<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" 
  xmlns:content="http://purl.org/rss/1.0/modules/content/" 
  xmlns:dc="http://purl.org/dc/elements/1.1/" 
  xmlns:atom="http://www.w3.org/2005/Atom" 
  xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" 
  xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>News on Untrusted Network</title>
    <link>https://untrustednetwork.net/en/category/news/</link>
    <description>Recent content in News on Untrusted Network</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <copyright>&amp;copy; Jan Kopriva 2015 - {year}</copyright>
    <lastBuildDate>Mon, 23 Feb 2026 15:35:00 +0100</lastBuildDate>
    <sy:updatePeriod>weekly</sy:updatePeriod>
    <sy:updateFrequency>weekly</sy:updateFrequency>
    
        <atom:link href="https://untrustednetwork.net/en/category/news/index.xml" rel="self" type="application/rss+xml" />
    
    
    

      
      <item>
        <title>SANS ISC Diary - Another day, another malicious JPEG</title>
        <link>https://untrustednetwork.net/en/2026/02/23/malicious-jpeg/</link>
        <pubDate>Mon, 23 Feb 2026 15:35:00 +0100</pubDate>
        
        <atom:modified>Mon, 23 Feb 2026 15:35:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2026/02/23/malicious-jpeg/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a recent malspam campagin delivering a multi-stage infection chain involving a JScript downloader, WMI-spawned PowerShell, and an in-memory .NET assembly extracted from a JPEG file&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/32738&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a recent malspam campagin delivering a multi-stage infection chain involving a JScript downloader, WMI-spawned PowerShell, and an in-memory .NET assembly extracted from a JPEG file&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Remcos</category>
            
          
            
              <category>Malware</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2026</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - A phishing campaign with QR codes rendered using an HTML table</title>
        <link>https://untrustednetwork.net/en/2026/01/07/qr-code-html-table/</link>
        <pubDate>Wed, 07 Jan 2026 10:35:00 +0100</pubDate>
        
        <atom:modified>Wed, 07 Jan 2026 10:35:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2026/01/07/qr-code-html-table/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a phishing campaign, in which QR codes were implemented with the help of HTML tables instead of images&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/32606&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a phishing campaign, in which QR codes were implemented with the help of HTML tables instead of images&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>QR code</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2026</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Positive trends related to public IP ranges from the year 2025</title>
        <link>https://untrustednetwork.net/en/2025/12/18/positive-trends/</link>
        <pubDate>Thu, 18 Dec 2025 09:10:00 +0100</pubDate>
        
        <atom:modified>Thu, 18 Dec 2025 09:10:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/12/18/positive-trends/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a few positive trends related to public IP ranges from the past twelve months&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/32584&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a few positive trends related to public IP ranges from the past twelve months&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>SSL</category>
            
          
            
              <category>ICS</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Use of CSS stuffing as an obfuscation technique?</title>
        <link>https://untrustednetwork.net/en/2025/11/21/css-stuffing/</link>
        <pubDate>Fri, 21 Nov 2025 10:50:00 +0100</pubDate>
        
        <atom:modified>Fri, 21 Nov 2025 10:50:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/11/21/css-stuffing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a phishing page, which - probably as an obfusctaion technique - contained a large amount of garbage CSS code&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/32510&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a phishing page, which - probably as an obfusctaion technique - contained a large amount of garbage CSS code&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>CSS</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - A phishing with invisible characters in the subject line</title>
        <link>https://untrustednetwork.net/en/2025/10/28/invisible-subject/</link>
        <pubDate>Tue, 28 Oct 2025 10:55:00 +0100</pubDate>
        
        <atom:modified>Tue, 28 Oct 2025 10:55:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/10/28/invisible-subject/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at an unusual phishing message which contained &amp;ldquo;invisible&amp;rdquo; characters in its subject line&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/32428&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at an unusual phishing message which contained &amp;ldquo;invisible&amp;rdquo; characters in its subject line&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - A quick look at sextortion at scale: 1,900 messages and 205 Bitcoin addresses spanning four years</title>
        <link>https://untrustednetwork.net/en/2025/09/02/sextortion-2021-2025/</link>
        <pubDate>Tue, 02 Sep 2025 10:00:00 +0100</pubDate>
        
        <atom:modified>Tue, 02 Sep 2025 10:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/09/02/sextortion-2021-2025/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll discuss the analysis of approximately 1,900 sextortion e-mails spanning years 2021-2025, and look at interesting statistical data that resulted from this analysis&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/32252&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll discuss the analysis of approximately 1,900 sextortion e-mails spanning years 2021-2025, and look at interesting statistical data that resulted from this analysis&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Sextortion</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Do sextortion scams still work in 2025?</title>
        <link>https://untrustednetwork.net/en/2025/08/06/sextortion-2025/</link>
        <pubDate>Wed, 06 Aug 2025 11:30:00 +0100</pubDate>
        
        <atom:modified>Wed, 06 Aug 2025 11:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/08/06/sextortion-2025/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll discuss whether sextortion scams are still effective in 2025&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/32178&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll discuss whether sextortion scams are still effective in 2025&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Sextortion</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - How quickly do we patch? A quick look from the global viewpoint</title>
        <link>https://untrustednetwork.net/en/2025/07/21/speed-of-patching/</link>
        <pubDate>Mon, 21 Jul 2025 13:00:00 +0100</pubDate>
        
        <atom:modified>Mon, 21 Jul 2025 13:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/07/21/speed-of-patching/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at how quickly do we – as a global society – patch actively-exploited vulnerabilities when it comes to our internet-facing systems&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/32126&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at how quickly do we – as a global society – patch actively-exploited vulnerabilities when it comes to our internet-facing systems&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Vulnerability</category>
            
          
            
              <category>ToolShell</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Phishing e-mail that hides malicious link from Outlook users</title>
        <link>https://untrustednetwork.net/en/2025/06/04/hidden-outlook-link/</link>
        <pubDate>Wed, 04 Jun 2025 12:30:00 +0100</pubDate>
        
        <atom:modified>Wed, 04 Jun 2025 12:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/06/04/hidden-outlook-link/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at an interesting phishing e-mail that hides the link to a malicious site from Oulook users&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/32010&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at an interesting phishing e-mail that hides the link to a malicious site from Oulook users&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Air Bank</category>
            
          
            
              <category>Outlook</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Another day, another phishing campaign abusing google.com open redirects</title>
        <link>https://untrustednetwork.net/en/2025/05/14/google-open-redirect/</link>
        <pubDate>Wed, 14 May 2025 12:30:00 +0100</pubDate>
        
        <atom:modified>Wed, 14 May 2025 12:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/05/14/google-open-redirect/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at an actively exploited open redirect vulnerability in Google Travel service that enables threat actors to craft links pointing to www.google.com which cause redirection to an arbitrary URL&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/31950&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at an actively exploited open redirect vulnerability in Google Travel service that enables threat actors to craft links pointing to &lt;a href=&#34;http://www.google.com&#34;&gt;www.google.com&lt;/a&gt; which cause redirection to an arbitrary URL&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Google</category>
            
          
            
              <category>Vulnerability</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - It&#39;s 2025... so why are obviously malicious advertising URLs still going strong?</title>
        <link>https://untrustednetwork.net/en/2025/04/21/goolge-ads-phishing/</link>
        <pubDate>Mon, 21 Apr 2025 10:50:00 +0100</pubDate>
        
        <atom:modified>Mon, 21 Apr 2025 10:50:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/04/21/goolge-ads-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a phishing campaign, in which Google Ad service was used for redirection of victims, and at security weaknesses of web-based ad services in general&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/31880&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a phishing campaign, in which Google Ad service was used for redirection of victims, and at security weaknesses of web-based ad services in general&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Google</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - A Tale of Two Phishing Sites</title>
        <link>https://untrustednetwork.net/en/2025/03/28/2-phishing-sites/</link>
        <pubDate>Fri, 28 Mar 2025 13:00:00 +0100</pubDate>
        
        <atom:modified>Fri, 28 Mar 2025 13:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/03/28/2-phishing-sites/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at two phishing sites based on the same phishing kit, that differed significantly (not just) in the level of obfuscation&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/31810&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at two phishing sites based on the same phishing kit, that differed significantly (not just) in the level of obfuscation&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Obfuscation</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>10 years of Untrusted Network</title>
        <link>https://untrustednetwork.net/en/2025/03/03/10-years/</link>
        <pubDate>Mon, 03 Mar 2025 07:10:00 +0100</pubDate>
        
        <atom:modified>Mon, 03 Mar 2025 07:10:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/03/03/10-years/</guid>
        <description>Today marks the 10-year anniversary of this website. It has changed a lot since 2015 (take a look at the Internet Archive, if you’re interested in its humble beginnings), and not just visually, but also in terms of content – at this point, it holds a total 153 posts in English, and 362 posts in Czech.
In any case, since I thought it would be worthwhile to share something interesting for the anniversary, I decided to offer you some high-level AWStats data that encompasses the entire lifetime of this website…</description>
        <content:encoded>&lt;p&gt;Today marks the 10-year anniversary of this website. It has changed a lot since 2015 (take a look at the &lt;a href=&#34;https://web.archive.org/web/20150714074754/http://www.untrustednetwork.net/&#34;&gt;Internet Archive&lt;/a&gt;, if you’re interested in its humble beginnings), and not just visually, but also in terms of content – at this point, it holds a total 153 posts in English, and 362 posts in Czech.&lt;/p&gt;
&lt;p&gt;In any case, since I thought it would be worthwhile to share something interesting for the anniversary, I decided to offer you some high-level AWStats data that encompasses the entire lifetime of this website…&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2025/02-10-years/statistics.png&#34; alt=&#34;AWStats data for 2015-2025&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.net/images/2025/02-10-years/statistics.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
      </item>
      
      <item>
        <title>SSL 2.0 support on servers in the Czech Republic</title>
        <link>https://untrustednetwork.net/en/2025/02/10/ssl20-cz/</link>
        <pubDate>Mon, 10 Feb 2025 07:55:00 +0100</pubDate>
        
        <atom:modified>Mon, 10 Feb 2025 07:55:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/02/10/ssl20-cz/</guid>
        <description>While I was writing last week&amp;rsquo;s article, which was devoted to the number of internet-exposed servers that still support SSL 2.0, it occured to me that it might be interesting to take a look at how support for this protocol has decreased in the Czech Republic over the years&amp;hellip; So, you will find the answer in the following chart.</description>
        <content:encoded>&lt;p&gt;While I was writing &lt;a href=&#34;https://untrustednetwork.net/en/2025/02/07/ssl2-30-years/&#34;&gt;last week&amp;rsquo;s article&lt;/a&gt;, which was devoted to the number of internet-exposed servers that still support SSL 2.0, it occured to me that it might be interesting to take a look at how support for this protocol has decreased in the Czech Republic over the years&amp;hellip; So, you will find the answer in the following chart.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2025/01-ssl2-cz/ssl2-cze.jpg&#34; alt=&#34;Podpora SSL 2.0 v prostředí ČR&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.net/images/2025/01-ssl2-cz/ssl2-cze.jpg" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SSL</category>
            
          
            
              <category>Czech Republic</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - SSL 2.0 turns 30 this Sunday... Perhaps the time has come to let it die?</title>
        <link>https://untrustednetwork.net/en/2025/02/07/ssl2-30-years/</link>
        <pubDate>Fri, 07 Feb 2025 11:45:00 +0100</pubDate>
        
        <atom:modified>Fri, 07 Feb 2025 11:45:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/02/07/ssl2-30-years/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at an upcoming 30-year anniversary of the publication of SSL 2.0, and on the number of internet-exposed systems that still support this protocol&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/31664&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at an upcoming 30-year anniversary of the publication of SSL 2.0, and on the number of internet-exposed systems that still support this protocol&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>SSL</category>
            
          
            
              <category>TLS</category>
            
          
            
              <category>HTTPS</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - An unusual &#39;shy z-wasp&#39; phishing</title>
        <link>https://untrustednetwork.net/en/2025/01/27/shy-z-wasp/</link>
        <pubDate>Mon, 27 Jan 2025 12:20:00 +0100</pubDate>
        
        <atom:modified>Mon, 27 Jan 2025 12:20:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2025/01/27/shy-z-wasp/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at an unusual phishing message, in which two different techniques for splitting text using unrendered characters were used with the intention of bypassing security scans&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/31626&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at an unusual phishing message, in which two different techniques for splitting text using unrendered characters were used with the intention of bypassing security scans&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Z-WASP</category>
            
          
            
              <category>HTML</category>
            
          
            
              <category>Outlook</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2025</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Changes in SSL and TLS support in 2024</title>
        <link>https://untrustednetwork.net/en/2024/12/30/ssl-tls-2024/</link>
        <pubDate>Mon, 30 Dec 2024 12:25:00 +0100</pubDate>
        
        <atom:modified>Mon, 30 Dec 2024 12:25:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/12/30/ssl-tls-2024/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at changes in SSL/TLS support on web servers and e-mail servers during the 12 months of 2024&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/31550&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at changes in SSL/TLS support on web servers and e-mail servers during the 12 months of 2024&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>SSL</category>
            
          
            
              <category>TLS</category>
            
          
            
              <category>HTTPS</category>
            
          
            
              <category>SMTP</category>
            
          
            
              <category>E-mail</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - The strange case of disappearing Russian servers</title>
        <link>https://untrustednetwork.net/en/2024/11/25/russian-servers/</link>
        <pubDate>Mon, 25 Nov 2024 08:14:15 +0100</pubDate>
        
        <atom:modified>Mon, 25 Nov 2024 08:14:15 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/11/25/russian-servers/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a recent significant decrease in the number of servers seen by Shodan in Russia&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/31476&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a recent significant decrease in the number of servers seen by Shodan in Russia&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Russia</category>
            
          
            
              <category>Shodan</category>
            
          
            
              <category>CWMP</category>
            
          
            
              <category>TR-069</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Self-contained HTML phishing attachment using Telegram to exfiltrate stolen credentials</title>
        <link>https://untrustednetwork.net/en/2024/10/28/telegram-phishing/</link>
        <pubDate>Mon, 28 Oct 2024 08:15:00 +0100</pubDate>
        
        <atom:modified>Mon, 28 Oct 2024 08:15:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/10/28/telegram-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at an HTML phishing attachment which used Telegram to send stolen credentials back to its authors&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/31388&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at an HTML phishing attachment which used Telegram to send stolen credentials back to its authors&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Telegram</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Phishing links with @ sign and the need for effective security awareness building</title>
        <link>https://untrustednetwork.net/en/2024/09/23/at-phishing/</link>
        <pubDate>Mon, 23 Sep 2024 08:55:00 +0100</pubDate>
        
        <atom:modified>Mon, 23 Sep 2024 08:55:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/09/23/at-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at misuse of the user information string in a URL, and at the topic of effective security awareness building in relation to phishing&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/31288&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at misuse of the user information string in a URL, and at the topic of effective security awareness building in relation to phishing&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Script obfuscation using multiple instances of the same function</title>
        <link>https://untrustednetwork.net/en/2024/08/05/script-obfuscation/</link>
        <pubDate>Mon, 05 Aug 2024 08:15:00 +0100</pubDate>
        
