ExtraHop report shows prevalence and cyber risks of internet exposed network protocols - The EE

ExtraHop report shows prevalence and cyber risks of internet exposed network protocols

Jeff Costlow of ExtraHop

Seattle, WA., USA. 4 August2022 – ExtraHop, a specialist in cloud-native network intelligence, today released findings from the ExtraHop Benchmarking Cyber Risk and Readiness report. It shows a significant percentage of organisations expose insecure or highly sensitive protocols, including SMB, SSH, and Telnet, to the public internet. Whether intentional or accidental, these exposures broaden the attack surface of any organisation by providing cyberattackers an easy entry point into the network.

Since the Russian invasion of Ukraine, governments and security experts around the world have noticed a significant increase in cyberattack activity. The Cybersecurity and Infrastructure Security Agency (CISA) and other government agencies such as ENISA, CERT-EU, ACSC, and SingCERT have strongly encouraged enterprises to focus on strengthening their overall security postures, starting with reducing the likelihood of a damaging cyber intrusion. One key recommendation made by these agencies is that organisations disable all unnecessary or insecure ports and protocols. 

In the new report, ExtraHop conducted an analysis of enterprise IT environments to benchmark the cybersecurity posture of organisations based on open ports and sensitive protocol exposure so that security and IT leaders can assess their risk posture and attack surface visibility relative to other organisations. The study breaks down, out of every 10,000 devices in an enterprise network, the number of vulnerable protocols exposed to the internet. 

Key findings

  • SSH is the most exposed sensitive protocol: Secure Shell (SSH) is a well-designed protocol with good cryptography for securely accessing remote devices. It is also one of the most widely used protocols, making it a favourite target for cybercriminals looking to access and control devices across an enterprise. 64% of organisations have at least one device exposing this protocol to the public internet. Organisations expose 32 devices out of 10,000.
  • LDAP exposure is high: Lightweight directory access protocol (LDAP) is a vendor-neutral application protocol that maintains distributed directory information in an organised, easy-to-query manner. Windows systems use LDAP to look up usernames in Active Directory. By default, these queries are transmitted in plaintext giving attackers an opportunity to discover usernames. With 41% of organisations having at least one device exposing LDAP to the public internet, this sensitive protocol has an outsized risk factor. 
  • Exposed database protocols open doors for attacks: Database protocols enable users and software to interact with databases, inserting, updating, and retrieving information. When an exposed device is listening on a database protocol, it exposes the database as well. 24% of organisations have at least one device exposing Tabular Data Stream (TDS) to the public internet. This Microsoft protocol for communicating with databases transmits data in plaintext, making it vulnerable to interception.
  • File server protocols at risk: In looking at the four protocol types (file server protocols, directory protocols, database protocols, and remote control protocols), the vast majority of cyberattacks occur in file server protocols, which involve attackers moving files from one place to another. 31% of organisations have at least one device exposing Server Message Block (SMB) to the public internet. Organisations expose 64 devices out of 10,000.
  • FTP is not as secure as it can be: File transfer protocol (FTP) is not a full-service file access protocol. It sends files over networks as a stream and offers practically no security. It transmits data, including usernames and passwords, in plaintext, which makes its data easy to intercept. While there are at least two secure alternatives, 36% of organisations expose at least one device using this protocol to the public internet and three devices out of 10,000. 
  • Protocol usage differs by industry: This is indicative of different industries investing in different technologies and having different requirements for storing data and interacting with remote users. When considering all industries together, SMB was the most prevalent protocol exposed.
  • In financial services, SMB is exposed on 34 devices out of 10,000.
  • In healthcare, SMB is exposed on seven devices out of 10,000.
  • In manufacturing, SMB is exposed on two devices out of 10,000.
  • In retail, SMB is exposed on two devices out of 10,000.
  • In SLED, SMB is exposed on five devices out of 10,000.
  • In tech, SMB is exposed on four devices out of 10,000.
  • Organisations continue to leverage Telnet: Telnet, an old protocol for connecting to remote devices, has been deprecated since 2002. Yet 12% of organisations have at least one device exposing this protocol to the public internet. As a best practice, IT organisations should disable Telnet anywhere it is found on their network.

“Ports and protocols are essentially the doors and hallways that attackers use for exploring networks and causing damage,” says Jeff Costlow, CISO, ExtraHop. “That’s why knowing which protocols are running on your network and what vulnerabilities are associated with them is so important. This gives defenders the knowledge to make an informed decision about their risk tolerance and take actions such as maintaining a continuous inventory of software and hardware in an environment, patching software quickly and continuously, and investing in tools for real-time insights and analysis to improve their cybersecurity readiness.”

To learn more about protocols and threat activities associated with them, visit the ExtraHop Network Protocol Glossary.

Follow us and Comment on Twitter @TheEE_io

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close