0.00% 0.02% 0.03% 0.04% 0.02% 0.04% 0.71% FTP Authorization Failure 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.41% 0.00% 0.41% Secure shell (SSH) brute force attacks July 15.82% 1.59% June 18.90% 0.01% May 33.35% 0.28% April 1.91% Footprinting March FTP_User_Root Signature February Top 10 ports Executive overview January August Contents Persistence of SSH brute force top 20 attacker IP addresses SSH_Brute_Force 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.18% 0.00% 0.01% 0.00% 0.00% 0.19% SSH_Service_Sweep 0.00% 0.00% 0.00% 0.00% 0.00% 0.08% 0.00% 0.00% 0.02% 0.02% 0.00% 0.12% SSH brute force top five IP addresses PSNG_TCP_PORT SWEEP_FILTERED 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% TCP: SYN Host Sweep 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% Sweep Scan 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% Grand Total* 2.98% 33.71% 0.56% 21.32% 0.12% 21.79% 1.84% 7.74% 0.06% 0.58% 9.30% 100.00% File Transfer Protocol (FTP) brute force attacks Top five FTP brute force attacker IP addresses 1 • 2 • 3 • 4 • 5 • 6 • 7 Recommendations Protect your enterprise while reducing cost and complexity Table 12. Activity from IP address 27.251.65.195 (1 January 2015 – 31 December 2015). Source: IBM MSS data. Note: Percentages shown represent signature event count generated from the attacking IP address. Red highlighting indicates a higher percentage, orange a lower percentage, and green indicates zero percentage. *Totals rounded to the nearest hundredth. About IBM Security About the author References 26 ◀ Previous Next ▶ Contents Executive overview Footprinting Top 10 ports Brute force password attacks 2: Attacker IP address 141.105.70.98 Country location: Russia This attacker was logged across six different months in 2015, but there was no activity in either June or September. The footprinting attack activity had scans for the FTP port and resulted in FTP brute force attacks. More ports were scanned, however; other ports seen were for SIP (Session Initiation Protocol, used in internet telephony)46 including ports 5060, 5061, 5095, 5070, 5095, 6060, and 6090. The FTP attacks from this attacker could have been attempts to gain access to a digital voice or collaboration system. November Total Event Count* 6.60% 13.21% 23.55% 0.00% 0.00% 46.03% TCP_Service_Sweep 27.29% 0.00% 0.42% 0.29% 5.99% 0.00% 33.99% File Transfer Protocol (FTP) brute force attacks FTP_User_Root 2.64% 1.27% 6.31% 6.47% 0.00% 0.00% 16.69% Geo Protection 0.00% 0.00% 0.00% 0.00% 0.00% 3.12% 3.12% Top five FTP brute force attacker IP addresses 1 • 2 • 3 • 4 • 5 • 6 • 7 TCP: SYN Host Sweep 0.00% 0.00% 0.00% 0.00% 0.13% 0.00% 0.16% Grand Total* 32.60% 7.87% 19.94% 30.35% 6.12% 3.12% 100.00% Recommendations Protect your enterprise while reducing cost and complexity October 2.67% SSH brute force top five IP addresses Signature August July FTP_Auth_Failed Persistence of SSH brute force top 20 attacker IP addresses April May Secure shell (SSH) brute force attacks Table 13. Activity from IP address 141.105.70.98 (1 January 2015 – 31 December 2015). Source: IBM MSS data. Note: Percentages shown represent signature event count generated from the attacking IP address. Red highlighting indicates a higher percentage, orange a lower percentage, and green indicates zero percentage. *Totals rounded to the nearest hundredth. About IBM Security About the author References 27 Next ▶ Contents Executive overview Footprinting Top 10 ports Brute force password attacks This attacker was seen in FTP brute force attack logs for 5 out of 12 months, but was seen in SSH brute force attack logs the month before attacks from this address appeared for FTP brute force. November December Total Event Count* FTP_User_Root 0.00% 34.22% 37.66% 0.54% 8.00% 0.66% 81.07% SSH brute force top five IP addresses TCP_Service_Sweep 0.01% 0.09% 3.67% 0.41% 0.00% 4.66% 8.85% FTP_Auth_Failed 0.00% 1.34% 5.41% 0.05% 1.66% 0.34% 8.81% File Transfer Protocol (FTP) brute force attacks SSH_Brute_Force 0.18% 0.00% 0.00% 0.58% 0.20% 0.00% 0.96% SSH_Service_Sweep 0.00% 0.05% 0.00% 0.04% 0.12% 0.00% 0.21% TCP: SYN Host Sweep 0.00% 