        <atom:modified>Mon, 05 Aug 2024 08:15:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/08/05/script-obfuscation/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at an interesting script obfuscation technique&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/31144&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at an interesting script obfuscation technique&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Malware</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - &#39;Reply-chain phishing&#39; with a twist</title>
        <link>https://untrustednetwork.net/en/2024/07/16/reply-chain-phishing/</link>
        <pubDate>Tue, 16 Jul 2024 11:30:00 +0100</pubDate>
        
        <atom:modified>Tue, 16 Jul 2024 11:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/07/16/reply-chain-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a slightly unusual &amp;ldquo;reply-chain&amp;rdquo; phishing technique&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/31084&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a slightly unusual &amp;ldquo;reply-chain&amp;rdquo; phishing technique&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Support of SSL 2.0 on web servers in 2024</title>
        <link>https://untrustednetwork.net/en/2024/06/28/sslv2/</link>
        <pubDate>Fri, 28 Jun 2024 12:00:00 +0100</pubDate>
        
        <atom:modified>Fri, 28 Jun 2024 12:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/06/28/sslv2/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at the number of web server that still support SSL v2.0&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/31044&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at the number of web server that still support SSL v2.0&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>SSL</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Files with TXZ extension used as malspam attachments</title>
        <link>https://untrustednetwork.net/en/2024/05/27/txz-malspam/</link>
        <pubDate>Mon, 27 May 2024 08:45:00 +0100</pubDate>
        
        <atom:modified>Mon, 27 May 2024 08:45:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/05/27/txz-malspam/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at recent malspam campaigns distributing files with the TXZ extension&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30958&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at recent malspam campaigns distributing files with the TXZ extension&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>TZX</category>
            
          
            
              <category>xz-utils</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>GuLoader</category>
            
          
            
              <category>Formbook</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - It appears that the number of industrial devices accessible from the internet has risen by 30 thousand over the past three years</title>
        <link>https://untrustednetwork.net/en/2024/04/22/ics-internet/</link>
        <pubDate>Mon, 22 Apr 2024 12:25:00 +0100</pubDate>
        
        <atom:modified>Mon, 22 Apr 2024 12:25:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/04/22/ics-internet/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at the number of internet-exposed industrial control systems&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30860&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at the number of internet-exposed industrial control systems&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>ICS</category>
            
          
            
              <category>BACnet</category>
            
          
            
              <category>Modbus</category>
            
          
            
              <category>Shodan</category>
            
          
            
              <category>Censys</category>
            
          
            
              <category>Shadowserver</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - The xz-utils backdoor in security advisories by national CSIRTs</title>
        <link>https://untrustednetwork.net/en/2024/04/01/xz-utils/</link>
        <pubDate>Mon, 01 Apr 2024 13:55:00 +0100</pubDate>
        
        <atom:modified>Mon, 01 Apr 2024 13:55:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/04/01/xz-utils/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at the number of security advisories published by national and governmental CSIRTs in connection with the backdoor in xz-utils&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30800&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at the number of security advisories published by national and governmental CSIRTs in connection with the backdoor in xz-utils&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>xz-utils</category>
            
          
            
              <category>Vulnerability</category>
            
          
            
              <category>Backdoor</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Increase in the number of phishing messages pointing to IPFS and to R2 buckets</title>
        <link>https://untrustednetwork.net/en/2024/03/14/ipfs-r2-phishing/</link>
        <pubDate>Thu, 14 Mar 2024 09:55:00 +0100</pubDate>
        
        <atom:modified>Thu, 14 Mar 2024 09:55:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/03/14/ipfs-r2-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a recent rise in the number of phishing messages pointing to IPFS and R2 buckets&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30744&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a recent rise in the number of phishing messages pointing to IPFS and R2 buckets&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>IPFS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Cloudflare</category>
            
          
            
              <category>R2</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Actively exploited open redirect in Google Web Light</title>
        <link>https://untrustednetwork.net/en/2024/02/26/google-open-redirect/</link>
        <pubDate>Mon, 26 Feb 2024 06:30:00 +0100</pubDate>
        
        <atom:modified>Mon, 26 Feb 2024 06:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/02/26/google-open-redirect/</guid>
        <description>TL;DR: An open redirect vulnerability exists in the remains of Google Web Light service, which is being actively exploited in multiple phishing campaigns. Google decided not to fix it, so it might be advisable to block access to the Web Light domain in corporate environments…
If you are already aware of the principles behind “open redirect” vulnerabilities and want jump straight to the discussion of the Web Light vulnerability and its active exploitation, click here.</description>
        <content:encoded>&lt;p&gt;&lt;i&gt;TL;DR: An open redirect vulnerability exists in the remains of Google Web Light service, which is being actively exploited in multiple phishing campaigns. Google decided not to fix it, so it might be advisable to block access to the Web Light domain in corporate environments…&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;If you are already aware of the principles behind “open redirect” vulnerabilities and want jump straight to the discussion of the Web Light vulnerability and its active exploitation, click &lt;a href=&#34;#vulnerability&#34;&gt;here&lt;/a&gt;. If you are not, let’s first set the stage by discussing what open redirects are and how they may be used by threat actors…&lt;/p&gt;
&lt;p&gt;Open redirect – or &lt;a href=&#34;https://cwe.mitre.org/data/definitions/601.html&#34;&gt;CWE-601&lt;/a&gt; – is a type of software vulnerability, which affects web applications that redirect its visitors to URLs, that are dynamically created based on user-controlled input, if these applications don&amp;rsquo;t sufficiently validate whether these URLs are “trusted”. In basic terms, any such vulnerability allows for creation of links, which point to a vulnerable application and which cause it to automatically redirect the browser of a visitor to another (usually any specified) URL.&lt;/p&gt;
&lt;p&gt;If the potential impact of such a vulnerability isn’t clear to you, imagine if a web application of a well-known bank running at “www.mybank.tld” redirected visitors to the domain “login.mybank.tld” using a dynamic redirection mechanism, which would accept the target URL through a “redirect_to” parameter. A URL used for this redirection might look like this.&lt;/p&gt;
&lt;p&gt;&lt;kbd&gt;ht&lt;span&gt;tps://www.my&lt;/span&gt;mybank.tld/?redirect_to=ht&lt;span&gt;tps://login.my&lt;/span&gt;bank.tld&lt;/p&gt;
&lt;p&gt;You might wonder why someone would use the above-mentioned “dynamic” approach to redirection instead of using static links. The truth is that there may be certain benefits to doing so this way – probably the most important one being the ability to precisely track “clickthroughs” to different destinations (e.g., for marketing purposes).&lt;/p&gt;
&lt;p&gt;In any case, if the redirection mechanism in our example allowed only for limited redirection to URLs within the second-level domain mybank.tld, it would most likely be quite alright from a security standpoint. However, if the mechanism lacked any sort of validation of the target URL, one could easily create a link, which would point to the trusted site of the bank, but which would result in a redirection to an untrusted (and potentially malicious) site… For example a literal “untrusted” site:&lt;/p&gt;
&lt;p&gt;&lt;kbd&gt;ht&lt;span&gt;tps://www.my&lt;/span&gt;mybank.tld/?redirect_to=ht&lt;span&gt;tps://untrustednetwork&lt;/span&gt;.net&lt;/p&gt;
&lt;p&gt;You can probably see the issue – in such a case, any threat actor out there could create a link pointing to the legitimate website of the bank, which would – when opened – result in redirection to a malicious site of their choosing. This could be quite useful for phishing attacks. Since most people only check the beginning of a URL before opening it, if they saw that a link in an e-mail points to a valid domain of the bank, they might be much more willing to click it than if it pointed to a different/unknown domain. And, in fact, threat actors do actively exploit these vulnerabilities in just this way - by redirecting unsuspecting victims to phishing sites through legitimate domains…&lt;/p&gt;
&lt;p&gt;As we can see, although open redirects are hardly the most dangerous type of vulnerabilities in existence, they do sometimes pose a not insignificant risk – especially if the affected application is hosted on a well-known and well-trusted domain. This viewpoint is well-supported by the fact that “Unvalidated Redirects and Forwards” were actually included in the &lt;a href=&#34;https://owasp.org/www-pdf-archive/OWASP_Top_10_-_2010.pdf&#34;&gt;2010 version of OWASP Top 10&lt;/a&gt; (i.e., they were considered by the security community at large to be one of the 10 most significant risks related to web applications at that time).&lt;/p&gt;
&lt;p&gt;Nevertheless, since successful exploitation of these vulnerabilities is dependent on social engineering, and their impact is limited, many organizations consider them either very low risk, or non-issues. For some organizations and some domains, this may be understandable, while for others not so much…&lt;/p&gt;
&lt;p&gt;One organization, which &lt;a href=&#34;https://bughunters.google.com/learn/invalid-reports/web-platform/navigation/6680364896223232/open-redirectors&#34;&gt;takes the overall viewpoint&lt;/a&gt; that “a small number of properly monitored redirectors offers fairly clear benefits and poses very little practical risk” is Google.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2024/03-google-phishing/google-open-redirectors.png&#34; alt=&#34;Google&#39;s take on open redirectors&#34; style=&#34;max-width:800px;width:100%;border:1px solid grey&#34;&gt;
&lt;div align=right&gt;&lt;kbd&gt;Source: &lt;a href=&#34;https://bughunters.google.com/learn/invalid-reports/web-platform/navigation/6680364896223232/open-redirectors&#34;&gt;Google&lt;/a&gt;&lt;/kbd&gt;&lt;/div&gt;
&lt;br&gt;
&lt;p&gt;While I personally disagree with the “very little practical risk” part (especially in connection with any domain owned by Google) I completely understand the “clear benefits” portion of the sentence… Though it should be stressed that the “benefits” are not to users of Google services, but to Google itself, since – as we already mentioned – redirection mechanisms are quite useful for marketing-related tracking.&lt;/p&gt;
&lt;p&gt;Although I don&amp;rsquo;t want to appear petty, it is also worth noting that my views on risks connected with open redirects on Google’s domains are shared by its own AI…&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2024/03-google-phishing/gemini-open-redirect.png&#34; alt=&#34;Google Gemini take on open redirect vulnerabilities&#34; style=&#34;max-width:800px;width:100%;border:1px solid grey&#34;&gt;
&lt;div align=right&gt;&lt;kbd&gt;Source: Google Gemini&lt;/kbd&gt;&lt;/div&gt;
&lt;br&gt;
&lt;p&gt;That is beside the point, however.&lt;/p&gt;
&lt;p&gt;What is important is that even though Google sees “very little practical risk” in open redirection, it has implemented sufficient security measures for most of its services where open redirection is actually used. I.e., some Google services do allow for redirection to arbitrary URLs, however, if these services are linked to from an external source (e.g., an e-mail or a third-party site), then the user is first asked if the redirection should take place. You can see how this looks by opening either of the following links.&lt;/p&gt;
&lt;p&gt;&lt;kbd&gt;&lt;a href=&#34;https://www.google.com/url?sa=t&amp;amp;url=https://untrustednetwork.net&#34;&gt;https://www.google.com/url?sa=t&amp;amp;url=https://untrustednetwork.net&lt;/a&gt;&lt;br /&gt;
&lt;kbd&gt;&lt;a href=&#34;https://www.youtube.com/redirect?q=https%3A%2F%2Fwww.untrustednetwork.net&#34;&gt;https://www.youtube.com/redirect?q=https%3A%2F%2Fwww.untrustednetwork.net&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;While some aspects of the defensive mechanisms that are in place could potentially be &lt;a id=&#34;vulnerability&#34; href=&#34;https://untrustednetwork.net/en/2019/07/22/half-open-redirect-vulnerability-in-youtube/&#34;&gt;improved upon&lt;/a&gt;, they generally provide adequate protection from the most common exploitation approaches and techniques. Problem is that not all Google services and domains are secured in this way.&lt;/p&gt;
&lt;p&gt;One service, which does not have any similar protection mechanisms in place, is/was named &lt;a href=&#34;https://en.wikipedia.org/wiki/Google_Web_Light&#34;&gt;Google Web Light&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;It was first introduced in 2015 and provided a way to load web pages faster in Chrome on Android devices. In simple terms, Web Light served as a specialized proxy server, which “optimized” the transmitted content through compression and filtering in such a way, that &lt;a href=&#34;https://web.archive.org/web/20221215075806/https://developers.google.com/search/docs/crawling-indexing/mobile/web-light&#34;&gt;according to Google&lt;/a&gt;, in their experiments, optimized pages loaded four times faster than the original pages and used 80% fewer bytes. For mobile devices of the time, which were connected to the internet through low-bandwidth links (i.e., over 2G), this undoubtedly made significant difference.&lt;/p&gt;
&lt;p&gt;Google offered the service for several years (though only in selected countries) before &lt;a href=&#34;https://developers.google.com/search/updates#december-2022&#34;&gt;officially retiring the Web Light crawler&lt;/a&gt; in December 2022, when it was decided that the service was no longer needed given the increase in general availability of fast mobile internet and more computationally powerful mobile devices.&lt;/p&gt;
&lt;p&gt;However, the fact that the Web Light service as a whole was retired didn’t mean that all of its functions suddenly stopped working. In fact, to this day, the &lt;a href=&#34;https://web.archive.org/web/20221215075806/https:/developers.google.com/search/docs/crawling-indexing/mobile/web-light#see-the-web-light-version-of-a-web-page&#34;&gt;Web Light preview functionality&lt;/a&gt; is partially available… though it does not function in precisely the same way as it used to.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2024/03-google-phishing/google-weblight-preview.png&#34; alt=&#34;Google Web Light preview functionality&#34; style=&#34;max-width:800px;width:100%;border:1px solid grey&#34;&gt;
&lt;div align=right&gt;&lt;kbd&gt;Source: Google&lt;/kbd&gt;&lt;/div&gt;
&lt;br&gt;
&lt;p&gt;If one tries to use the preview functionality these days, it does not provide a preview of a web page through the Web Light crawler as it used to – it can’t since the crawler is no longer being used – but rather simply redirects the visitor to the provided target URL using HTTP 301 response… You can probably see where this is going.&lt;/p&gt;
&lt;p&gt;Indeed, the redirection mechanism used on &lt;a href=&#34;https://googleweblight.com/&#34;&gt;https://googleweblight.com/&lt;/a&gt; appears to be completely open and unrestricted, and – unlike YouTube and Google search – does not display any warning that the browser is about to be redirected. You may try this yourself by opening the following link.&lt;/p&gt;
&lt;p&gt;&lt;kbd&gt;&lt;a href=&#34;https://googleweblight.com/i?u=untrustednetwork.net&#34;&gt;https://googleweblight.com/i?u=untrustednetwork.net&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;How big of a problem is this? Well, it depends on how trustworthy you consider the domain googleweblight.com to be… It certainly isn’t as bad as if the open redirect existed on google.com (though, by the way, there is at least &lt;a href=&#34;https://www.google.com/amp/s/untrustednetwork.net/&#34;&gt;one&lt;/a&gt; on that domain as well). Nevertheless, the fact that the domain name begins with “www.google&amp;hellip;”, and that the domain is actually &lt;a href=&#34;https://who.is/whois/googleweblight.com&#34;&gt;registered by Google&lt;/a&gt; lends it at least some level of credibility, both when it comes to people seeing a link to it, as well as when such a link is evaluated by automated security solutions.&lt;/p&gt;
&lt;p&gt;Threat actors obviously think that is looks trustworthy too, since I have seen the open redirect on googleweblight.com used in two different phishing campaigns just last week…&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2024/03-google-phishing/phish1.png&#34; alt=&#34;Phishing message with link pointing to googleweblight.com&#34; style=&#34;max-width:800px;width:100%;border:1px solid grey&#34;&gt;
&lt;br&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2024/03-google-phishing/phish2.png&#34; alt=&#34;Phishing message with link pointing to googleweblight.com&#34; style=&#34;max-width:800px;width:100%;border:1px solid grey&#34;&gt;
&lt;br&gt;
&lt;p&gt;As you may see, the links in the two phishing messages pointed to the following URLs:&lt;/p&gt;
&lt;p&gt;&lt;kbd&gt;hxxp[:]//googleweblight[.]com/i?u=hxxps[:]//bafybeicrejl4lniju4uumll6zph6fbntlgnarnd22kyijwfqmcltj2icba.ipfs.cf-ipfs[.]com/webmail.html#[e-mail address]&lt;/p&gt;
&lt;p&gt;&lt;kbd&gt;hxxps[:]//googleweblight[.]com/i?u=hxxps[:]//cloudflare-ipfs[.]com/ipfs/bafybeifrl56eni6oixqpdknl6n2fcatl23jvefr4knsrbaut7opquzcyry/#[e-mail address]&lt;/p&gt;
&lt;p&gt;Both of these links still work at the time of writing and lead to generic credential-stealing phishing pages. Note that both of them are hosted on &lt;a href=&#34;https://en.wikipedia.org/wiki/InterPlanetary_File_System&#34;&gt;IPFS&lt;/a&gt;, even if they are accessed through different gateways…&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2024/03-google-phishing/phishing-page1.png&#34; alt=&#34;Phishing page hosted on IPFS&#34; style=&#34;max-width:800px;width:100%;border:1px solid grey&#34;&gt;
&lt;br&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2024/03-google-phishing/phishing-page2.png&#34; alt=&#34;Phishing page hosted on IPFS&#34; style=&#34;max-width:800px;width:100%;border:1px solid grey&#34;&gt;
&lt;br&gt;
&lt;p&gt;This is far from the first time that the Google Web Light open redirect mechanism was used in a phishing campaign – analysts from Trustwave &lt;a href=&#34;https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/ipfs-the-new-hotbed-of-phishing/&#34;&gt;mentioned seeing it used in 2022&lt;/a&gt;, and I myself came across it in a phishing campaign in 2023. Nevertheless, the fact that even with the limited visibility I have, I came across two messages from different campaigns that exploit this vulnerability in a single week would seem to indicate that the use of this redirection mechanism by phishing authors might be becoming more of a mainstream technique, and thus might warrant some response.&lt;/p&gt;
&lt;p&gt;I have therefore reported the fact that the open redirect on the Web Light domain exists and is under active exploitation to Google, along with a recommendation for implementing the same defenses there, as they have on their other services. They responded that the open redirect is intended behavior, and that their “position on open redirectors is described in greater detail in &lt;a href=&#34;https://bughunters.google.com/learn/invalid-reports/web-platform/navigation/6680364896223232/open-redirectors&#34;&gt;this article&lt;/a&gt;”. Since it therefore appears that Google’s “Web Light Open Redirection Service”, as I shall call it from now on, will stay with us for at least the foreseeable future, it might be worth thinking about what we may do about it ourselves.&lt;/p&gt;
&lt;p&gt;Since the googleweblight.com domain is connected with a retired service and will therefore hardly be used for anything business-relevant in the near future, the most straightforward approach would seem to be to filter out/quarantine any e-mails with links that point to it and/or to completely block access to it. Although the domain will probably never make it to any commercial or publicly available blocklist, since it is registered by Google, and no content hosted on it is actually malicious, nothing is stopping us from manually adding it to any internal blocklists we may be using within our own organizations…&lt;/p&gt;
&lt;p&gt;While we’re on the subject, it might be worthwhile to do the same thing with &lt;a href=&#34;https://github.com/ipfs/public-gateway-checker/blob/main/gateways.json&#34;&gt;all public IPFS gateways&lt;/a&gt; as well. Since IPFS currently has very low (if any) business relevance for most organization, and threat actors use it &lt;a href=&#34;https://www.trendmicro.com/en_vn/research/22/l/web3-ipfs-only-used-for-phishing---so-far.html&#34;&gt;quite heavily&lt;/a&gt; to host phishing pages, this simple step might help us significantly reduce risk connected with untargeted phishing… But we’ll discuss that in more detail another time.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.net/images/2024/03-google-phishing/title.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>Vulnerability</category>
            
