Wi-Fi is an Answer for Africa: Across Africa demands are changing, access models are changing and consumers are blurring the lines between corporate
A+ A A-

Are you naked on the Internet?

Rate this item
(0 votes)
Infographic Infographic three6five
  • Top hacking countries: USA (178) and China (117)
  • Top exploits – SSH, Microsoft-DS, Mail, Netbios and HTTP


Local networking services company, three6five, recently conducted an experiment to assess the South African Internet threat levels and has concluded that there is no network that can afford to be caught naked on the Internet.  Three6five co- owner, Jeff Fletcher said that it is critical to understand what a threat on the Internet looks like from a South African perspective and what steps to take to protect a network. 


Fletcher said that three6five’s local study addressed what local Internet threats look like, where they come from and how they are carried out.  By installing a honeypot server on the three6five WiMAX link with a public IP address, Fletcher says the server acted as a decoy, luring in potential hackers to study their activities and monitor how they are able to break into a system. 


“A honeypot exposes what appear to be standard network services to potential hackers and mimics systems that an intruder would likely attempt to break into without exposing any real services and risk the rest of the network” says Fletcher. If successful, the intruder will have no idea about being tricked and monitored. Most honeypots are placed outside the network on the internet facing side of the firewall or DMZ.


The initial data was collected throughout September and revealed that the United States and China were the leading countries in terms of where attacks originated from, with 178 and 117 attacks per unique IP, per month respectively.  Top exploits included SSH, Microsoft-DS, Mail, Netbios and HTTP.


The number of attacks by type was evenly split between Microsoft and Linux. While some services are Microsoft specific like Netbios, others are applicable to both (http) and some work on both (ssh) but are usually found on Linux.   Fletcher says that when looking at the distribution from a unique IP source and not the total number, the picture changes slightly with Linux leading.  “Brute force attacks seem more concentrated on the Microsoft services.”


Usernames that were used to attempt to break into the ssh service differed but the word ‘user’ was by far the most popular with over 4000 attempts within a month.  “This was more than likely due to a brute force attack attempt.”  Fletcher says that ’oracle’ was the next popular ssh username used, with about 100 break in attempts followed by mundane words such as nagios (a popular nms system), admin and test.”


“One thing that was difficult to tell was whether these were attacks directed by a person behind a machine, or a compromised computer on the internet running a set of scripts” says Fletcher. There was no evidence to correlate the time of day with the number of attacks from a particular area, which led Fletcher to conclude that this was mostly automated attacks.


Hacking is progressive, making a proactive approach to security and the implementation of firewalls critical.  “The biggest issue when it comes to security and the maintenance thereof is people. Firewalls will provide you with the basic, minimum level of security needed to protect you from the outside world, but companies will need to ensure they manage the people that work on their systems as well.”


Fletcher says the company will continue to monitor and grow its honeypot server and network, working with other local security groups where possible and report on the results.  Providing bespoke local information will assist local companies to better understand Internet threats and how to protect their networks.


“What we hope to achieve with the project is a better understanding of which networks in South Africa are more under threat and also to see if certain times of day or weeks of the year have a higher than average number of attacks and try understand why.” concludes Fletcher.

More in this category: « Social Engineering: The Art of Intrusion Top 10 security tips for Gen Y »

Leave a comment

back to top
Copyright © 2014 gdmc (Geoffrey Dean Marketing Corporation cc). All rights reserved. Material may not be published or reproduced in any form without prior written permission. Use of this site constitutes acceptance of our Terms & Conditions and Privacy Policy. External links are provided for reference purposes. SALeader.co.za is not responsible for the content of external Internet sites.

Login or Subscribe