Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Thousands of VNC Instances Exposed to Internet as Attacks Increase

Dark web intelligence firm Cyble reports seeing an increase in cyberattacks targeting virtual network computing (VNC).

The VNC graphical desktop-sharing system relies on the Remote Frame Buffer (RFB) protocol to provide control of a remote machine over a network.

Dark web intelligence firm Cyble reports seeing an increase in cyberattacks targeting virtual network computing (VNC).

The VNC graphical desktop-sharing system relies on the Remote Frame Buffer (RFB) protocol to provide control of a remote machine over a network.

Exposing VNC to the internet has long been deemed a security risk, yet Cyble has identified over 8,000 internet-accessible VNC instances that have authentication disabled.

Cyble also warns of a spike in attacks targeting port 5900, the default port for VNC, noting that the Netherlands, Russia, and Ukraine have emerged as the top attacking countries.

Most of the exposed VNC instances, the threat intelligence firm says, are located in five countries: China, Sweden, the United States, Spain, and Brazil.

Some of the exposed VNCs belong to organizations in critical infrastructure sectors, including water treatment plants, manufacturers, and research facilities. Cyble says it was able to identify multiple human-machine interface (HMI) systems, SCADA systems, and workstations that are connected via VNC and internet-accessible.

Attackers able to compromise such systems may tamper with predefined settings, shut down industrial control systems (ICS), disrupt the supply chain and processes in the affected industries, or access sensitive data that can be used to further compromise ICS systems.

Advertisement. Scroll to continue reading.

Exposing VNCs to the internet, Cyble notes, increases the likelihood of a cyberattack, including ransomware, data theft, and cyberespionage, all of which are typically preceded by an initial network compromise.

“Our investigation found that selling, buying, and distributing exposed assets connected via VNCs are frequently on cybercrime forums and markets,” Cyble notes.

While remote access to IT/OT infrastructure assets can prove handy, improperly implemented security measures could lead to highly impactful incidents and significant losses. Internet-exposed VNCs that lack authentication make it easy for attackers to access a victim’s network and create havoc.

“Readers should bear in mind that exposed VNCs from critical organizations put the national security, economy, energy, and transportation sectors at high risk of cyberattacks. It is advised that organizations using VNC and similar products should ensure that their ports and services are not exposed online and are appropriately secured,” Cyble concludes.

Related: Many Internet-Exposed Servers Affected by Exploited Redis Vulnerability

Related: Tool Links Internet-Exposed ICS to Google Street View

Related: 1,000 Organizations Exposed to Remote Attacks by FileWave MDM Vulnerabilities

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.