          
            
              <category>Google</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>IPFS</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>Vulnerabilities</category>
            
          
            
              <category>2024</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Phishing pages hosted on archive.org</title>
        <link>https://untrustednetwork.net/en/2024/02/21/internet-archive-phishing/</link>
        <pubDate>Wed, 21 Feb 2024 08:30:00 +0100</pubDate>
        
        <atom:modified>Wed, 21 Feb 2024 08:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/02/21/internet-archive-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at hosting of phishing pages on archive.org&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30676&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at hosting of phishing pages on archive.org&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Internet Archive</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Computer viruses are celebrating their 40th birthday (well, 54th, really)</title>
        <link>https://untrustednetwork.net/en/2024/02/06/virus-anniversary/</link>
        <pubDate>Tue, 06 Feb 2024 10:00:00 +0100</pubDate>
        
        <atom:modified>Tue, 06 Feb 2024 10:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/02/06/virus-anniversary/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at an interesting anniversary related to computer viruses&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30624&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at an interesting anniversary related to computer viruses&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Virus</category>
            
          
            
              <category>Malware</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Interesting large and small malspam attachments from 2023</title>
        <link>https://untrustednetwork.net/en/2024/01/03/2023-malspam/</link>
        <pubDate>Wed, 03 Jan 2024 15:00:00 +0100</pubDate>
        
        <atom:modified>Wed, 03 Jan 2024 15:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2024/01/03/2023-malspam/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at the largest and smallest malware samples, that my malspam traps caught last year&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30524&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at the largest and smallest malware samples, that my malspam traps caught last year&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Malspam</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2024</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Whose packet is it anyway: a new RFC for attribution of internet probes</title>
        <link>https://untrustednetwork.net/en/2023/12/06/probe-attribution/</link>
        <pubDate>Wed, 06 Dec 2023 11:45:00 +0100</pubDate>
        
        <atom:modified>Wed, 06 Dec 2023 11:45:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/12/06/probe-attribution/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a recently published RFC which provides way for network scans performed over the internet to be attributed&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30456&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a recently published RFC which provides way for network scans performed over the internet to be attributed&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>RFC</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Phishing page with trivial anti-analysis features</title>
        <link>https://untrustednetwork.net/en/2023/11/17/phishing-anti-analysis/</link>
        <pubDate>Fri, 17 Nov 2023 11:10:00 +0100</pubDate>
        
        <atom:modified>Fri, 17 Nov 2023 11:10:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/11/17/phishing-anti-analysis/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a phishing page with easily bypassed anti-analysis features&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30412&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a phishing page with easily bypassed anti-analysis features&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Are typos still relevant as an indicator of phishing?</title>
        <link>https://untrustednetwork.net/en/2023/10/16/phishing-typos/</link>
        <pubDate>Mon, 16 Oct 2023 09:45:00 +0100</pubDate>
        
        <atom:modified>Mon, 16 Oct 2023 09:45:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/10/16/phishing-typos/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll discuss whether typos are still useful as an indicator of phishing&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30316&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll discuss whether typos are still useful as an indicator of phishing&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - A new spin on the ZeroFont phishing technique</title>
        <link>https://untrustednetwork.net/en/2023/09/26/zerofont-phishing/</link>
        <pubDate>Tue, 26 Sep 2023 11:20:00 +0100</pubDate>
        
        <atom:modified>Tue, 26 Sep 2023 11:20:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/09/26/zerofont-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a novel phishing technique, in which text written in zero-size font is used in order to make messages appear more trustworthy&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30248&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a novel phishing technique, in which text written in zero-size font is used in order to make messages appear more trustworthy&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>HTML</category>
            
          
            
              <category>ZeroFont</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - The low, low cost of (committing) cybercrime</title>
        <link>https://untrustednetwork.net/en/2023/08/31/cost-of-cybercrime/</link>
        <pubDate>Thu, 31 Aug 2023 12:00:00 +0100</pubDate>
        
        <atom:modified>Thu, 31 Aug 2023 12:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/08/31/cost-of-cybercrime/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a simple phishing which demonstrates quite well that the cost of committing cybercrime can unfortunately be extremely low&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30176&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a simple phishing which demonstrates quite well that the cost of committing cybercrime can unfortunately be extremely low&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>HTML</category>
            
          
            
              <category>JavaScript</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - From small LNK to large malicious BAT file with zero VT score</title>
        <link>https://untrustednetwork.net/en/2023/08/03/lnk-to-bat/</link>
        <pubDate>Thu, 03 Aug 2023 18:30:00 +0100</pubDate>
        
        <atom:modified>Thu, 03 Aug 2023 18:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/08/03/lnk-to-bat/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a malicious BAT file which was used in a phishing campaign last week and according to VirusTotal is still being detected as benign by all anti-virus engines it has access to&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30094&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a malicious BAT file which was used in a phishing campaign last week and according to VirusTotal is still being detected as benign by all anti-virus engines it has access to&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>LNK</category>
            
          
            
              <category>VirusTotal</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Kazakhstan - the world&#39;s last SSLv2 superpower... and a country with potentially vulnerable last-mile internet infrastructure</title>
        <link>https://untrustednetwork.net/en/2023/06/28/sslv2-kazakhstan/</link>
        <pubDate>Wed, 28 Jun 2023 08:30:00 +0100</pubDate>
        
        <atom:modified>Wed, 28 Jun 2023 08:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/06/28/sslv2-kazakhstan/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a surprisingly high number of old network devices in Kazakhstan, which still support SSL version 2.0&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/29988&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a surprisingly high number of old network devices in Kazakhstan, which still support SSL version 2.0&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>SSL</category>
            
          
            
              <category>Kazakhstan</category>
            
          
            
              <category>Vulnerability</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SSL version 2.0 support on web servers in the Czech Republic</title>
        <link>https://untrustednetwork.net/en/2023/06/08/sslv2-cz/</link>
        <pubDate>Thu, 08 Jun 2023 07:30:00 +0100</pubDate>
        
        <atom:modified>Thu, 08 Jun 2023 07:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/06/08/sslv2-cz/</guid>
        <description>Last week, I published an article discussing the weakening support for SSLv2 on web servers on the global internet. While I was writing it, it occurred to me that it might also be interesting to look specifically at the situation as it relates to web servers in the Czech Republic.
Long story short, in CZ, the situation is somewhat worse than average - globally, we currently see SSLv2 on about 0.</description>
        <content:encoded>&lt;p&gt;Last week, I published an &lt;a href=&#34;https://isc.sans.edu/diary/29908&#34;&gt;article&lt;/a&gt; discussing the weakening support for SSLv2 on web servers on the global internet. While I was writing it, it occurred to me that it might also be interesting to look specifically at the situation as it relates to web servers in the Czech Republic.&lt;/p&gt;
&lt;p&gt;Long story short, in CZ, the situation is somewhat worse than average - globally, we currently see SSLv2 on about 0.35% of all web servers, while in the Czech Republic, it is a little over 0.89%. Nevertheless, the overall trend of SSLv2 &amp;ldquo;dying off&amp;rdquo; is present even here, as you may see in the following chart&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2023/05-sslv2/sslv2-cz-en.jpg&#34; alt=&#34;SSLv2 support on web servers in the Czech Republic&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.net/images/2023/05-sslv2/sslv2-cz-en.jpg" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SSL</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - After 28 years, SSLv2 is still not gone from the internet... but we&#39;re getting there</title>
        <link>https://untrustednetwork.net/en/2023/06/01/sslv2/</link>
        <pubDate>Thu, 01 Jun 2023 10:40:00 +0100</pubDate>
        
        <atom:modified>Thu, 01 Jun 2023 10:40:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/06/01/sslv2/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at how SSLv2 support on web servers connected to the internet is slowly &amp;ldquo;dying off&amp;rdquo;&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/29908&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at how SSLv2 support on web servers connected to the internet is slowly &amp;ldquo;dying off&amp;rdquo;&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>SSL</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Ongoing Facebook phishing campaign without a sender and (almost) without links</title>
        <link>https://untrustednetwork.net/en/2023/05/15/facebook-phishing/</link>
        <pubDate>Mon, 15 May 2023 09:35:00 +0100</pubDate>
        
        <atom:modified>Mon, 15 May 2023 09:35:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/05/15/facebook-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at an interesting, long-term phishing campaign targeting Facebook users&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/29848&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at an interesting, long-term phishing campaign targeting Facebook users&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>HTML</category>
            
          
            
              <category>Facebook</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - &#39;Passive&#39; analysis of a phishing attachment</title>
        <link>https://untrustednetwork.net/en/2023/05/01/passive-phishing-analysis/</link>
        <pubDate>Mon, 01 May 2023 12:40:00 +0100</pubDate>
        
        <atom:modified>Mon, 01 May 2023 12:40:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/05/01/passive-phishing-analysis/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a &amp;ldquo;passive&amp;rdquo;, OPSEC-friendly approach to the analysis of HTML phishing attachments&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/29798&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a &amp;ldquo;passive&amp;rdquo;, OPSEC-friendly approach to the analysis of HTML phishing attachments&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>HTML</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - The strange case of Great honeypot of China</title>
        <link>https://untrustednetwork.net/en/2023/04/17/china-honeypots/</link>
        <pubDate>Mon, 17 Apr 2023 10:50:00 +0100</pubDate>
        
        <atom:modified>Mon, 17 Apr 2023 10:50:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/04/17/china-honeypots/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a sharp increase of Shodan&amp;rsquo;s detections of honeypots in China&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/29750&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a sharp increase of Shodan&amp;rsquo;s detections of honeypots in China&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>China</category>
            
          
            
              <category>Shodan</category>
            
          
            
              <category>Honeypot</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Use of X-Frame-Options and CSP frame-ancestors security headers on 1 million most popular domains</title>
        <link>https://untrustednetwork.net/en/2023/03/31/http-headers/</link>
        <pubDate>Fri, 31 Mar 2023 14:50:00 +0100</pubDate>
        
        <atom:modified>Fri, 31 Mar 2023 14:50:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/03/31/http-headers/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at the use of security-related HTTP headers that are able to prevent &amp;ldquo;framing attacks&amp;rdquo; on one million most commonly visited domains&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/29698&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at the use of security-related HTTP headers that are able to prevent &amp;ldquo;framing attacks&amp;rdquo; on one million most commonly visited domains&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>HTTP</category>
            
          
            
              <category>CSP</category>
            
          
            
              <category>X-Frame-Options</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - IPFS phishing and the need for correctly set HTTP security headers</title>
        <link>https://untrustednetwork.net/en/2023/03/15/ipfs-phishing/</link>
        <pubDate>Wed, 15 Mar 2023 12:20:00 +0100</pubDate>
        
        <atom:modified>Wed, 15 Mar 2023 12:20:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/03/15/ipfs-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at several phishing pages hosted on a disributed file system IPFS and shortly dicuss the potential of HTTP security headers to serve as a defense against phishing&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/29638&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at several phishing pages hosted on a disributed file system IPFS and shortly dicuss the potential of HTTP security headers to serve as a defense against phishing&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>HTTP</category>
            