0.00% 0.05% 0.00% 0.00% 0.00% 0.05% Sweep Scan 0.00% 0.01% 0.00% 0.00% 0.00% 0.01% 0.03% PSNG_TCP_PORTS0.00% WEEP_FILTERED 0.00% 0.01% 0.00% 0.00% 0.00% 0.01% Grand Total* 35.72% 46.81% 1.62% 9.97% 5.68% 100.00% Top five FTP brute force attacker IP addresses 1 • 2 • 3 • 4 • 5 • 6 • 7 Recommendations Protect your enterprise while reducing cost and complexity About IBM Security About the author July Persistence of SSH brute force top 20 attacker IP addresses Signature 0.20% August October Secure shell (SSH) brute force attacks 3: Attacker IP address 113.20.30.182 Country location: Indonesia September ◀ Previous Table 14. Activity from IP address 113.20.30.182 (1 January 2015 – 31 December 2015). Source: IBM MSS data. Note: Percentages shown represent signature event count generated from the attacking IP address. Red highlighting indicates a higher percentage, orange a lower percentage, and green indicates zero percentage. *Totals rounded to the nearest hundredth. References 28 ◀ Previous Next ▶ Contents Executive overview Footprinting Top 10 ports Brute force password attacks Secure shell (SSH) brute force attacks 4: Attacker IP address 211.109.1.231 Country location: Korea This attacker was seen for just a little over one month (7 May 2015 – 12 June 2015), so we’re showing a daily view of this particular data rather than a whole year’s worth (Tables 15 and 16). Even though this is a short time frame of activity, due to the high number of customers it attacked, this IP address ranked fourth. 10 May 2015 12 May 2015 13 May 2015 17 May 2015 22 May 2015 24 May 2015 25 May 2015 26 May 2015 Total event count* 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 53.51% 0.00% 0.00% 0.00% 0.00% 6.76% 74.50% FTP_Auth_Failed 0.34% 0.01% 0.00% 0.00% 0.00% 0.00% 0.00% 0.20% 0.00% 0.00% 0.00% 1.97% 15.27% FTP_User 0.00% 0.00% 0.00% 2.03% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 5.00% TCP_Service_ Sweep 1.24% 0.01% 0.04% 0.12% 0.04% 0.11% 0.00% 1.25% 0.00% 0.15% 0.14% 0.02% 4.98% Recommendations FTP: login Bruteforce attempt (40001) 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.01% 0.24% Protect your enterprise while reducing cost and complexity PSNG_TCP_PORT SWEEP_FILTERED 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.01% TCP: SYN Host Sweep 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.01% Grand Total* 1.58% 0.02% 0.05% 2.14% 0.04% 0.12% 53.51% 1.43% 0.00% 0.15% 3.11% 10.78% 100.00% File Transfer Protocol (FTP) brute force attacks Top five FTP brute force attacker IP addresses 1 • 2 • 3 • 4 • 5 • 6 • 7 About IBM Security About the author References Signature 19 May 2015 8 May 2015 FTP_User_Root SSH brute force top five IP addresses 18 May 2015 7 May 2015 Persistence of SSH brute force top 20 attacker IP addresses There are both footprinting and brute force (against FTP) attack patterns. FTP User Root covers login attempts for administrator accounts such as “root,” “Administrator,” and “admin.” The largest event count was from the brute force attacks, but the footprinting attacks were seen across the greatest number of days. The FTP User signature is an audit event that isn’t enabled often, which explains why the same volume of events is not seen for both FTP User and FTP User Root. Table 15. Activity from IP address 211.109.1.231 (7 May 2015 – 26 May 2015). Source: IBM MSS data. Note: Percentages shown represent signature event count generated from the attacking IP address. Red highlighting indicates a higher percentage, orange a lower percentage, and green indicates zero percentage. *Totals rounded to the nearest hundredth. 