Cybercrime

Thousands of VNC Instances Exposed to Internet as Attacks Increase

Dark web intelligence firm Cyble reports seeing an increase in cyberattacks targeting virtual network computing (VNC).

The VNC graphical desktop-sharing system relies on the Remote Frame Buffer (RFB) protocol to provide control of a remote machine over a network.

<p><strong><span><span>Dark web intelligence firm Cyble reports seeing an increase in cyberattacks targeting virtual network computing (VNC).</span></span></strong></p><p><span><span>The VNC graphical desktop-sharing system relies on the Remote Frame Buffer (RFB) protocol to provide control of a remote machine over a network.</span></span></p>

Dark web intelligence firm Cyble reports seeing an increase in cyberattacks targeting virtual network computing (VNC).

The VNC graphical desktop-sharing system relies on the Remote Frame Buffer (RFB) protocol to provide control of a remote machine over a network.

Exposing VNC to the internet has long been deemed a security risk, yet Cyble has identified over 8,000 internet-accessible VNC instances that have authentication disabled.

Cyble also warns of a spike in attacks targeting port 5900, the default port for VNC, noting that the Netherlands, Russia, and Ukraine have emerged as the top attacking countries.

Most of the exposed VNC instances, the threat intelligence firm says, are located in five countries: China, Sweden, the United States, Spain, and Brazil.

Some of the exposed VNCs belong to organizations in critical infrastructure sectors, including water treatment plants, manufacturers, and research facilities. Cyble says it was able to identify multiple human-machine interface (HMI) systems, SCADA systems, and workstations that are connected via VNC and internet-accessible.

Attackers able to compromise such systems may tamper with predefined settings, shut down industrial control systems (ICS), disrupt the supply chain and processes in the affected industries, or access sensitive data that can be used to further compromise ICS systems.

Exposing VNCs to the internet, Cyble notes, increases the likelihood of a cyberattack, including ransomware, data theft, and cyberespionage, all of which are typically preceded by an initial network compromise.

Advertisement. Scroll to continue reading.

“Our investigation found that selling, buying, and distributing exposed assets connected via VNCs are frequently on cybercrime forums and markets,” Cyble notes.

While remote access to IT/OT infrastructure assets can prove handy, improperly implemented security measures could lead to highly impactful incidents and significant losses. Internet-exposed VNCs that lack authentication make it easy for attackers to access a victim’s network and create havoc.

“Readers should bear in mind that exposed VNCs from critical organizations put the national security, economy, energy, and transportation sectors at high risk of cyberattacks. It is advised that organizations using VNC and similar products should ensure that their ports and services are not exposed online and are appropriately secured,” Cyble concludes.

Related: Many Internet-Exposed Servers Affected by Exploited Redis Vulnerability

Related: Tool Links Internet-Exposed ICS to Google Street View

Related: 1,000 Organizations Exposed to Remote Attacks by FileWave MDM Vulnerabilities

Related Content

ICS/OT

UK’s NCSC releases security guidance for OT organizations considering migrating their SCADA solutions to the cloud.

ICS/OT

In an age of increasing geopolitical tensions caused by actual wars, and the threat of Chinese action against Taiwan, OT is a target that...

ICS/OT

SecurityWeek interviews Del Rodillas, Senior Director of Product Management at Palo Alto Networks, about the integration of IT and OT in the ICS threat landscape.

ICS/OT

Seven vulnerabilities found in Rapid SCADA could be exploited to gain access to sensitive industrial systems, but they remain unpatched.

ICS/OT

The Municipal Water Authority of Aliquippa was just one of multiple organizations breached in the U.S. by Iran-linked "Cyber Av3ngers" hackers

ICS/OT

Members of Congress asked the U.S. Justice Department to investigate how foreign hackers breached a water authority near Pittsburgh, prompting CISA to warn other...

ICS/OT

SecurityWeek’s 2023 ICS Cybersecurity Conference continues in Atlanta, as hundreds of industrial cybersecurity stakeholders gather for Day 2 of the annual industrial cybersecurity conference.

ICS/OT

Join SecurityWeek and TXOne Networks for this webinar as we expose common misconceptions surrounding the security of Operational Technology (OT) and dive into the...

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version