          
            
              <category>HTML</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - HTML phishing attachment with browser-in-the-browser technique</title>
        <link>https://untrustednetwork.net/en/2023/02/16/bitb/</link>
        <pubDate>Thu, 16 Feb 2023 12:20:00 +0100</pubDate>
        
        <atom:modified>Thu, 16 Feb 2023 12:20:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/02/16/bitb/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at the use of &amp;ldquo;browser-in-the-browser&amp;rdquo; technique in a generic phishing campaign&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/29556&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at the use of &amp;ldquo;browser-in-the-browser&amp;rdquo; technique in a generic phishing campaign&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Browser in the browser</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - SPF and DMARC use on 100k most popular domains</title>
        <link>https://untrustednetwork.net/en/2023/01/19/triop-tranco-spf-dmarc/</link>
        <pubDate>Thu, 19 Jan 2023 12:40:00 +0100</pubDate>
        
        <atom:modified>Thu, 19 Jan 2023 12:40:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/01/19/triop-tranco-spf-dmarc/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at SPF and DMARC use on world&amp;rsquo;s most popular domains&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/29452&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at SPF and DMARC use on world&amp;rsquo;s most popular domains&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>SPF</category>
            
          
            
              <category>DMARC</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Passive detection of internet-connected systems affected by vulnerabilities from the CISA KEV catalog</title>
        <link>https://untrustednetwork.net/en/2023/01/11/triop-cisa-kev/</link>
        <pubDate>Wed, 11 Jan 2023 12:00:00 +0100</pubDate>
        
        <atom:modified>Wed, 11 Jan 2023 12:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/01/11/triop-cisa-kev/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a new function of my TriOp tool and its use for passive identification of systems affected by vulnerabilities listed in the CISA KEV Catalog&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/29426&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a new function of my TriOp tool and its use for passive identification of systems affected by vulnerabilities listed in the CISA KEV Catalog&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Shodan</category>
            
          
            
              <category>CISA</category>
            
          
            
              <category>Vulnerability</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>TriOp update - version 1.5</title>
        <link>https://untrustednetwork.net/en/2023/01/11/triop-update-version-1.5/</link>
        <pubDate>Wed, 11 Jan 2023 11:50:00 +0100</pubDate>
        
        <atom:modified>Wed, 11 Jan 2023 11:50:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/01/11/triop-update-version-1.5/</guid>
        <description>I’ve published version 1.5 of TriOp today. Besides the addition of several CVEs into the internal list of vulnerabilities, a new feature was also introduced, which enables automatic generation of Shodan queries for the current list of vulnerabilities from the CISA Known Exploited Vulnerabilities (KEV) Catalog.
As alway, you may download the latest version of TriOp from my GitHub.</description>
        <content:encoded>&lt;p&gt;I’ve published version 1.5 of &lt;a href=&#34;https://untrustednetwork.net/en/triop/&#34;&gt;TriOp&lt;/a&gt; today. Besides the addition of several CVEs into the internal list of vulnerabilities, a new feature was also introduced, which enables automatic generation of Shodan queries for the current list of vulnerabilities from the &lt;a href=&#34;https://www.cisa.gov/known-exploited-vulnerabilities-catalog&#34;&gt;CISA Known Exploited Vulnerabilities (KEV) Catalog&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;As alway, you may download the latest version of TriOp from &lt;a href=&#34;https://github.com/NettleSec/TriOp&#34;&gt;my GitHub&lt;/a&gt;.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Tool</category>
            
          
            
              <category>TriOp</category>
            
          
            
              <category>Shodan</category>
            
          
            
              <category>CISA</category>
            
          
            
              <category>Vulnerability</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - SPF and DMARC use on GOV domains in different ccTLDs</title>
        <link>https://untrustednetwork.net/en/2022/12/30/gov-domains-spf-dmarc/</link>
        <pubDate>Fri, 30 Dec 2022 16:45:00 +0100</pubDate>
        
        <atom:modified>Fri, 30 Dec 2022 16:45:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2022/12/30/gov-domains-spf-dmarc/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at the use of SPF and DMARC on second-level governmental domains in different ccTLDs&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/29384&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at the use of SPF and DMARC on second-level governmental domains in different ccTLDs&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>SPF</category>
            
          
            
              <category>DMARC</category>
            
          
            
              <category>DKIM</category>
            
          
            
              <category>SMTP</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2022</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Traffic Light Protocol (TLP) 2.0 is here</title>
        <link>https://untrustednetwork.net/en/2022/08/04/tlp2.0/</link>
        <pubDate>Thu, 04 Aug 2022 10:35:00 +0100</pubDate>
        
        <atom:modified>Thu, 04 Aug 2022 10:35:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2022/08/04/tlp2.0/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a new version of the Traffic Light Protocol standard, which was published by FIRST earlier this week&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/28914&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a new version of the Traffic Light Protocol standard, which was published by FIRST earlier this week&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>FIRST</category>
            
          
            
              <category>TLP</category>
            
          
            
              <category>CSIRT</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2022</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - EternalBlue 5 years after WannaCry and NotPetya</title>
        <link>https://untrustednetwork.net/en/2022/07/05/eternalblue/</link>
        <pubDate>Tue, 05 Jul 2022 10:35:00 +0100</pubDate>
        
        <atom:modified>Tue, 05 Jul 2022 10:35:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2022/07/05/eternalblue/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at the number of internet-exposed systems that are still vulnerable to the EternalBlue exploit&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/28816&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at the number of internet-exposed systems that are still vulnerable to the EternalBlue exploit&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Vulnerability</category>
            
          
            
              <category>EternalBlue</category>
            
          
            
              <category>WannaCry</category>
            
          
            
              <category>NotPetya</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2022</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Malware analysis - &#39;video write-up&#39; of one of the ECSC 2021 challenges</title>
        <link>https://untrustednetwork.net/en/2022/06/21/malware_analysis-ecsc_2021/</link>
        <pubDate>Tue, 21 Jun 2022 08:25:00 +0100</pubDate>
        
        <atom:modified>Tue, 21 Jun 2022 08:25:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2022/06/21/malware_analysis-ecsc_2021/</guid>
        <description>I published a new video on the Untrusted Network YouTube channel today, which shows one possible solution for a &amp;ldquo;malware analysis task&amp;rdquo; which I prepared for the final round of last year&amp;rsquo;s European Cyber Security Challenge. If you would like to take a closer look at the multi-stage &amp;ldquo;malware&amp;rdquo; which contestants in the ECSC 2021 had to analyze, or if you would like to try to analyze the sample yourself, now you have a chance to do so - you will find further information in the following video.</description>
        <content:encoded>&lt;p&gt;I published a new video on the &lt;a href=&#34;https://www.youtube.com/channel/UCfSk9E6VKWc3omEqFbQ-Q3Q&#34;&gt;Untrusted Network&lt;/a&gt; YouTube channel today, which shows one possible solution for a &amp;ldquo;malware analysis task&amp;rdquo; which I prepared for the final round of last year&amp;rsquo;s &lt;a href=&#34;https://ecsc2021.cz/&#34;&gt;European Cyber Security Challenge&lt;/a&gt;. If you would like to take a closer look at the multi-stage &amp;ldquo;malware&amp;rdquo; which contestants in the ECSC 2021 had to analyze, or if you would like to try to analyze the sample yourself, now you have a chance to do so - you will find further information in the following video.&lt;/p&gt;
&lt;p&gt;The video is also available in a &lt;a href=&#34;https://untrustednetwork.net/cs/2022/06/21/analyza_malware-ecsc_2021/&#34;&gt;Czech language version&lt;/a&gt;.&lt;/p&gt;
&lt;p align=&#34;center&#34;&gt;&lt;iframe width=&#34;560&#34; height=&#34;315&#34; src=&#34;https://www.youtube.com/embed/eBvXLEX5hYs&#34; title=&#34;YouTube video player&#34; frameborder=&#34;0&#34; allow=&#34;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture&#34; allowfullscreen&gt;&lt;/iframe&gt;&lt;/p&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.net/images/2022/07-ecsc_2021/ecsc_2021.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>Malware</category>
            
          
            
              <category>Video</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2022</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - HTML phishing attachments - now with anti-analysis features</title>
        <link>https://untrustednetwork.net/en/2022/06/01/anti-analysis-phishing/</link>
        <pubDate>Wed, 01 Jun 2022 12:05:00 +0100</pubDate>
        
        <atom:modified>Wed, 01 Jun 2022 12:05:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2022/06/01/anti-analysis-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at an unusual use of anti-debugging/anti-analysis techniques in a phishing page&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/28702&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at an unusual use of anti-debugging/anti-analysis techniques in a phishing page&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2022</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Do you want 30 BTC? Nothing is easier (or cheaper) in this phishing campaign...</title>
        <link>https://untrustednetwork.net/en/2022/05/18/btc-phishing/</link>
        <pubDate>Wed, 18 May 2022 07:50:00 +0100</pubDate>
        
        <atom:modified>Wed, 18 May 2022 07:50:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2022/05/18/btc-phishing/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a sophisticated phishing campaign that offered 30 BTC (in someone else&amp;rsquo;s account) in an attempt to get victims to send it money&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/28662&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a sophisticated phishing campaign that offered 30 BTC (in someone else&amp;rsquo;s account) in an attempt to get victims to send it money&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Bitcoin</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2022</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - What is the simplest malware in the world?</title>
        <link>https://untrustednetwork.net/en/2022/05/06/simplest-malware/</link>
        <pubDate>Fri, 06 May 2022 09:20:00 +0100</pubDate>
        
        <atom:modified>Fri, 06 May 2022 09:20:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2022/05/06/simplest-malware/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at what might be the simplest malware in the world&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/28620&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at what might be the simplest malware in the world&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Malware</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2022</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - MITRE ATT&amp;CK v11 - a small update that can help (not just) with detection engineering</title>
        <link>https://untrustednetwork.net/en/2022/04/27/attack-v11/</link>
        <pubDate>Wed, 27 Apr 2022 11:30:00 +0100</pubDate>
        
        <atom:modified>Wed, 27 Apr 2022 11:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2022/04/27/attack-v11/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a new version of the MITRE ATT&amp;amp;CK framework, which was published this week&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/28590&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a new version of the MITRE ATT&amp;amp;CK framework, which was published this week&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>MITRE</category>
            
          
            
              <category>ATT&amp;CK</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2022</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - How is Ukrainian internet holding up during the Russian invasion?</title>
        <link>https://untrustednetwork.net/en/2022/04/13/ukrainian_internet/</link>
        <pubDate>Wed, 13 Apr 2022 11:30:00 +0100</pubDate>
        
        <atom:modified>Wed, 13 Apr 2022 11:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2022/04/13/ukrainian_internet/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at the impact of the current war in Ukraine on the country&amp;rsquo;s internet&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/28546&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at the impact of the current war in Ukraine on the country&amp;rsquo;s internet&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Ukraine</category>
            
          
            
              <category>Russia</category>
            
          
            
              <category>DDoS</category>
            
          
            
              <category>Shodan</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2022</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Over 20 thousand servers have their iLO interfaces exposed to the internet, many with outdated and vulnerable versions of FW</title>
        <link>https://untrustednetwork.net/en/2022/01/26/exposed_hp_ilo/</link>
        <pubDate>Wed, 26 Jan 2022 12:20:00 +0100</pubDate>
        
        <atom:modified>Wed, 26 Jan 2022 12:20:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2022/01/26/exposed_hp_ilo/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at the high number of HP servers that have their out-of-band configuration interface exposed to the internet&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/28276&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at the high number of HP servers that have their out-of-band configuration interface exposed to the internet&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>HP</category>
            
          
            
              <category>Vulnerability</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2022</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Phishing e-mail with...an advertisement?</title>
        <link>https://untrustednetwork.net/en/2022/01/18/phishing_with_advertisement/</link>
        <pubDate>Tue, 18 Jan 2022 10:10:00 +0100</pubDate>
        
        <atom:modified>Tue, 18 Jan 2022 10:10:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2022/01/18/phishing_with_advertisement/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a slightly unusual phishing message that contained text reminiscent of an advertisement for Xerox products&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/28250&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a slightly unusual phishing message that contained text reminiscent of an advertisement for Xerox products&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2022</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Podcast with Gaper.io about (not just) work from home security</title>
        <link>https://untrustednetwork.net/en/2022/01/14/podcast-with-gaper.io-about-not-just-work-from-home-security/</link>
        <pubDate>Fri, 14 Jan 2022 14:00:00 +0100</pubDate>
        
        <atom:modified>Fri, 14 Jan 2022 14:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2022/01/14/podcast-with-gaper.io-about-not-just-work-from-home-security/</guid>
        <description>I&amp;rsquo;ve been invited to do a podcast with Gaper.io some time back, and the resulting recording was published today. Mark Allen, Gaper&amp;rsquo;s business development director, and I spent nearly 20 minutes talking about different security aspects of work from home, general security awareness and several other topics. If you&amp;rsquo;re looking for a light, security-related podcast listen to, this one might not be a bad choice&amp;hellip;</description>
        <content:encoded>&lt;p&gt;I&amp;rsquo;ve been invited to do a podcast with &lt;a href=&#34;https://gaper.io/&#34;&gt;Gaper.io&lt;/a&gt; some time back, and the resulting recording was &lt;a href=&#34;https://gaper.io/user/jan_kopriva/&#34;&gt;published today&lt;/a&gt;. Mark Allen, Gaper&amp;rsquo;s business development director, and I spent nearly 20 minutes talking about different security aspects of work from home, general security awareness and several other topics. If you&amp;rsquo;re looking for a light, security-related podcast listen to, this one might not be a bad choice&amp;hellip;&lt;/p&gt;
&lt;p&gt;&lt;iframe title=&#34;Jan Kopriva, Security Specialist with Alef protects the rest of us from the bad guys&#34; style=&#34;border: none;&#34; scrolling=&#34;no&#34; data-name=&#34;pb-iframe-player&#34; src=&#34;https://www.podbean.com/player-v2/?from=embed&amp;i=2t7b7-114788a-pb&amp;square=1&amp;share=1&amp;download=1&amp;skin=f6f6f6&amp;btn-skin=60a0c8&amp;size=300%22%20allowfullscreen=&#34; allowfullscreen=&#34;&#34; width=&#34;100%&#34; height=&#34;400&#34;&gt;&lt;/iframe&gt;&lt;/p&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/icons/microphone.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>Podcast</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2022</category>
            
          
        
        
      </item>
      
      <item>
        <title>Open ports statistics for 2021</title>
        <link>https://untrustednetwork.net/en/2022/01/05/open_ports_2022/</link>
        <pubDate>Wed, 05 Jan 2022 07:30:00 +0200</pubDate>
        