29 Next ▶ 4 June 2015 5 June 2015 8 June 2015 12 June 2015 Total Event Count* 0.03% 12.02% 0.00% 0.00% 0.00% 0.00% 0.00% 0.01% 0.14% 0.00% 74.50% FTP_Auth_Failed 0.00% 0.00% 12.69% 0.00% 0.00% 0.00% 0.01% 0.00% 0.00% 0.03% 0.03% 15.27% FTP_User 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 5.00% TCP_Service_Sweep 0.02% 0.00% 0.00% 0.00% 0.01% 0.14% 0.15% 0.01% 0.02% 0.14% 1.38% 4.98% Persistence of SSH brute force top 20 attacker IP addresses FTP: login Brute-force attempt(40001) 0.09% 0.00% 0.00% 0.14% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.24% PSNG_TCP_PORTSWEEP_FILTERED 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.01% SSH brute force top five IP addresses TCP: SYN Host Sweep 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.01% 0.00% 0.01% Grand Total* 0.03% 24.71% 0.14% 0.01% 0.14% 0.15% 0.01% 0.03% 0.33% 1.41% 100.00% Footprinting Top 10 ports Brute force password attacks Secure shell (SSH) brute force attacks File Transfer Protocol (FTP) brute force attacks Top five FTP brute force attacker IP addresses 1 • 2 • 3 • 4 • 5 • 6 • 7 Recommendations Protect your enterprise while reducing cost and complexity About IBM Security About the author References 0.11% 11 June 2015 2 June 2015 0.00% Signature 31 May 2015 28 May 2015 FTP_User_Root Executive overview 30 May 2015 27 May 2015 Contents 10 June 2015 ◀ Previous Table 16. Activity from IP address 211.109.1.231 (27 May 2015 – 12 June 2015). Source: IBM MSS data. Note: Percentages shown represent signature event count generated from the attacking IP address. Red highlighting indicates a higher percentage, orange a lower percentage, and green indicates zero percentage. *Totals rounded to the nearest hundredth. 5: Attacker IP address 141.105.70.96 Country location: Russia This attacker acted differently from the other top five FTP brute force attacker IP addresses in that its FTP brute force events (signatures highlighted in grey in Table 17) did not have a high volume. Its footprinting attacks logged higher event counts and included sweeps and scans not only for port 21 (FTP), but also for common HTTP proxy ports (81 through 88, 8080 through 8089), plus port 8086, registered with IANA for “Distributed SCADA Networking Rendezvous Port,” and port 8383, registered with IANA for “M2M Services”. M2M means machine-to-machine and is associated with IoT (Internet of Things) device use, generally in an industrial context. We surmise that the attacker was searching for specific industrial control equipment with an exposed FTP service. 30 ◀ Previous Next ▶ April May June July Signature March Executive overview Total Event Count* Contents Top 10 ports TCP_Probe_Other 0.00% 0.00% 0.00% 52.10% 0.00% 52.10% Brute force password attacks TCP_Service_Sweep 13.74% 0.02% 17.88% 0.01% 2.64% 34.30% TCP_Port_Scan 0.03% 0.00% 9.11% 0.02% 0.00% 9.17% Secure shell (SSH) brute force attacks FTP_User_Root 0.00% 0.91% 0.12% 0.01% 0.97% 2.01% FTP_Auth_Failed 0.00% 0.49% 0.20% 0.00% 0.89% 1.58% FTP_User 0.00% 0.74% 0.00% 0.00% 0.00% 0.74% TCP: SYN Host Sweep 0.00% 0.02% 0.00% 0.00% 0.03% 0.05% SSH brute force top five IP addresses FTP Authorization Failure 0.00% 0.00% 0.02% 0.00% 0.00% 0.02% PSNG_TCP_PORTSWEEP_FILTERED 0.00% 0.01% 0.00% 0.00% 0.00% 0.01% File Transfer Protocol (FTP) brute force attacks HTTP_AuthResponse_Possible_CSRF 0.00% 0.00% 0.00% 0.00% 0.01% 0.01% PSNG_TCP_FILTERED_PORTSCAN 0.00% 0.01% 0.00% 0.00% 0.00% 0.01% Grand Total* 13.78% 2.20% 27.33% 52.15% 19.94% 100.00% Footprinting Persistence of SSH brute force top 20 attacker IP addresses Top five FTP brute force attacker IP addresses 1 • 2 • 3 • 4 • 5 • 6 • 7 Recommendations Protect your enterprise while reducing cost and complexity Table 17. Activity from IP address 141.105.70.96 (1 March 2015 – 31 July 2015). Source: IBM MSS data. Note: Percentages shown represent signature event count generated from the attacking IP address. Red highlighting indicates a higher percentage, orange a lower percentage, and green indicates zero percentage. *Totals rounded to the nearest hundredth. About IBM Security About the author References 31 ◀ Previous Next ▶ Contents Executive overview Footprinting Top 10 ports Brute force password attacks Secure shell (SSH) brute force attacks Persistence of SSH brute force top 20 attacker IP addresses SSH brute force top five IP addresses File Transfer Protocol (FTP) brute force attacks Top five FTP brute force attacker IP addresses Recommendations 1 • 2 Protect your enterprise while reducing cost and complexity Recommendations Our data shows that footprinting techniques such as service sweeps and port scans are still being carried out with some frequency. Attackers