Mapping the Battlefield: Investigating Global Attack Trends on a CVE-2018-0101 Honeypot
Introduction:
In the realm of cybersecurity, staying vigilant against potential threats is of utmost importance. One effective strategy in this battle is the deployment of honeypots, decoy systems designed to attract and monitor malicious activities. In this article, we delve into our experience with a honeypot specifically designed to detect CVE-2018-0101, a DoS and remote code execution vulnerability affecting Cisco ASA components.
Setting the Stage:
Deploying a low-interaction honeypot from Cymmetria Research, we embarked on a journey to monitor and analyze the attempted attacks on this honeypot over a span of 15 days. The primary goal was to gain insights into the threat landscape and the potential actors targeting this vulnerability.
Data Overview:
Over the monitoring period, we observed a total of 1,023 attack attempts, with 50 unique source IP addresses targeting the honeypot. The geographical distribution of these IP addresses shed light on the global reach of the threat landscape:
- United States: 173 attempts
- Singapore: 39 attempts
- Russia: 15 attempts
- Hong Kong: 12 attempts
- Germany: 6 attempts
- India: 5 attempts
- Netherlands: 4 attempts
- Lithuania: 2 attempts
- Portugal: 2 attempts
- United Kingdom: 1 attempt
Top Attacking IPs:
Among the unique source IP addresses, some stood out due to the frequency of their attempts:
- 164.92.120.195 – 75 attempts
- 43.134.108.109 – 36 attempts
- 83.97.73.87 – 13 attempts
- 118.193.36.232 – 6 attempts
- 159.89.15.37 – 6 attempts
- 45.56.108.128 – 5 attempts
Analyzing the Patterns:
These attempted attacks exhibit varying levels of sophistication and persistence. While some IP addresses targeted the honeypot multiple times, others seemed to be more opportunistic in nature. The geographical distribution of the attackers is indicative of the global interest in exploiting the vulnerability, with both developed and emerging regions being represented.
Implications and Insights:
The data gathered from this honeypot deployment underscores the continuous and diverse threats that exist in the cybersecurity landscape. It also emphasizes the importance of staying vigilant, even against known vulnerabilities. This experience serves as a reminder that threat actors are constantly evolving their tactics and targeting various points of vulnerability.