Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


06:15 PM

Internet Scan Shows Decline in Insecure Network Services

While telnet, rsync, and SMB, exposure surprisingly have dropped, proper patching and encryption adoption remain weak worldwide.

A comprehensive study of Internet-connected devices conducted over nearly four weeks in late March and early April shows that organizations surprisingly have become better about not exposing the most insecure services to the Internet.

Rapid7 today released a massive 165-page report on the state of security on the Net that found easy-to-exploit protocols — such as server message block (SMB), file transfer protocol (FTP), and telnet — have declined anywhere from 2% to 16%, despite the move to remote work after the start of the coronavirus pandemic, according to Rapid7's National/Industry/Cloud Exposure Report (NICER). Given that Asia and Europe were firmly in lockdowns and the United States had just started entering its own lockdown, the researchers expected a lot more chaos.

The Internet's security situation has definitely improved, says Tod Beardsley, director of research for Rapid7. "We saw a fairly large drop in SMB and telnet, our favorite vulnerable punching bags — things that you should never, ever, ever put on the Internet," he says. "So, at least structurally, on a protocol and service basis, the Internet seems to be going in the right direction, which was surprising to us."

But a great deal of security problems continue to be apparent, Rapid7 found. Most organizations continue to delay patches, with 3.6 million SSH servers apparently running software version that are between 5- and 14-years old, the report found. More websites continue to offer the insecure HTTP protocol, rather than enforcing encrypted connections. 

For most protocols, millions of servers are running vulnerable versions of software or configured to allow the use of no encryption. Often, the infrastructure seems to be left vulnerable through neglect, the report stated. More than 3 million databases allow unencrypted queries, while nearly 3 million networking devices  — such as routers and switches — accept unencrypted telnet connections.

"The internet is not an automatic money- and culture-generating machine," the report stated. "It depends on the heroic efforts of thousands and thousands of professionals who are committed to its well-being, even in the face of daily attacks from a wide array of technically savvy criminals and spies."

The report also measured every country and industry based on the relative security of their Internet endpoints. Using a measure of vulnerable attack-surface area consisting of the number of Internet addresses, vulnerable software at those addresses, and the total number of vulnerabilities found in a specific device, Rapid7 created a measure of relative vulnerability for each country and industry. 

The United States and China sit at the top of the chart, which is unsurprising, given that the two countries own a great deal of Internet address space.

"With more endpoints, you have more chances to fail, because you have more patches you have to keep up with," Beardsley says

Rapid7 also graded each industry for its relative security posture, by combining the number of endpoints exposed with the number of vulnerabilities detected per endpoint. The aerospace and auto-parts manufacturing industries made top marks for security, while telecommunications, financial services, and healthcare sat at the bottom of the grading chart.  

The majority of instances of insecure protocols occurred in vulnerable versions of the Apache Web server, which for many organizations may represent an embedded server on a network appliance or other device. More than 80% of these vulnerable devices were more the three years old, Rapid7 says. 

The company argued that well-informed policy makers could help companies better secure their systems by issuing guidance on insecure protocols, share threat information about known weak protocols with other countries, and study how such protocols can affect national economies. 

"Overall, what we are finding is that businesses are slowly going in the right direction," Beardsley says. "The distribution is pretty lumpy, some countries are doing things better than other countries. There is work to be done here."

Related Content




Register now for this year's fully virtual Black Hat USA, scheduled to take place August 1–6, and get more information about the event on the Black Hat website. Click for details on conference information and to register.

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Google's new See No Evil policy......
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-21
White Shark System (WSS) 1.3.2 is vulnerable to unauthorized access via user_edit_password.php, remote attackers can modify the password of any user.
PUBLISHED: 2021-06-21
White Shark System (WSS) 1.3.2 is vulnerable to sensitive information disclosure via default_task_add.php, remote attackers can exploit the vulnerability to create a task.
PUBLISHED: 2021-06-21
White Shark System (WSS) 1.3.2 is vulnerable to CSRF. Attackers can use the user_edit_password.php file to modify the user password.
PUBLISHED: 2021-06-20
The Quiz And Survey Master – Best Quiz, Exam and Survey Plugin WordPress plugin before 7.1.18 did not sanitise or escape its result_id parameter when displaying an existing quiz result page, leading to a reflected Cross-Site Scripting issue. This c...
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 44741ff99f7a71df45420635b238b9c22093647a contains a buffer overflow which could allow attackers to obtain sensitive information.