often use the results of scanning to conduct brute force password attacks. Because the IoT devices and industrial control systems increasingly present in networks don’t always get the level of security review given a new computer, they can more easily fall victim to both footprinting and brute force attacks. We provide the following recommendations to help avoid this result. Footprinting • Footprint your own network from the Internet, using the same techniques as an attacker. While you may be able to assemble a kit of tools like Kali Linux, a vulnerability scanning service can continuously monitor your attack surface. • Check network mapping search engines such as Shodan to see if your banners are revealing details they shouldn’t. • Footprint your network from the inside to help ensure that only approved and inventoried devices are connected and to detect unapproved devices. Your footprinting should include port detection and software versions to ensure that no unpatched, vulnerable versions are present. • Disable all unnecessary or insecure services, replacing services that have weak security with stronger counterparts. For example, replace telnet with SSH. • If a service such as SSH, which defaults to listening on TCP port 22, can be changed to another port number without negatively impacting operations, doing so would lessen its chance of being attacked by systems that could connect to it. • Use a firewall to allow access only from authorized networks and IP addresses to services they require. Do not allow “all” to connect to services such as SSH, FTP and databases unless that’s absolutely necessary for the type of service you provide. About IBM Security About the author References 32 ◀ Previous Next ▶ Contents Executive overview Footprinting Top 10 ports Brute force password attacks Secure shell (SSH) brute force attacks Persistence of SSH brute force top 20 attacker IP addresses SSH brute force top five IP addresses File Transfer Protocol (FTP) brute force attacks Top five FTP brute force attacker IP addresses Recommendations 1 • 2 Protect your enterprise while reducing cost and complexity Brute force attacks • Enforce complex passwords. Stipulate a minimum length of eight characters and a combination of upper- and lower-case letters, numbers and special characters such as punctuation marks and mathematical symbols. • Change your password every so often, even when not forced to do so, but do NOT use a derivation of a previously used password. And never, ever use weak passwords. • When you use the same password across many sites, you risk multiple account compromises if even just one vendor is breached. A local password manager helps in managing the use of many passwords. Keep the master password written down and locked securely in a safe. • Make sure the answers to your security questions are difficult to guess or to look up in publicly available information. If a site lets you create your own question, make it as esoteric as possible. For example, one comedian suggested the question “What are you wearing right now?” and the answer “That’s a totally inappropriate question!” But obviously, don’t use that question and answer • • • • because we’ve just published it openly, haven’t we? Never use your real high school, mother’s maiden name, or any other information that can be gleaned from social media and public records such as obituaries. You can still use the maiden name option, of course. Just choose an answer that’s not true, and would be difficult to guess. Use two-factor authentication when available. Disable accounts if they’re not being used. If you’ve been granted access to an application or service but don’t plan to use it, have the account disabled. If you think you might happen to need it sometime in the distant future, challenge yourself to make the password the toughest one to crack. Implement account lockout features. That can be very effective at slowing down or blocking remote brute force password attacks, but please be aware of the considerations found here: https://www.owasp.org/index.php/Blocking_ Brute_Force Attacks Do not allow administrator accounts