Skip to main content
Attack profile per each EC2 geographic zone

Your Amazon EC2 attack profile changes on different geographic region

Summary

The experiment highlights the correlation among sources and types of attacks across Amazon EC2 geographic zones (or regions) by using Smart Honeypots. The purpose is to identify whether choice of EC2 geographic region has an impact on risk profile of a Cloud-based host.

  • With only 6% correlation on source of intrusions, 94% of intruders were unique to each zone.
  • The attack profile between zones were completely different. Tokyo zone received significant number of NTP amplification intrusions, where Ireland suffered the most from SNMP scanning and N.Virginia from SSH brute-force attempts.
  • Intruders targeting N.Virginia were mainly sourced from Russia and China, whereas Sydney zone received most intrusions from Netherlands.
  • Except for DNS amplification intrusions that widely observed on all zones, intruders were only targeted a single zone.
  • DNS amplification, SSH brute-forcing, VoIP, SNMP and UPNP scanning had the highest correlation across all zones.
  • Ecatel and Firering (NL), OVH (France), Redstation (UK) and VolumeDrive (US) were top non-Chinese providers that allowed for their environment to be used for launching attacks.
  • Read our recommendation (on the last page) on how to improve the security of your cloud instance by getting access to our cloud-based custom blacklist service.

(more…)

An in-depth analysis of SSH attacks on Amazon EC2

Summary

The research study investigates Secure Shell (SSH) attacks on Amazon EC2 cloud instances across different AWS zones by means of deploying Smart Honeypot (SH). It provides an in-depth analysis of SSH attacks, SSH intruders profile, and attempts to identify their tactics and purposes.

Key observations for this research experiment are as following:

  • Without disclosure of SH’s IP addresses, in less than 10 hours, first brute-force attempt was detected.
  • Over 89% of intruders only targeted one SH in one zone;
  • Three threat actors (attacker’s profile) were detected – brute-forcer, infector and commander – by which their source IP addresses were completely different;
  • Typically, blacklists are limited to prevent the first threat actor i.e. brute-forcer and not the other two;
  • Top three (3) origin country of attacks (based on whois information) were China, Russia and Egypt;
  • Some password lists used for brute-forcing SSH service were limited to few passwords and targeted toward compromising other malicious groups infected hosts;
  • VoIP services, network appliances and development tools account names were constantly targeted by intruders;
  • Upon a successful password guess, a new actor (Infector) appeared to upload malicious files to SH and a connection were made to an external Command and Control server;
  • A number of tactics were used to hide malicious executable, replace legitimate executable with infected ones and disable audit functionalities of the operating system;
  • A third actor (Commander) employed the infected SH to conduct denial-of-service (DoS) attacks;
  • On average intruders’ source IP address was observed for a day and there was no further connection to check the status of the infected host or re-deploy the malicious files.

(more…)

Your EC2 intance can mine a bitcoin. Well, not for you!

Different variance of ‘old’ php-cgi remote code execution vulnerability (i.e. CVE-2012-1823) was observed across EC2 Smart Honeypot instances. The interesting piece was differences in the attack drop-by files::

  1. Hosting a IRC bot (DDoS, RCE etc.) – as always!
  2. Hosting a Linux.Darlloz worm – observed again.
  3. Hosting a Crypto Currency miner – interesting piece!
  4. Hosting a port scanner – not very well scripted!

(more…)