        <atom:modified>Wed, 05 Jan 2022 07:30:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2022/01/05/open_ports_2022/</guid>
        <description>The year 2021 is behind us which means that the time has come for us to take a look at how the internet changed over its 365 days.
As always, the data, on which the following charts are based, have been gathered using Shodan. Therefore bear in mind that although the charts should give us a good enough view of more significant changes, they may not be completely accurate (see the first post with quarterly statistics.</description>
        <content:encoded>&lt;p&gt;The year 2021 is behind us which means that the time has come for us to take a look at how the internet changed over its 365 days.&lt;/p&gt;
&lt;p&gt;As always, the data, on which the following charts are based, have been gathered using &lt;a href=&#34;https://www.shodan.io/&#34;&gt;Shodan&lt;/a&gt;. Therefore bear in mind that although the charts should give us a good enough view of more significant changes, they may not be completely accurate (see the &lt;a href=&#34;https://untrustednetwork.net/en/2020/09/30/open-ports-statistics-for-q3-2020/&#34;&gt;first post with quarterly statistics&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;It should be mentioned that since Shodan started offering a new service called &lt;a href=&#34;https://trends.shodan.io/&#34;&gt;Trends&lt;/a&gt; few months back, which enables one to quickly view similar charts as the ones bellow for arbitrary search queries, this may be the last post in the &amp;ldquo;Open port statistics&amp;rdquo; series, since these are somewhat superfluous given the new service&amp;hellip; Althoug, since Shodan Trends displays only &amp;ldquo;high-level&amp;rdquo; charts with significantly lower level of precission (it seems that it uses either an average or a median for each month, whereas the following charts show precise values returned by Shodan on each day in the year), maybe I&amp;rsquo;ll decide to keep posting these at least on a yearly basis - we&amp;rsquo;ll see&amp;hellip;&lt;/p&gt;
&lt;p&gt;Should you be interested in the port situation in the Czech Republic, you may find corresponding charts &lt;a href=&#34;https://untrustednetwork.net/cs/2022/01/05/open_ports_2022/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Bellow, you may find charts for the following protocols and ports:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#ssh&#34;&gt;SSH (port 22)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#telnet&#34;&gt;Telnet (port 23)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#dns&#34;&gt;DNS (port 53)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#ntp&#34;&gt;NTP (port 123)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#snmp&#34;&gt;SNMP (port 161)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#smb&#34;&gt;SMB (port 445)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#rdp&#34;&gt;RDP (port 3389)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hrefwebweba&#34;&gt;&lt;a href=&#34;#web&#34;&gt;Web&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#web&#34;&gt;HTTP (port 80)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#https&#34;&gt;HTTPS (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#htls13&#34;&gt;TLS 1.3 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#htls12&#34;&gt;TLS 1.2 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#htls11&#34;&gt;TLS 1.1 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#htls10&#34;&gt;TLS 1.0 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#hssl3&#34;&gt;SSL 3.0 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#hssl2&#34;&gt;SSL 2.0 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hrefemaile-maila&#34;&gt;&lt;a href=&#34;#email&#34;&gt;E-mail&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#smtp&#34;&gt;SMTP (port 25)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#smtps&#34;&gt;SMTPS (port 465)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#imap&#34;&gt;IMAP (port 143)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#imaps&#34;&gt;IMAPS (port 993)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#pop3&#34;&gt;POP3 (port 110)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#pop3s&#34;&gt;POP3S (port 995)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hreftlsssltlsa&#34;&gt;&lt;a href=&#34;#tls&#34;&gt;SSL/TLS&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#tls13&#34;&gt;TLS 1.3 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#tls12&#34;&gt;TLS 1.2 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#tls11&#34;&gt;TLS 1.1 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#tls10&#34;&gt;TLS 1.0 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#ssl3&#34;&gt;SSL 3.0 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#ssl2&#34;&gt;SSL 2.0 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hreficsindustrial-control-systems-icsa&#34;&gt;&lt;a href=&#34;#ics&#34;&gt;Industrial Control Systems (ICS)&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#ics_all&#34;&gt;All ICS protocols&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#modbus&#34;&gt;Modbus (port 502)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#eibnet&#34;&gt;EIBnet/IP (port 3671)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#bacnet&#34;&gt;BACnet/IP (port 47808)&lt;br /&gt;
&lt;br&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h4 id=&#34;ssh&#34;&gt;SSH (port 22)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/ssh.png&#34; alt=&#34;SSH&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;telnet&#34;&gt;Telnet (port 23)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/telnet.png&#34; alt=&#34;Telnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;dns&#34;&gt;DNS (port 53)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/dns.png&#34; alt=&#34;DNS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;ntp&#34;&gt;NTP (port 123)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/ntp.png&#34; alt=&#34;NTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;snmp&#34;&gt;SNMP (port 161)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/snmp.png&#34; alt=&#34;SNMP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;smb&#34;&gt;SMB (port 445)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/smb.png&#34; alt=&#34;SMB&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;rdp&#34;&gt;RDP (port 3389)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/rdp.png&#34; alt=&#34;RDP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;br&gt;
&lt;h2 id=&#34;web&#34;&gt;Web&lt;/h2&gt;
&lt;h4 id=&#34;http&#34;&gt;HTTP (port 80)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/http.png&#34; alt=&#34;HTTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;https&#34;&gt;HTTPS (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/https.png&#34; alt=&#34;HTTPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;htls13&#34;&gt;TLS 1.3 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/htls13.png&#34; alt=&#34;HTTPS/TLS 1.3&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;htls12&#34;&gt;TLS 1.2 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/htls12.png&#34; alt=&#34;HTTPS/TLS 1.2&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;htls11&#34;&gt;TLS 1.1 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/htls11.png&#34; alt=&#34;HTTPS/TLS 1.1&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;htls10&#34;&gt;TLS 1.0 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/htls10.png&#34; alt=&#34;HTTPS/TLS 1.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;hssl3&#34;&gt;SSL 3.0 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/hssl3.png&#34; alt=&#34;HTTPS/SSL 3.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;hssl2&#34;&gt;SSL 2.0 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/hssl2.png&#34; alt=&#34;HTTPS/SSL 2.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;br&gt;
&lt;h2 id=&#34;email&#34;&gt;E-mail&lt;/h2&gt;
&lt;h4 id=&#34;smtp&#34;&gt;SMTP (port 25)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/smtp.png&#34; alt=&#34;SMTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;smtps&#34;&gt;SMTPS (port 465)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/smtps.png&#34; alt=&#34;SMTPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;imap&#34;&gt;IMAP (port 143)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/imap.png&#34; alt=&#34;IMAP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;imaps&#34;&gt;IMAPS (port 993)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/imaps.png&#34; alt=&#34;IMAPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;pop3&#34;&gt;POP3 (port 110)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/pop3.png&#34; alt=&#34;POP3&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;pop3s&#34;&gt;POP3S (port 995)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/pop3s.png&#34; alt=&#34;POP3S&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;br&gt;
&lt;h2 id=&#34;tls&#34;&gt;SSL/TLS&lt;/h2&gt;
&lt;h4 id=&#34;tls13&#34;&gt;TLS 1.3 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/tls13.png&#34; alt=&#34;HTTPS/TLS 1.3&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;tls12&#34;&gt;TLS 1.2 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/tls12.png&#34; alt=&#34;HTTPS/TLS 1.2&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;tls11&#34;&gt;TLS 1.1 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/tls11.png&#34; alt=&#34;HTTPS/TLS 1.1&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;tls10&#34;&gt;TLS 1.0 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/tls10.png&#34; alt=&#34;HTTPS/TLS 1.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;ssl3&#34;&gt;SSL 3.0 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/ssl3.png&#34; alt=&#34;HTTPS/SSL 3.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;ssl2&#34;&gt;SSL 2.0 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/ssl2.png&#34; alt=&#34;HTTPS/SSL 2.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;br&gt;
&lt;h2 id=&#34;ics&#34;&gt;Industrial Control Systems&lt;/h2&gt;
&lt;h4 id=&#34;ics_all&#34;&gt;All ICS protocols&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/ics.png&#34; alt=&#34;All ICS protocols&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;modbus&#34;&gt;Modbus (port 502)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/modbus.png&#34; alt=&#34;Modbus&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;eibnet&#34;&gt;EIBnet/IP (port 3671)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/eibnet.png&#34; alt=&#34;EIBnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;bacnet&#34;&gt;BACnet/IP (port 47808)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q4/bacnet.png&#34; alt=&#34;BACnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/ports/2021/q4/ssl2.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SSL</category>
            
          
            
              <category>TLS</category>
            
          
            
              <category>Telnet</category>
            
          
            
              <category>DNS</category>
            
          
            
              <category>NTP</category>
            
          
            
              <category>SNMP</category>
            
          
            
              <category>SMB</category>
            
          
            
              <category>RDP</category>
            
          
            
              <category>HTTP</category>
            
          
            
              <category>HTTPS</category>
            
          
            
              <category>SMTP</category>
            
          
            
              <category>SMTPS</category>
            
          
            
              <category>IMAP</category>
            
          
            
              <category>IMAPS</category>
            
          
            
              <category>POP3</category>
            
          
            
              <category>POP3S</category>
            
          
            
              <category>ICS</category>
            
          
            
              <category>Modbus</category>
            
          
            
              <category>EIBnet</category>
            
          
            
              <category>BACnet</category>
            
          
            
              <category>Shodan</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2022</category>
            
          
        
        
          
            
              <category>Open port statistics</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Do you want your Agent Tesla in the 300 MB or 8 kB package?</title>
        <link>https://untrustednetwork.net/en/2021/12/31/agent_tesla-300mb/</link>
        <pubDate>Fri, 31 Dec 2021 13:15:00 +0100</pubDate>
        
        <atom:modified>Fri, 31 Dec 2021 13:15:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/12/31/agent_tesla-300mb/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at some of the largest and smallest malicious PE files that were caught by my malspam trap in 2021&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/28202&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at some of the largest and smallest malicious PE files that were caught by my malspam trap in 2021&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Agent Tesla</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - PowerPoint attachments, Agent Tesla and code reuse in malware</title>
        <link>https://untrustednetwork.net/en/2021/12/20/agent_tesla-powerpoint/</link>
        <pubDate>Mon, 20 Dec 2021 17:00:00 +0100</pubDate>
        
        <atom:modified>Mon, 20 Dec 2021 17:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/12/20/agent_tesla-powerpoint/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a malspam message with macro-enabled PowerPoint attachment that turned out to be first stage of an Agent Tesla infection chain&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/28154&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a malspam message with macro-enabled PowerPoint attachment that turned out to be first stage of an Agent Tesla infection chain&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Agent Tesla</category>
            
          
            
              <category>Macro</category>
            
          
            
              <category>Malspam</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Phishing page hiding itself using dynamically adjusted IP-based allow list</title>
        <link>https://untrustednetwork.net/en/2021/11/24/phishing_allow_list/</link>
        <pubDate>Wed, 24 Nov 2021 12:10:00 +0100</pubDate>
        
        <atom:modified>Wed, 24 Nov 2021 12:10:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/11/24/phishing_allow_list/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at an interesting protection mechanism used on a phishing site to deny access to it to anyone but the victim who first clicked the link in a phishing mail&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/28070&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at an interesting protection mechanism used on a phishing site to deny access to it to anyone but the victim who first clicked the link in a phishing mail&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>TriOp update - version 1.4 (and Shodan Trends)</title>
        <link>https://untrustednetwork.net/en/2021/10/28/triop-update-version-1.4-and-shodan-trends/</link>
        <pubDate>Thu, 28 Oct 2021 14:00:00 +0200</pubDate>
        
        <atom:modified>Thu, 28 Oct 2021 14:00:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/10/28/triop-update-version-1.4-and-shodan-trends/</guid>
        <description>I’ve published version 1.4 of TriOp today. The only change in this version is the addition of CVE-2021-31206 (vulnerability used in the ProxyShell attack) to the relevant search list.
One additional point that deserves a mention is that Shodan has recently opened access to a new service called Shodan Trends, which enables users to generate trend charts for (probably) arbitrary Shodan queries. Although these charts are based on monthly averages and are therefore not as precise as charts generated from data collected on a daily basis using TriOp, they can certainly provide one with an interesting look at long-term trends.</description>
        <content:encoded>&lt;p&gt;I’ve published version 1.4 of &lt;a href=&#34;https://untrustednetwork.net/en/triop/&#34;&gt;TriOp&lt;/a&gt; today. The only change in this version is the addition of CVE-2021-31206 (vulnerability used in the ProxyShell attack) to the relevant search list.&lt;/p&gt;
&lt;p&gt;One additional point that deserves a mention is that Shodan has recently opened access to a new service called &lt;a href=&#34;https://trends.shodan.io/&#34;&gt;Shodan Trends&lt;/a&gt;, which enables users to generate trend charts for (probably) arbitrary Shodan queries. Although these charts are based on monthly averages and are therefore not as precise as charts generated from data collected on a daily basis using TriOp, they can certainly provide one with an interesting look at long-term trends. If you therefore only require general information about trends related to one or more Shodan queries and don&amp;rsquo;t need a detailed view at how things change on a day-to-day basis, then this service might be a viable alternative to TriOp for you&amp;hellip;&lt;/p&gt;
&lt;p&gt;As alway, you may download the latest version of TriOp from &lt;a href=&#34;https://github.com/NettleSec/TriOp&#34;&gt;my GitHub&lt;/a&gt;.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Tool</category>
            
          
            
              <category>TriOp</category>
            
          
            
              <category>Shodan</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
      </item>
      
      <item>
        <title>Open ports statistics for Q3 2021</title>
        <link>https://untrustednetwork.net/en/2021/10/01/open_ports_q3_2021/</link>
        <pubDate>Fri, 01 Oct 2021 15:00:00 +0200</pubDate>
        