to be logged into directly. Disable them in operating systems that allow you to do so. About IBM Security About the author References 33 ◀ Previous Next ▶ Contents Executive overview Footprinting Top 10 ports Brute force password attacks Secure shell (SSH) brute force attacks Persistence of SSH brute force top 20 attacker IP addresses SSH brute force top five IP addresses File Transfer Protocol (FTP) brute force attacks Top five FTP brute force attacker IP addresses Recommendations Protect your enterprise while reducing cost and complexity About IBM Security About the author References Protect your enterprise while reducing cost and complexity From infrastructure, data and application protection to cloud and managed security services, IBM Security Services has the expertise to help safeguard your company’s critical assets. We protect some of the most sophisticated networks in the world and employ some of the best minds in the business. IBM offers services to help you optimize your security program, stop advanced threats, protect data and safeguard cloud and mobile. With IBM Managed Security Services, you can take advantage of industry-leading tools, security intelligence and expertise that will help you improve your security posture—often at a fraction of the cost of in-house security resources. Our Managed Protection Service offers around-the-clock monitoring, management and incident escalation to help protect your networks, servers and desktops. Identity and Access Management services target virtually every aspect of identity and access management across your enterprise, including user provisioning, web access management, enterprise single sign-on, multi-factor authentication, and user activity compliance. About IBM Security IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned IBM X-Force research and development, provides security intelligence to help organizations holistically protect their people, infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors billions of security events per day in more than 130 countries, and holds more than 3,000 security patents. 34 ◀ Previous Next ▶ Contents About the Author Contributors Executive overview Scott Craig is a Threat Researcher for IBM Managed Security Services. Scott has worked in the IT field for more than 20 years, 17 of which were dedicated to computer security. Before being dedicated to computer security, Scott’s work as an enterprise Unix system administrator and a systems architect helped him to understand the way security fits into overall systems. Scott’s unique ability to find patterns of interest in security device logs is what helped him become successful in his last role in IBM Managed Security Services as a team lead of the Data Intelligence group. In his role as an IBM Threat Researcher, Scott mines through millions of rows of data in search of stories worth sharing with others. Through these efforts, he hopes to improve every entity’s data security which, in turn, helps every person who has a file about them somewhere. Dave McMillen – Senior Threat Researcher, Threat Research Group Footprinting Top 10 ports Brute force password attacks Secure shell (SSH) brute force attacks Persistence of SSH brute force top 20 attacker IP addresses SSH brute force top five IP addresses File Transfer Protocol (FTP) brute force attacks Top five FTP brute force attacker IP addresses Recommendations Michelle Alvarez – Threat Researcher, Threat Research Group For more information To learn more about the IBM Security portfolio, please contact your IBM representative or IBM Business Partner, or visit: ibm.com/security For more information on security services, visit: ibm.com/security/services Follow @IBMSecurity on Twitter or visit the IBM Security Intelligence blog Protect your enterprise while reducing cost and complexity About IBM Security About the author References 35 ◀ Previous Next ▶ Contents Executive overview Footprinting http://www-01.ibm.com/common/ssi/cgi-bin/ssialias?subtype= WH&infotype=SA&htmlfid=WGL03114USEN&attachment= WGL03114USEN.PDF 1 http://capec.mitre.org/data/definitions/169.html 2 