Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

2/15/2017
07:01 AM
Connect Directly
Twitter
Twitter
RSS
E-Mail
100%
0%

The 10 Most Cyber-Exposed Cities In The US

At RSAC, Trend Micro researchers showcase municipalities with the highest percentage of discoverable devices and systems connected via the public Internet.

New research released today at the RSA Conference confirms conventional wisdom that unprotected Internet-facing devices are making things a lot less safe for all of us. In this case, an investigation by the Trend Micro Forward-Looking Threat Research Team found tens of thousands of webcams, network attached storage devices, routers, printers, phones, media players among those devices discoverable on the Internet like sitting ducks.

The team took a look at how these exposures are distributed across the biggest US cities and put both their owners and others online at risk of data theft and exposure, lateral movement to more valuable network assets, and DDoS attacks perpetrated by their forced participation. 

The researchers will be diving into the specifics of their report, US Cities Exposed: A Shodan-Based Security Study on Exposed Assets in the US, later today at RSAC. The report details the study they did of a month's worth of Shodan search results looking for discoverable Internet-connected devices and systems that can be accessed via the public Internet, and which are located within the 10 US cities with the largest populations, according to the most recent census data. 

The findings show that distributions of exposed cyber assets were disproportionate according to population size. The US' second-most populous city, Los Angeles, topped the list of US cities with approximately 4 million exposed devices online. Meanwhile, the most populous city in the country by a landslide - New York - was a respectable seventh place when ranking these ten cities by overall exposed cyber assets. Even though New York has nearly four times the population of Houston, for example, it has 3.78 times fewer exposed cyber assets. 

In terms of the types of devices and services found, firewalls were the number one exposure located within the cities assessed. In these instances, the administrative interface of the firewall is exposed, making it possible for attackers to attempt brute-force attacks to gain entry into the interface and, once inside, change firewall rules to allow malicious traffic into the network. The next most frequently found devices were webcams, routers and wireless access points, printers and PBX phones.

Researchers noted that the exposures likely come as a result of one or more factors, including poor configuration, required connectivity to make Internet of Things (IoT) function correctly, and remote access enabled to make remote troubleshooting or remote operations possible.

Cities examined in the research had different concentrations in the types of devices exposed. For example, Houston and Chicago came in first and second, respectively, for total exposed webcams. San Jose led the pack in terms of exposed PBX phones, as well as exposed devices using SNMP, and exposed devices using Telnet. Phoenix came in first for exposed NAS devices.

Perhaps most troubling to the researchers conducting this study was the number of exposed databases across all cities.

"Databases are a huge gap in security for companies where, if an attacker gets into the database, then you're basically looking at them consuming everything without too much effort," says Numaan Huq, senior threat researcher for Trend Micro. In particular, he notes that there were a significant number of medical databases exposed on the Internet.

The study showed that Chicago led the list of cities with the most medical databases exposed. Another common exposure was the number of Mongo DB and other non-relational databases lacking any kind of authentication - a finding that hackers discovered before this study could be published, to the detriment of many organizations last month.

"We quickly saw that, since these are more or less unauthenticated databases, that the data could be stolen or even yet, it could be encrypted and held for ransom," says Stephen Hilt, senor threat researcher for Trend Micro. "And, as we know, in the last few months, that’s actually been happening."

Related RSAC-Related Content: 

 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RDP Bug Takes New Approach to Host Compromise
Kelly Sheridan, Staff Editor, Dark Reading,  7/18/2019
The Problem with Proprietary Testing: NSS Labs vs. CrowdStrike
Brian Monkman, Executive Director at NetSecOPEN,  7/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-12162
PUBLISHED: 2019-07-23
Upwork Time Tracker 5.2.2.716 doesn't verify the SHA256 hash of the downloaded program update before running it, which could lead to code execution or local privilege escalation by replacing the original update.exe.
CVE-2018-18669
PUBLISHED: 2019-07-23
GNUBOARD5 5.3.1.9 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "board title contents" parameter, aka the adm/board_form_update.php bo_subject parameter.
CVE-2019-10101
PUBLISHED: 2019-07-23
Jsish 2.4.84 2.0484 is affected by: Reachable Assertion. The impact is: denial of service. The component is: function Jsi_ValueArrayIndex (jsiValue.c:366). The attack vector is: executing crafted javascript code. The fixed version is: after commit 738ead193aff380a7e3d7ffb8e11e446f76867f3.
CVE-2019-9815
PUBLISHED: 2019-07-23
If hyperthreading is not disabled, a timing attack vulnerability exists, similar to previous Spectre attacks. Apple has shipped macOS 10.14.5 with an option to disable hyperthreading in applications running untrusted code in a thread through a new sysctl. Firefox now makes use of it on the main thre...
CVE-2019-9816
PUBLISHED: 2019-07-23
A possible vulnerability exists where type confusion can occur when manipulating JavaScript objects in object groups, allowing for the bypassing of security checks within these groups. *Note: this vulnerability has only been demonstrated with UnboxedObjects, which are disabled by default on all supp...