        <atom:modified>Fri, 01 Oct 2021 15:00:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/10/01/open_ports_q3_2021/</guid>
        <description>Only the last three months remain until the end of 2021, which means it&amp;rsquo;s time for a look at how the internet as a whole changed in the third quarter of the year.
As always, the data, on which the following charts are based, have been gathered using Shodan. Therefore bear in mind that although the charts should give us a good enough view of more significant changes, they may not be completely accurate (see the first post with quarterly statistics.</description>
        <content:encoded>&lt;p&gt;Only the last three months remain until the end of 2021, which means it&amp;rsquo;s time for a look at how the internet as a whole changed in the third quarter of the year.&lt;/p&gt;
&lt;p&gt;As always, the data, on which the following charts are based, have been gathered using &lt;a href=&#34;https://www.shodan.io/&#34;&gt;Shodan&lt;/a&gt;. Therefore bear in mind that although the charts should give us a good enough view of more significant changes, they may not be completely accurate (see the &lt;a href=&#34;https://untrustednetwork.net/en/2020/09/30/open-ports-statistics-for-q3-2020/&#34;&gt;first post with quarterly statistics&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Should you be interested in the port situation in the Czech Republic, you may find corresponding charts &lt;a href=&#34;https://untrustednetwork.net/cs/2021/10/01/open_ports_q3_2021/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Bellow, you may find charts for the following protocols and ports:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#ssh&#34;&gt;SSH (port 22)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#telnet&#34;&gt;Telnet (port 23)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#dns&#34;&gt;DNS (port 53)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#ntp&#34;&gt;NTP (port 123)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#snmp&#34;&gt;SNMP (port 161)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#smb&#34;&gt;SMB (port 445)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#rdp&#34;&gt;RDP (port 3389)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hrefwebweba&#34;&gt;&lt;a href=&#34;#web&#34;&gt;Web&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#web&#34;&gt;HTTP (port 80)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#https&#34;&gt;HTTPS (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#htls13&#34;&gt;TLS 1.3 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#htls12&#34;&gt;TLS 1.2 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#htls11&#34;&gt;TLS 1.1 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#htls10&#34;&gt;TLS 1.0 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#hssl3&#34;&gt;SSL 3.0 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#hssl2&#34;&gt;SSL 2.0 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hrefemaile-maila&#34;&gt;&lt;a href=&#34;#email&#34;&gt;E-mail&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#smtp&#34;&gt;SMTP (port 25)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#smtps&#34;&gt;SMTPS (port 465)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#imap&#34;&gt;IMAP (port 143)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#imaps&#34;&gt;IMAPS (port 993)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#pop3&#34;&gt;POP3 (port 110)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#pop3s&#34;&gt;POP3S (port 995)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hreftlsssltlsa&#34;&gt;&lt;a href=&#34;#tls&#34;&gt;SSL/TLS&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#tls13&#34;&gt;TLS 1.3 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#tls12&#34;&gt;TLS 1.2 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#tls11&#34;&gt;TLS 1.1 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#tls10&#34;&gt;TLS 1.0 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#ssl3&#34;&gt;SSL 3.0 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#ssl2&#34;&gt;SSL 2.0 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hreficsindustrial-control-systems-icsa&#34;&gt;&lt;a href=&#34;#ics&#34;&gt;Industrial Control Systems (ICS)&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#ics_all&#34;&gt;All ICS protocols&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#modbus&#34;&gt;Modbus (port 502)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#eibnet&#34;&gt;EIBnet/IP (port 3671)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#bacnet&#34;&gt;BACnet/IP (port 47808)&lt;br /&gt;
&lt;br&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h4 id=&#34;ssh&#34;&gt;SSH (port 22)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/ssh.png&#34; alt=&#34;SSH&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;telnet&#34;&gt;Telnet (port 23)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/telnet.png&#34; alt=&#34;Telnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;dns&#34;&gt;DNS (port 53)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/dns.png&#34; alt=&#34;DNS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;ntp&#34;&gt;NTP (port 123)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/ntp.png&#34; alt=&#34;NTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;snmp&#34;&gt;SNMP (port 161)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/snmp.png&#34; alt=&#34;SNMP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;smb&#34;&gt;SMB (port 445)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/smb.png&#34; alt=&#34;SMB&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;rdp&#34;&gt;RDP (port 3389)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/rdp.png&#34; alt=&#34;RDP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;br&gt;
&lt;h2 id=&#34;web&#34;&gt;Web&lt;/h2&gt;
&lt;h4 id=&#34;http&#34;&gt;HTTP (port 80)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/http.png&#34; alt=&#34;HTTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;https&#34;&gt;HTTPS (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/https.png&#34; alt=&#34;HTTPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;htls13&#34;&gt;TLS 1.3 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/htls13.png&#34; alt=&#34;HTTPS/TLS 1.3&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;htls12&#34;&gt;TLS 1.2 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/htls12.png&#34; alt=&#34;HTTPS/TLS 1.2&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;htls11&#34;&gt;TLS 1.1 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/htls11.png&#34; alt=&#34;HTTPS/TLS 1.1&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;htls10&#34;&gt;TLS 1.0 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/htls10.png&#34; alt=&#34;HTTPS/TLS 1.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;hssl3&#34;&gt;SSL 3.0 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/hssl3.png&#34; alt=&#34;HTTPS/SSL 3.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;hssl2&#34;&gt;SSL 2.0 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/hssl2.png&#34; alt=&#34;HTTPS/SSL 2.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;br&gt;
&lt;h2 id=&#34;email&#34;&gt;E-mail&lt;/h2&gt;
&lt;h4 id=&#34;smtp&#34;&gt;SMTP (port 25)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/smtp.png&#34; alt=&#34;SMTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;smtps&#34;&gt;SMTPS (port 465)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/smtps.png&#34; alt=&#34;SMTPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;imap&#34;&gt;IMAP (port 143)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/imap.png&#34; alt=&#34;IMAP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;imaps&#34;&gt;IMAPS (port 993)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/imaps.png&#34; alt=&#34;IMAPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;pop3&#34;&gt;POP3 (port 110)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/pop3.png&#34; alt=&#34;POP3&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;pop3s&#34;&gt;POP3S (port 995)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/pop3s.png&#34; alt=&#34;POP3S&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;br&gt;
&lt;h2 id=&#34;tls&#34;&gt;SSL/TLS&lt;/h2&gt;
&lt;h4 id=&#34;tls13&#34;&gt;TLS 1.3 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/tls13.png&#34; alt=&#34;HTTPS/TLS 1.3&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;tls12&#34;&gt;TLS 1.2 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/tls12.png&#34; alt=&#34;HTTPS/TLS 1.2&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;tls11&#34;&gt;TLS 1.1 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/tls11.png&#34; alt=&#34;HTTPS/TLS 1.1&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;tls10&#34;&gt;TLS 1.0 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/tls10.png&#34; alt=&#34;HTTPS/TLS 1.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;ssl3&#34;&gt;SSL 3.0 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/ssl3.png&#34; alt=&#34;HTTPS/SSL 3.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;ssl2&#34;&gt;SSL 2.0 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/ssl2.png&#34; alt=&#34;HTTPS/SSL 2.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;br&gt;
&lt;h2 id=&#34;ics&#34;&gt;Industrial Control Systems&lt;/h2&gt;
&lt;h4 id=&#34;ics_all&#34;&gt;All ICS protocols&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/ics.png&#34; alt=&#34;All ICS protocols&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;modbus&#34;&gt;Modbus (port 502)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/modbus.png&#34; alt=&#34;Modbus&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;eibnet&#34;&gt;EIBnet/IP (port 3671)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/eibnet.png&#34; alt=&#34;EIBnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;bacnet&#34;&gt;BACnet/IP (port 47808)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q3/bacnet.png&#34; alt=&#34;BACnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/ports/2021/q3/htls13.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SSL</category>
            
          
            
              <category>TLS</category>
            
          
            
              <category>Telnet</category>
            
          
            
              <category>DNS</category>
            
          
            
              <category>NTP</category>
            
          
            
              <category>SNMP</category>
            
          
            
              <category>SMB</category>
            
          
            
              <category>RDP</category>
            
          
            
              <category>HTTP</category>
            
          
            
              <category>HTTPS</category>
            
          
            
              <category>SMTP</category>
            
          
            
              <category>SMTPS</category>
            
          
            
              <category>IMAP</category>
            
          
            
              <category>IMAPS</category>
            
          
            
              <category>POP3</category>
            
          
            
              <category>POP3S</category>
            
          
            
              <category>ICS</category>
            
          
            
              <category>Modbus</category>
            
          
            
              <category>EIBnet</category>
            
          
            
              <category>BACnet</category>
            
          
            
              <category>Shodan</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>Open port statistics</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - TLS 1.3 and SSL - the current state of affairs</title>
        <link>https://untrustednetwork.net/en/2021/09/28/ssl_tls/</link>
        <pubDate>Tue, 28 Sep 2021 11:20:00 +0200</pubDate>
        
        <atom:modified>Tue, 28 Sep 2021 11:20:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/09/28/ssl_tls/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at the current state of adoption of TLS 1.3 and disposal of SSL 2.0 and 3.0&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/27882&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at the current state of adoption of TLS 1.3 and disposal of SSL 2.0 and 3.0&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Shodan</category>
            
          
            
              <category>TLS</category>
            
          
            
              <category>SSL</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Phishing 101: why depend on one suspicious message subject when you can use many?</title>
        <link>https://untrustednetwork.net/en/2021/09/16/phishing-multiple-subjects/</link>
        <pubDate>Thu, 16 Sep 2021 09:10:00 +0200</pubDate>
        
        <atom:modified>Thu, 16 Sep 2021 09:10:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/09/16/phishing-multiple-subjects/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a phishing that tried to use multiple suspicious message subjects to lure the recipient to a phishing site&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/27842&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a phishing that tried to use multiple suspicious message subjects to lure the recipient to a phishing site&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - There may be (many) more SPF records than we might expect</title>
        <link>https://untrustednetwork.net/en/2021/08/25/spf/</link>
        <pubDate>Wed, 25 Aug 2021 11:55:00 +0200</pubDate>
        
        <atom:modified>Wed, 25 Aug 2021 11:55:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/08/25/spf/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at the surprisingly high number of SPF records set for domains in the CZ TLD&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/27786&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at the surprisingly high number of SPF records set for domains in the CZ TLD&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>SPF</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>TriOp update - version 1.3</title>
        <link>https://untrustednetwork.net/en/2021/08/12/triop-update-version-1.3/</link>
        <pubDate>Thu, 12 Aug 2021 17:25:00 +0200</pubDate>
        
        <atom:modified>Thu, 12 Aug 2021 17:25:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/08/12/triop-update-version-1.3/</guid>
        <description>I’ve published version 1.3 of TriOp today. The only change in this version is the addition of vulnerabilities used in the ProxyShell attack (CVE-2021-31207, CVE-2021-34473 and CVE-2021-34523) to the relevant search list.
Chaining of the vulnerabilities in question may lead to an unauthenticated RCE, so one would hope that given the recent media attention that was given to them, most organizations would patch them quickly. However, so far, the daily increases in number of their detections on Shodan seem to paint a slightly less optimistic picture&amp;hellip;</description>
        <content:encoded>&lt;p&gt;I’ve published version 1.3 of &lt;a href=&#34;https://untrustednetwork.net/en/triop/&#34;&gt;TriOp&lt;/a&gt; today. The only change in this version is the addition of vulnerabilities used in the &lt;a href=&#34;https://isc.sans.edu/diary/27732&#34;&gt;ProxyShell attack&lt;/a&gt; (CVE-2021-31207, CVE-2021-34473 and CVE-2021-34523) to the relevant search list.&lt;/p&gt;
&lt;p&gt;Chaining of the vulnerabilities in question may lead to an unauthenticated RCE, so one would hope that given the recent &lt;a href=&#34;https://www.securityweek.com/internet-scanned-microsoft-exchange-servers-vulnerable-proxyshell-attacks&#34;&gt;media attention&lt;/a&gt; that was given to them, most organizations would patch them quickly. However, so far, the daily increases in number of their detections on Shodan seem to paint a slightly less optimistic picture&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/2021/triop13/proxyshell-210812.png&#34; alt=&#34;ProxyShell detections - August 9 to August 12, 2021&#34; style=&#34;width:700px; border:1px solid grey&#34;&gt;
&lt;br&gt;
&lt;p&gt;As alway, you may download the latest version of TriOp from &lt;a href=&#34;https://github.com/NettleSec/TriOp&#34;&gt;my GitHub&lt;/a&gt;.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.net/images/2021/triop13/proxyshell-210812.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>Tool</category>
            
          
            
              <category>TriOp</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - ProxyShell - how many Exchange servers are affected and where are they?</title>
        <link>https://untrustednetwork.net/en/2021/08/09/proxyshell/</link>
        <pubDate>Mon, 09 Aug 2021 12:25:00 +0200</pubDate>
        
        <atom:modified>Mon, 09 Aug 2021 12:25:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/08/09/proxyshell/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at the number of Exchange serveres vulnerable to the ProxyShell attack&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/27732&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at the number of Exchange serveres vulnerable to the ProxyShell attack&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Vulnerability</category>
            
          
            
              <category>Microsoft</category>
            
          
            
              <category>Exchange</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>List of free online malware analysis sandboxes v1.7</title>
        <link>https://untrustednetwork.net/en/2021/08/04/sandboxes-1.7/</link>
        <pubDate>Wed, 04 Aug 2021 08:55:00 +0200</pubDate>
        
        <atom:modified>Wed, 04 Aug 2021 08:55:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/08/04/sandboxes-1.7/</guid>
        <description>Since the online malware sandbox landscape has changed somewhat over the last six months, I have updated my list of most useful sandboxes to reflect these changes. One improvement that deserves a special mention was a significant increase in number of supported operating systems by the Hatching Triage platform&amp;hellip;
As always, you may find the current version here.</description>
        <content:encoded>&lt;p&gt;Since the online malware sandbox landscape has changed somewhat over the last six months, I have updated my list of most useful sandboxes to reflect these changes. One improvement that deserves a special mention was a significant increase in number of supported operating systems by the &lt;a href=&#34;https://tria.ge/&#34;&gt;Hatching Triage&lt;/a&gt; platform&amp;hellip;&lt;/p&gt;
&lt;p&gt;As always, you may find the current version &lt;a href=&#34;https://www.untrustednetwork.net/en/sandboxes/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/misc/free-malware-analysis-sandboxes-overview-1.7.png&#34; alt=&#34;Overview of free online malware analysis sandboxes – 8/2021&#34; style=&#34;width:700px; border:1px solid grey&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/misc/free-malware-analysis-sandboxes-overview-1.7.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>Malware</category>
            
          
            
              <category>Sandbox</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - A sextortion e-mail from...IT support?!</title>
        <link>https://untrustednetwork.net/en/2021/07/28/sextortion_from_it/</link>
        <pubDate>Wed, 28 Jul 2021 08:35:00 +0200</pubDate>
        
        <atom:modified>Wed, 28 Jul 2021 08:35:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/07/28/sextortion_from_it/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a slightly unusual sextortion phishing, in which its author claimed to work for an IT service company hired by recipients e-mail provider&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/27682&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a slightly unusual sextortion phishing, in which its author claimed to work for an IT service company hired by recipients e-mail provider&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Sextortion</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - One way to fail at malspam - give recipients the wrong password for an encrypted attachment </title>
        <link>https://untrustednetwork.net/en/2021/07/14/malspam_fail/</link>
        <pubDate>Wed, 14 Jul 2021 13:10:00 +0200</pubDate>
        
        <atom:modified>Wed, 14 Jul 2021 13:10:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/07/14/malspam_fail/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a malspam campaign, whose authors failed to include a correct password to decrypt the malicious attachment&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/27634&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a malspam campaign, whose authors failed to include a correct password to decrypt the malicious attachment&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Malspam</category>
            
          
            
              <category>Encryption</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Open ports statistics for Q2 2021</title>
        <link>https://untrustednetwork.net/en/2021/06/30/open_ports_q2_2021/</link>
        <pubDate>Wed, 30 Jun 2021 21:15:00 +0200</pubDate>
        
