Threat Management

Bot attacks against RDP, SSH examined

Share

Tens of millions of connection attempts have been conducted to Rapid7's RDP and SSH honeypots from September 10, 2021 to September 9, 2022, with nearly all of the passwords in its honeypots observed in the rockyou2021.txt collection, which contains nearly 8.4 billion passwords, SecurityWeek reports. Rapid7 researchers discovered that only 14 of 497,848 passwords leveraged in attacking SSH honeypots were not present in rockyou2021, while only one password targeted at RDP honeypots was not a part of the collection, with that password, AuToLoG2019.09.25, being the 13th most used password. The findings also showed that '123456', 'nproc', 'test', 'qwerty', and 'password' were the leading passwords used in SSH attack attempts, while ' ' or the empty string, '123', 'password', '123qwe', and 'admin' were the most used passwords in attacks against RDP honeypots. "The concentration on lame and default passwords demonstrates that there are still enough in common use to make the attacks worthwhile for the attackers," said Rapid7 Director of Research Tod Beardsley.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.