Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Thousands of VNC Instances Exposed to Internet as Attacks Increase

admin by admin
Feb 2, 2023
in ICS-SCADA
A A
0

Dark web intelligence firm Cyble reports seeing an increase in cyberattacks targeting virtual network computing (VNC).

The VNC graphical desktop-sharing system relies on the Remote Frame Buffer (RFB) protocol to provide control of a remote machine over a network.

Exposing VNC to the internet has long been deemed a security risk, yet Cyble has identified over 8,000 internet-accessible VNC instances that have authentication disabled.

Cyble also warns of a spike in attacks targeting port 5900, the default port for VNC, noting that the Netherlands, Russia, and Ukraine have emerged as the top attacking countries.

Most of the exposed VNC instances, the threat intelligence firm says, are located in five countries: China, Sweden, the United States, Spain, and Brazil.

Some of the exposed VNCs belong to organizations in critical infrastructure sectors, including water treatment plants, manufacturers, and research facilities. Cyble says it was able to identify multiple human-machine interface (HMI) systems, SCADA systems, and workstations that are connected via VNC and internet-accessible.

Attackers able to compromise such systems may tamper with predefined settings, shut down industrial control systems (ICS), disrupt the supply chain and processes in the affected industries, or access sensitive data that can be used to further compromise ICS systems.

Exposing VNCs to the internet, Cyble notes, increases the likelihood of a cyberattack, including ransomware, data theft, and cyberespionage, all of which are typically preceded by an initial network compromise.

“Our investigation found that selling, buying, and distributing exposed assets connected via VNCs are frequently on cybercrime forums and markets,” Cyble notes.

While remote access to IT/OT infrastructure assets can prove handy, improperly implemented security measures could lead to highly impactful incidents and significant losses. Internet-exposed VNCs that lack authentication make it easy for attackers to access a victim’s network and create havoc.

“Readers should bear in mind that exposed VNCs from critical organizations put the national security, economy, energy, and transportation sectors at high risk of cyberattacks. It is advised that organizations using VNC and similar products should ensure that their ports and services are not exposed online and are appropriately secured,” Cyble concludes.

Related: Many Internet-Exposed Servers Affected by Exploited Redis Vulnerability

Related: Tool Links Internet-Exposed ICS to Google Street View

Related: 1,000 Organizations Exposed to Remote Attacks by FileWave MDM Vulnerabilities

Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.