http://capec.mitre.org/data/definitions/49.html 3 Brute force password attacks Secure shell (SSH) brute force attacks Persistence of SSH brute force top 20 attacker IP addresses http://www.bekkoame.ne.jp/~s_ita/port/port1-99.html 25 http://www.darkreading.com/vulnerabilities---threats/hackin-atthe-car-wash-yeah/d/d-id/1319156 26 27 http://capec.mitre.org/data/definitions/300.html 28 5 https://en.wikipedia.org/wiki/Shodan https://www.shodan.io/ http://www.theregister.co.uk/2016/02/08/alibaba_taobao_ security_process_failure/ 29 http://www.itworldcanada.com/article/nasa-breach-shows-againthat-brute-force-password-attacks-work/380475 31 6 7 http://www.simovits.com/trojans/trojans.html 24 http://capec.mitre.org/data/definitions/112.html 4 Top 10 ports http://www.speedguide.net/ports.php 23 http://cve.mitre.org/about/index.html http://cve.mitre.org/data/downloads/index.html 30 https://exchange.xforce.ibmcloud.com/vulnerabilities/106137 http://capec.mitre.org/data/definitions/1000.html 32 http://capec.mitre.org/data/definitions/169.html 33 8 9 http://www.metasploit.com/ https://nmap.org/ 34 http://dankaminsky.com/2002/11/18/77/ 35 12 http://www.irongeek.com/i.php?page=backtrack-3-man/amap 36 SSH brute force top five IP addresses 13 https://www.defcon.org/images/defcon-13/dc13-presentations/ DC_13-Lee.pdf 37 File Transfer Protocol (FTP) brute force attacks 15 Top five FTP brute force attacker IP addresses 16 Recommendations 18 Protect your enterprise while reducing cost and complexity About IBM Security About the author 10 11 https://zmap.io/ 14 https://www.washingtonpost.com/news/the-switch/wp/2013/08/ 18/heres-what-you-find-when-you-scan-the-entire-internet-in-anhour/ http://blog.erratasec.com/2013/09/masscan-entire-internet-in3-minutes.html#.VtR_S3UrIkV ftp://ftp.cerias.purdue.edu/pub/tools/unix/scanners/iss/ http://sqlmap.org/ http://sqlninja.sourceforge.net/ https://en.wikipedia.org/wiki/Wikei/Kali_Linux http://sectools.org/tool/brutus/ 38 http://foofus.net/goons/jmk/medusa/medusa.html 39 https://nmap.org/ncrack/ 40 https://www.thc.org/thc-hydra/ 41 42 17 http://fossbytes.com/the-hacker-search-engine-shodan-is-thescariest-search-engine-on-internet/ http://blog.level3.com/security/breaking-botnets-how-level-3and-cisco-worked-together-to-improve-the-internets-securityand-stop-sshpsychos/ 44 https://thingful.net/ 45 20 https://exchange.xforce.ibmcloud.com/signature/TCP_Service_ Sweep 21 http://blog.level3.com/security/breaking-botnets-how-level-3and-cisco-worked-together-to-improve-the-internets-securityand-stop-sshpsychos/ 43 https://censys.io/about 19 https://cwe.mitre.org/data/definitions/798.html https://ics-cert.us-cert.gov/advisories/ICSA-15-125-01B https://blogs.cisco.com/security/talos/sshpsychos http://longtail.it.marist.edu/honey/index.shtml https://en.wikipedia.org/wiki/Session_Initiation_Protocol 46 http://www.iana.org/assignments/service-names-portnumbers/service-names-port-numbers.xhtml 22 References 36 ◀ Previous Next ▶ Contents © Copyright IBM Corporation 2016 Executive overview IBM Security Route 100 Somers, NY 10589 Footprinting Top 10 ports Brute force password attacks Secure shell (SSH) brute force attacks Persistence of SSH brute force top 20 attacker IP addresses SSH brute force top five IP addresses Produced in the United States of America April 2016 IBM, the IBM logo, ibm.com and X-Force are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at “Copyright and trademark information” at ibm.com/legal/copytrade.shtml Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. UNIX is a registered trademark of The Open Group in the United States and other countries. File Transfer Protocol (FTP) brute force attacks This document is current as of the initial date of publication and may be changed by IBM at any time. Not all offerings are available in every country in which IBM operates. Top five FTP brute force attacker IP addresses THE INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided. Recommendations Protect your enterprise while reducing cost and complexity About IBM Security About the author References Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. SEL03093-USEN-00