        <atom:modified>Wed, 30 Jun 2021 21:15:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/06/30/open_ports_q2_2021/</guid>
        <description>The first half of 2020 is behind us, which means it&amp;rsquo;s time for a look at how the internet as a whole changed during the past 3 months.
As always, the data, on which the following charts are based, have been gathered using Shodan. Therefore bear in mind that although the charts should give us a good enough view of more significant changes, they may not be completely accurate (see the first post with quarterly statistics.</description>
        <content:encoded>&lt;p&gt;The first half of 2020 is behind us, which means it&amp;rsquo;s time for a look at how the internet as a whole changed during the past 3 months.&lt;/p&gt;
&lt;p&gt;As always, the data, on which the following charts are based, have been gathered using &lt;a href=&#34;https://www.shodan.io/&#34;&gt;Shodan&lt;/a&gt;. Therefore bear in mind that although the charts should give us a good enough view of more significant changes, they may not be completely accurate (see the &lt;a href=&#34;https://untrustednetwork.net/en/2020/09/30/open-ports-statistics-for-q3-2020/&#34;&gt;first post with quarterly statistics&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Should you be interested in the port situation in the Czech Republic, you may find corresponding charts &lt;a href=&#34;https://untrustednetwork.net/cs/2021/06/30/open_ports_q2_2021/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Bellow, you may find charts for the following protocols and ports:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#ssh&#34;&gt;SSH (port 22)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#telnet&#34;&gt;Telnet (port 23)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#dns&#34;&gt;DNS (port 53)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#ntp&#34;&gt;NTP (port 123)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#snmp&#34;&gt;SNMP (port 161)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#smb&#34;&gt;SMB (port 445)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#rdp&#34;&gt;RDP (port 3389)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hrefwebweba&#34;&gt;&lt;a href=&#34;#web&#34;&gt;Web&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#web&#34;&gt;HTTP (port 80)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#https&#34;&gt;HTTPS (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#htls13&#34;&gt;TLS 1.3 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#htls12&#34;&gt;TLS 1.2 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#htls11&#34;&gt;TLS 1.1 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#htls10&#34;&gt;TLS 1.0 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#hssl3&#34;&gt;SSL 3.0 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#hssl2&#34;&gt;SSL 2.0 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hrefemaile-maila&#34;&gt;&lt;a href=&#34;#email&#34;&gt;E-mail&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#smtp&#34;&gt;SMTP (port 25)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#smtps&#34;&gt;SMTPS (port 465)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#imap&#34;&gt;IMAP (port 143)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#imaps&#34;&gt;IMAPS (port 993)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#pop3&#34;&gt;POP3 (port 110)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#pop3s&#34;&gt;POP3S (port 995)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hreftlsssltlsa&#34;&gt;&lt;a href=&#34;#tls&#34;&gt;SSL/TLS&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#tls13&#34;&gt;TLS 1.3 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#tls12&#34;&gt;TLS 1.2 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#tls11&#34;&gt;TLS 1.1 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#tls10&#34;&gt;TLS 1.0 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#ssl3&#34;&gt;SSL 3.0 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#ssl2&#34;&gt;SSL 2.0 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hreficsindustrial-control-systems-icsa&#34;&gt;&lt;a href=&#34;#ics&#34;&gt;Industrial Control Systems (ICS)&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#ics_all&#34;&gt;All ICS protocols&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#modbus&#34;&gt;Modbus (port 502)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#eibnet&#34;&gt;EIBnet/IP (port 3671)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#bacnet&#34;&gt;BACnet/IP (port 47808)&lt;br /&gt;
&lt;br&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h4 id=&#34;ssh&#34;&gt;SSH (port 22)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/ssh.png&#34; alt=&#34;SSH&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;telnet&#34;&gt;Telnet (port 23)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/telnet.png&#34; alt=&#34;Telnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;dns&#34;&gt;DNS (port 53)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/dns.png&#34; alt=&#34;DNS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;ntp&#34;&gt;NTP (port 123)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/ntp.png&#34; alt=&#34;NTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;snmp&#34;&gt;SNMP (port 161)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/snmp.png&#34; alt=&#34;SNMP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;smb&#34;&gt;SMB (port 445)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/smb.png&#34; alt=&#34;SMB&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;rdp&#34;&gt;RDP (port 3389)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/rdp.png&#34; alt=&#34;RDP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;br&gt;
&lt;h2 id=&#34;web&#34;&gt;Web&lt;/h2&gt;
&lt;h4 id=&#34;http&#34;&gt;HTTP (port 80)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/http.png&#34; alt=&#34;HTTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;https&#34;&gt;HTTPS (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/https.png&#34; alt=&#34;HTTPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;htls13&#34;&gt;TLS 1.3 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/htls13.png&#34; alt=&#34;HTTPS/TLS 1.3&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;htls12&#34;&gt;TLS 1.2 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/htls12.png&#34; alt=&#34;HTTPS/TLS 1.2&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;htls11&#34;&gt;TLS 1.1 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/htls11.png&#34; alt=&#34;HTTPS/TLS 1.1&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;htls10&#34;&gt;TLS 1.0 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/htls10.png&#34; alt=&#34;HTTPS/TLS 1.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;hssl3&#34;&gt;SSL 3.0 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/hssl3.png&#34; alt=&#34;HTTPS/SSL 3.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;hssl2&#34;&gt;SSL 2.0 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/hssl2.png&#34; alt=&#34;HTTPS/SSL 2.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;br&gt;
&lt;h2 id=&#34;email&#34;&gt;E-mail&lt;/h2&gt;
&lt;h4 id=&#34;smtp&#34;&gt;SMTP (port 25)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/smtp.png&#34; alt=&#34;SMTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;smtps&#34;&gt;SMTPS (port 465)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/smtps.png&#34; alt=&#34;SMTPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;imap&#34;&gt;IMAP (port 143)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/imap.png&#34; alt=&#34;IMAP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;imaps&#34;&gt;IMAPS (port 993)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/imaps.png&#34; alt=&#34;IMAPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;pop3&#34;&gt;POP3 (port 110)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/pop3.png&#34; alt=&#34;POP3&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;pop3s&#34;&gt;POP3S (port 995)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/pop3s.png&#34; alt=&#34;POP3S&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;br&gt;
&lt;h2 id=&#34;tls&#34;&gt;SSL/TLS&lt;/h2&gt;
&lt;h4 id=&#34;tls13&#34;&gt;TLS 1.3 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/tls13.png&#34; alt=&#34;HTTPS/TLS 1.3&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;tls12&#34;&gt;TLS 1.2 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/tls12.png&#34; alt=&#34;HTTPS/TLS 1.2&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;tls11&#34;&gt;TLS 1.1 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/tls11.png&#34; alt=&#34;HTTPS/TLS 1.1&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;tls10&#34;&gt;TLS 1.0 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/tls10.png&#34; alt=&#34;HTTPS/TLS 1.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;ssl3&#34;&gt;SSL 3.0 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/ssl3.png&#34; alt=&#34;HTTPS/SSL 3.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;ssl2&#34;&gt;SSL 2.0 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/ssl2.png&#34; alt=&#34;HTTPS/SSL 2.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;br&gt;
&lt;h2 id=&#34;ics&#34;&gt;Industrial Control Systems&lt;/h2&gt;
&lt;h4 id=&#34;ics_all&#34;&gt;All ICS protocols&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/ics.png&#34; alt=&#34;All ICS protocols&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;modbus&#34;&gt;Modbus (port 502)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/modbus.png&#34; alt=&#34;Modbus&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;eibnet&#34;&gt;EIBnet/IP (port 3671)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/eibnet.png&#34; alt=&#34;EIBnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;bacnet&#34;&gt;BACnet/IP (port 47808)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q2/bacnet.png&#34; alt=&#34;BACnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/ports/2021/q2/hssl2.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SSL</category>
            
          
            
              <category>TLS</category>
            
          
            
              <category>Telnet</category>
            
          
            
              <category>DNS</category>
            
          
            
              <category>NTP</category>
            
          
            
              <category>SNMP</category>
            
          
            
              <category>SMB</category>
            
          
            
              <category>RDP</category>
            
          
            
              <category>HTTP</category>
            
          
            
              <category>HTTPS</category>
            
          
            
              <category>SMTP</category>
            
          
            
              <category>SMTPS</category>
            
          
            
              <category>IMAP</category>
            
          
            
              <category>IMAPS</category>
            
          
            
              <category>POP3</category>
            
          
            
              <category>POP3S</category>
            
          
            
              <category>ICS</category>
            
          
            
              <category>Modbus</category>
            
          
            
              <category>EIBnet</category>
            
          
            
              <category>BACnet</category>
            
          
            
              <category>Shodan</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>Open port statistics</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Phishing asking recipients not to report abuse</title>
        <link>https://untrustednetwork.net/en/2021/06/22/phishing_abuse/</link>
        <pubDate>Tue, 22 Jun 2021 15:15:00 +0200</pubDate>
        
        <atom:modified>Tue, 22 Jun 2021 15:15:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/06/22/phishing_abuse/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a phishing message that ended with an unusual request&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/27556&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a phishing message that ended with an unusual request&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Architecture, compilers and black magic, or &#39;what else affects the ability of AVs to detect malicious files&#39;</title>
        <link>https://untrustednetwork.net/en/2021/06/09/compilers/</link>
        <pubDate>Wed, 09 Jun 2021 13:25:00 +0200</pubDate>
        
        <atom:modified>Wed, 09 Jun 2021 13:25:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/06/09/compilers/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at how the use of a compiler affects the ability of anti-malware tools to detect malicious code&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/27510&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at how the use of a compiler affects the ability of anti-malware tools to detect malicious code&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Malware</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - All your Base are...nearly equal when it comes to AV evasion, but 64-bit executables are not</title>
        <link>https://untrustednetwork.net/en/2021/05/27/all_your_base/</link>
        <pubDate>Thu, 27 May 2021 11:30:00 +0200</pubDate>
        
        <atom:modified>Thu, 27 May 2021 11:30:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/05/27/all_your_base/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at the difference (or lack thereof) different binary-to-text encodings make when it comes to anti-malware evasion&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/27466&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at the difference (or lack thereof) different binary-to-text encodings make when it comes to anti-malware evasion&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Malware</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Number of industrial control systems on the internet is lower then in 2020...but still far from zero</title>
        <link>https://untrustednetwork.net/en/2021/05/12/ics_on_internet/</link>
        <pubDate>Wed, 12 May 2021 13:15:00 +0200</pubDate>
        
        <atom:modified>Wed, 12 May 2021 13:15:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/05/12/ics_on_internet/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at the number of Industrial Control Systems accessible from the internet&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/27412&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at the number of Industrial Control Systems accessible from the internet&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>ICS</category>
            
          
            
              <category>Shodan</category>
            
          
            
              <category>Censys</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Hunting phishing websites with favicon hashes</title>
        <link>https://untrustednetwork.net/en/2021/04/19/favicon_hunting/</link>
        <pubDate>Mon, 19 Apr 2021 11:15:00 +0200</pubDate>
        
        <atom:modified>Mon, 19 Apr 2021 11:15:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/04/19/favicon_hunting/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at how HTTP favicon hashes may be used to identify IP addresses hosting phishing websites&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/27326&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at how HTTP favicon hashes may be used to identify IP addresses hosting phishing websites&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Shodan</category>
            
          
            
              <category>Hash</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Malspam with Lokibot vs. Outlook and RFCs</title>
        <link>https://untrustednetwork.net/en/2021/04/06/lokibot_outlook/</link>
        <pubDate>Tue, 06 Apr 2021 18:30:00 +0200</pubDate>
        
        <atom:modified>Tue, 06 Apr 2021 18:30:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/04/06/lokibot_outlook/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center website. In it, we&amp;rsquo;ll take a look at an interesting malspam message carrying the Lokibot infostealer and also causing quite unusual behavior in Outlook&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/diary/27282&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In it, we&amp;rsquo;ll take a look at an interesting malspam message carrying the Lokibot infostealer and also causing quite unusual behavior in Outlook&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Lokibot</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Outlook</category>
            
          
            
              <category>Malspam</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Open ports statistics for Q1 2021</title>
        <link>https://untrustednetwork.net/en/2021/04/05/open_ports_q1_2021/</link>
        <pubDate>Mon, 05 Apr 2021 11:30:00 +0200</pubDate>
        
        <atom:modified>Mon, 05 Apr 2021 11:30:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/04/05/open_ports_q1_2021/</guid>
        <description>The first quarter of 2020 is behind us, which means it&amp;rsquo;s time for another look at some of the interesting ports accessible on public IPs. This time however, we will take a look at how the internet as a whole changed during the past 3 months in terms of accessible ports, but also at specific changes related to support of different versions of SSL and TLS.
As always, the data, on which the following charts are based, have been gathered using Shodan.</description>
        <content:encoded>&lt;p&gt;The first quarter of 2020 is behind us, which means it&amp;rsquo;s time for another look at some of the interesting ports accessible on public IPs. This time however, we will take a look at how the internet as a whole changed during the past 3 months in terms of accessible ports, but also at specific changes related to support of different versions of SSL and TLS.&lt;/p&gt;
&lt;p&gt;As always, the data, on which the following charts are based, have been gathered using &lt;a href=&#34;https://www.shodan.io/&#34;&gt;Shodan&lt;/a&gt;. Therefore bear in mind that although the charts should give us a good enough view of more significant changes, they may not be completely accurate (see the &lt;a href=&#34;https://untrustednetwork.net/en/2020/09/30/open-ports-statistics-for-q3-2020/&#34;&gt;first post with quarterly statistics&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Should you be interested in the port situation in the Czech Republic, you may find corresponding charts &lt;a href=&#34;https://untrustednetwork.net/cs/2021/04/05/open_ports_q1_2021/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Bellow, you may find charts for the following protocols and ports:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#ssh&#34;&gt;SSH (port 22)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#telnet&#34;&gt;Telnet (port 23)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#dns&#34;&gt;DNS (port 53)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#ntp&#34;&gt;NTP (port 123)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#snmp&#34;&gt;SNMP (port 161)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#smb&#34;&gt;SMB (port 445)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#rdp&#34;&gt;RDP (port 3389)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hrefwebweba&#34;&gt;&lt;a href=&#34;#web&#34;&gt;Web&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#web&#34;&gt;HTTP (port 80)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#https&#34;&gt;HTTPS (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#htls13&#34;&gt;TLS 1.3 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#htls12&#34;&gt;TLS 1.2 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#htls11&#34;&gt;TLS 1.1 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#htls10&#34;&gt;TLS 1.0 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#hssl3&#34;&gt;SSL 3.0 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#hssl2&#34;&gt;SSL 2.0 (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hrefemaile-maila&#34;&gt;&lt;a href=&#34;#email&#34;&gt;E-mail&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#smtp&#34;&gt;SMTP (port 25)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#smtps&#34;&gt;SMTPS (port 465)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#imap&#34;&gt;IMAP (port 143)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#imaps&#34;&gt;IMAPS (port 993)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#pop3&#34;&gt;POP3 (port 110)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#pop3s&#34;&gt;POP3S (port 995)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hreftlsssltlsa&#34;&gt;&lt;a href=&#34;#tls&#34;&gt;SSL/TLS&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#tls13&#34;&gt;TLS 1.3 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#tls12&#34;&gt;TLS 1.2 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#tls11&#34;&gt;TLS 1.1 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#tls10&#34;&gt;TLS 1.0 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#ssl3&#34;&gt;SSL 3.0 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#ssl2&#34;&gt;SSL 2.0 (all ports)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hreficsindustrial-control-systems-icsa&#34;&gt;&lt;a href=&#34;#ics&#34;&gt;Industrial Control Systems (ICS)&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#ics_all&#34;&gt;All ICS protocols&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#modbus&#34;&gt;Modbus (port 502)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#eibnet&#34;&gt;EIBnet/IP (port 3671)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#bacnet&#34;&gt;BACnet/IP (port 47808)&lt;br /&gt;
&lt;br&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h4 id=&#34;ssh&#34;&gt;SSH (port 22)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/ssh.png&#34; alt=&#34;SSH&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;telnet&#34;&gt;Telnet (port 23)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/telnet.png&#34; alt=&#34;Telnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;dns&#34;&gt;DNS (port 53)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/dns.png&#34; alt=&#34;DNS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;ntp&#34;&gt;NTP (port 123)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/ntp.png&#34; alt=&#34;NTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;snmp&#34;&gt;SNMP (port 161)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/snmp.png&#34; alt=&#34;SNMP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;smb&#34;&gt;SMB (port 445)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/smb.png&#34; alt=&#34;SMB&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;rdp&#34;&gt;RDP (port 3389)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/rdp.png&#34; alt=&#34;RDP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;br&gt;
&lt;h2 id=&#34;web&#34;&gt;Web&lt;/h2&gt;
&lt;h4 id=&#34;http&#34;&gt;HTTP (port 80)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/http.png&#34; alt=&#34;HTTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;https&#34;&gt;HTTPS (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/https.png&#34; alt=&#34;HTTPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;htls13&#34;&gt;TLS 1.3 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/htls13.png&#34; alt=&#34;HTTPS/TLS 1.3&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;htls12&#34;&gt;TLS 1.2 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/htls12.png&#34; alt=&#34;HTTPS/TLS 1.2&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;htls11&#34;&gt;TLS 1.1 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/htls11.png&#34; alt=&#34;HTTPS/TLS 1.1&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;htls10&#34;&gt;TLS 1.0 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/htls10.png&#34; alt=&#34;HTTPS/TLS 1.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;hssl3&#34;&gt;SSL 3.0 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/hssl3.png&#34; alt=&#34;HTTPS/SSL 3.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;hssl2&#34;&gt;SSL 2.0 (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/hssl2.png&#34; alt=&#34;HTTPS/SSL 2.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;br&gt;
&lt;h2 id=&#34;email&#34;&gt;E-mail&lt;/h2&gt;
&lt;h4 id=&#34;smtp&#34;&gt;SMTP (port 25)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/smtp.png&#34; alt=&#34;SMTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;smtps&#34;&gt;SMTPS (port 465)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/smtps.png&#34; alt=&#34;SMTPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;imap&#34;&gt;IMAP (port 143)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/imap.png&#34; alt=&#34;IMAP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;imaps&#34;&gt;IMAPS (port 993)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/imaps.png&#34; alt=&#34;IMAPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;pop3&#34;&gt;POP3 (port 110)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/pop3.png&#34; alt=&#34;POP3&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;pop3s&#34;&gt;POP3S (port 995)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/pop3s.png&#34; alt=&#34;POP3S&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;br&gt;
&lt;h2 id=&#34;tls&#34;&gt;SSL/TLS&lt;/h2&gt;
&lt;h4 id=&#34;tls13&#34;&gt;TLS 1.3 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/tls13.png&#34; alt=&#34;HTTPS/TLS 1.3&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;tls12&#34;&gt;TLS 1.2 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/tls12.png&#34; alt=&#34;HTTPS/TLS 1.2&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;tls11&#34;&gt;TLS 1.1 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/tls11.png&#34; alt=&#34;HTTPS/TLS 1.1&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;tls10&#34;&gt;TLS 1.0 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/tls10.png&#34; alt=&#34;HTTPS/TLS 1.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;ssl3&#34;&gt;SSL 3.0 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/ssl3.png&#34; alt=&#34;HTTPS/SSL 3.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;ssl2&#34;&gt;SSL 2.0 (all ports)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/ssl2.png&#34; alt=&#34;HTTPS/SSL 2.0&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;br&gt;
&lt;h2 id=&#34;ics&#34;&gt;Industrial Control Systems&lt;/h2&gt;
&lt;h4 id=&#34;ics_all&#34;&gt;All ICS protocols&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/ics.png&#34; alt=&#34;All ICS protocols&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;modbus&#34;&gt;Modbus (port 502)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/modbus.png&#34; alt=&#34;Modbus&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;eibnet&#34;&gt;EIBnet/IP (port 3671)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/eibnet.png&#34; alt=&#34;EIBnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;bacnet&#34;&gt;BACnet/IP (port 47808)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2021/q1/bacnet.png&#34; alt=&#34;BACnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/ports/2021/q1/htls13.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SSL</category>
            
          
            
              <category>TLS</category>
            
          
            
              <category>Telnet</category>
            
          
            
              <category>DNS</category>
            
          
            
              <category>NTP</category>
            
          
            
              <category>SNMP</category>
            
          
            
              <category>SMB</category>
            
          
            
              <category>RDP</category>
            
          
            
              <category>HTTP</category>
            
          
            
              <category>HTTPS</category>
            
          
            
              <category>SMTP</category>
            
          
            
              <category>SMTPS</category>
            
          
            
              <category>IMAP</category>
            
          
            
              <category>IMAPS</category>
            
          
            
              <category>POP3</category>
            
          
            
              <category>POP3S</category>
            
          
            
              <category>ICS</category>
            
          
            
              <category>Modbus</category>
            
          
            
              <category>EIBnet</category>
            
          
            
              <category>BACnet</category>
            
          
            
              <category>Shodan</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>Open port statistics</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Old TLS versions - gone, but not forgotten... well, not really &#39;gone&#39; either</title>
        <link>https://untrustednetwork.net/en/2021/03/30/tls_deprecation/</link>
        <pubDate>Tue, 30 Mar 2021 10:20:00 +0200</pubDate>
        
        <atom:modified>Tue, 30 Mar 2021 10:20:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/03/30/tls_deprecation/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at changes in the number of web servers, which support TLS 1.0 and TLS 1.1&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/diary/27260&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at changes in the number of web servers, which support TLS 1.0 and TLS 1.1&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>TLS</category>
            
          
            
              <category>SSL</category>
            
          
            
              <category>Shodan</category>
            
          
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - 50 years of malware? Not really. 50 years of computer worms? That&#39;s a different story...</title>
        <link>https://untrustednetwork.net/en/2021/03/16/50-years-of-worms/</link>
        <pubDate>Tue, 16 Mar 2021 08:20:00 +0100</pubDate>
        
        <atom:modified>Tue, 16 Mar 2021 08:20:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/03/16/50-years-of-worms/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at Creeper, the first computer worm, which was created 50 years ago - according to some sources, on this very day in 1971&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/diary/27208&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at Creeper, the first computer worm, which was created 50 years ago - according to some sources, on this very day in 1971&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Worm</category>
            
          
            
              <category>Creeper</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>TriOp update - version 1.2</title>
        <link>https://untrustednetwork.net/en/2021/03/14/triop-update-version-1.2/</link>
        <pubDate>Sun, 14 Mar 2021 14:00:00 +0100</pubDate>
        
        <atom:modified>Sun, 14 Mar 2021 14:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/03/14/triop-update-version-1.2/</guid>
        <description>I’ve published version 1.2 of TriOp today. A bug was present in the &amp;ldquo;add&amp;rdquo; mode in version 1.1, which resulted in incorrect behavior when parameterized queries were present in search files, and this update fixes it.
When using the &amp;ldquo;add&amp;rdquo; mode, it is now possible to specify a filter (&amp;ndash;filter), which determines what parameter from the original search file will be added to every new query. If filter is ommited, no parameter will be appended to newly added queries.</description>
        <content:encoded>&lt;p&gt;I’ve published version 1.2 of &lt;a href=&#34;https://untrustednetwork.net/en/triop/&#34;&gt;TriOp&lt;/a&gt; today. A bug was present in the &amp;ldquo;add&amp;rdquo; mode in version 1.1, which resulted in incorrect behavior when parameterized queries were present in search files, and this update fixes it.&lt;br /&gt;
When using the &amp;ldquo;add&amp;rdquo; mode, it is now possible to specify a filter (&amp;ndash;filter), which determines what parameter from the original search file will be added to every new query. If filter is ommited, no parameter will be appended to newly added queries.&lt;/p&gt;
&lt;p&gt;As alway, you may download the latest version of TriOp from &lt;a href=&#34;https://github.com/NettleSec/TriOp&#34;&gt;my GitHub&lt;/a&gt;.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Tool</category>
            
          
            
              <category>TriOp</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
      </item>
      
      <item>
        <title>TriOp update - version 1.1</title>
        <link>https://untrustednetwork.net/en/2021/03/08/triop-update-version-1.1/</link>
        <pubDate>Mon, 08 Mar 2021 11:00:00 +0100</pubDate>
        
        <atom:modified>Mon, 08 Mar 2021 11:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/03/08/triop-update-version-1.1/</guid>
        <description>I’ve published version 1.1 of TriOp today. I’ve added CVEs for the recent Exchange vulnerabilities to the vulnerability search list, since Shodan is now capable of detecting systems affected by them. In response to a request from the CSIRT community, I’ve also added the option for use of arbitrary filter along with a list of parameters.
In version 1.0, it was only possible to generate composite searches based on list of countries, however in version 1.</description>
        <content:encoded>&lt;p&gt;I’ve published version 1.1 of &lt;a href=&#34;https://untrustednetwork.net/en/triop/&#34;&gt;TriOp&lt;/a&gt; today. I’ve added CVEs for the recent &lt;a href=&#34;https://msrc-blog.microsoft.com/2021/03/02/multiple-security-updates-released-for-exchange-server/&#34;&gt;Exchange vulnerabilities&lt;/a&gt; to the vulnerability search list, since Shodan is now &lt;a href=&#34;https://twitter.com/shodanhq/status/1367525621065261062&#34;&gt;capable of detecting systems affected by them&lt;/a&gt;. In response to a request from the CSIRT community, I’ve also added the option for use of arbitrary filter along with a list of parameters.&lt;br /&gt;
In version 1.0, it was only possible to generate composite searches based on list of countries, however in version 1.1, one may specify any filter (i.e. not just “country”) for use with the list of parameters.&lt;br /&gt;
Previously, one could specify a list of searches (-s/-S) and a list of countries (-c/-C) and TriOp would run each search for each specified country and even potentially output results for each country into a specific file (&amp;ndash;country_names).&lt;br /&gt;
In the updated version, one may specify an arbitrary filter (&amp;ndash;filter) and a list of parameters for that filter (-p/-P) along with a list of searches (-s/-S) and the result will be the same. The “one output file per parameter” option is available as well (&amp;ndash;filter_names).&lt;br /&gt;
What I assume will be of most useful when it comes to this feature, will be the filter “net” – the following example shows how a command using it might look:&lt;/p&gt;
&lt;pre&gt;&lt;code class=&#34;language-command&#34; data-lang=&#34;command&#34;&gt;triop.py -s &amp;quot;port:80,port:443&amp;quot; --filter net -p &amp;quot;200.0.0.0/16,200.1.0.0/16&amp;quot;
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;in which case, the output might look similar to:&lt;/p&gt;
&lt;pre&gt;&lt;code class=&#34;language-triop&#34; data-lang=&#34;triop&#34;&gt;Current IP count for query port:80 net:&amp;quot;200.0.0.0/16&amp;quot; is 1643
Current IP count for query port:443 net:&amp;quot;200.0.0.0/16&amp;quot; is 1474
Current IP count for query port:80 net:&amp;quot;200.1.0.0/16&amp;quot; is 819
Current IP count for query port:443 net:&amp;quot;200.1.0.0/16&amp;quot; is 798
&lt;/code&gt;&lt;/pre&gt;&lt;br&gt;
&lt;p&gt;A country search could be done in the following manner:&lt;/p&gt;
&lt;pre&gt;&lt;code class=&#34;language-command&#34; data-lang=&#34;command&#34;&gt;triop.py -s &amp;quot;port:22,port:23&amp;quot; --filter country -p &amp;quot;CZ,DE&amp;quot;
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;and the output would be the same as with the use of the -c option:&lt;/p&gt;
&lt;pre&gt;&lt;code class=&#34;language-triop&#34; data-lang=&#34;triop&#34;&gt;Current IP count for query port:22 country:&amp;quot;CZ&amp;quot; is 83007
Current IP count for query port:23 country:&amp;quot;CZ&amp;quot; is 21143
Current IP count for query port:22 country:&amp;quot;DE&amp;quot; is 1467418
Current IP count for query port:23 country:&amp;quot;DE&amp;quot; is 31595
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;The original “country” options are still present but will be removed in future versions.&lt;/p&gt;
&lt;p&gt;You may download the latest version of TriOp from &lt;a href=&#34;https://github.com/NettleSec/TriOp&#34;&gt;my GitHub&lt;/a&gt;.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Tool</category>
            
          
            
              <category>TriOp</category>
            
          
            
              <category>Shodan</category>
            
          
            
              <category>Vulnerability</category>
            
          
            
              <category>Exchange</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Qakbot in a response to Full Disclosure post</title>
        <link>https://untrustednetwork.net/en/2021/02/23/sans-isc-diary-qakbot-in-a-response-to-full-disclosure-post/</link>
        <pubDate>Tue, 23 Feb 2021 11:30:00 +0100</pubDate>
        
        <atom:modified>Tue, 23 Feb 2021 11:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/02/23/sans-isc-diary-qakbot-in-a-response-to-full-disclosure-post/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at an interesting e-mail message carrying Qakbot downloader, which appeared to be sent in a response to a historical Full Disclosure mailing list post&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/diary/27130&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at an interesting e-mail message carrying Qakbot downloader, which appeared to be sent in a response to a historical Full Disclosure mailing list post&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Qakbot</category>
            
          
            
              <category>Macro</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Agent Tesla hidden in a historical anti-malware tool</title>
        <link>https://untrustednetwork.net/en/2021/02/11/sans-isc-diary-agent-tesla-hidden-in-a-historical-anti-malware-tool/</link>
        <pubDate>Thu, 11 Feb 2021 08:20:00 +0100</pubDate>
        
        <atom:modified>Thu, 11 Feb 2021 08:20:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/02/11/sans-isc-diary-agent-tesla-hidden-in-a-historical-anti-malware-tool/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at an interesting sample of Agent Tesla, which was hidden in the code of a legitimate historical anti-malware tool&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/diary/27088&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at an interesting sample of Agent Tesla, which was hidden in the code of a legitimate historical anti-malware tool&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Agent Tesla</category>
            
          
            
              <category>Malware Analysis</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - TriOp - tool for gathering (not just) security-related data from Shodan.io</title>
        <link>https://untrustednetwork.net/en/2021/01/27/sans-isc-diary-triop-tool-for-gathering-not-just-security-related-data-from-shodan.io/</link>
        <pubDate>Wed, 27 Jan 2021 11:00:00 +0100</pubDate>
        
        <atom:modified>Wed, 27 Jan 2021 11:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/01/27/sans-isc-diary-triop-tool-for-gathering-not-just-security-related-data-from-shodan.io/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at TriOp - my recently published tool, which enables anyone to periodically gather interesting data from Shodan.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/diary/27034&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at &lt;a href=&#34;https://untrustednetwork.net/en/triop/&#34;&gt;TriOp&lt;/a&gt; - my recently published tool, which enables anyone to periodically gather interesting data from &lt;a href=&#34;https://www.shodan.io/&#34;&gt;Shodan&lt;/a&gt;.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Shodan</category>
            
          
            
              <category>TriOp</category>
            
          
            
              <category>Vulnerability</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - From a small BAT file to Mass Logger infostealer</title>
        <link>https://untrustednetwork.net/en/2021/01/04/sans-isc-diary-from-a-small-bat-file-to-mass-logger-infostealer/</link>
        <pubDate>Mon, 04 Jan 2021 15:50:00 +0100</pubDate>
        
        <atom:modified>Mon, 04 Jan 2021 15:50:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/01/04/sans-isc-diary-from-a-small-bat-file-to-mass-logger-infostealer/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at an interesting BAT file from 2020, which turned out to be a downloader for the Mass Logger infostealer.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/diary/26946&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at an interesting BAT file from 2020, which turned out to be a downloader for the Mass Logger infostealer.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Malware Analysis</category>
            
          
            
              <category>Trojan</category>
            
          
            
              <category>Mass Logger</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2021</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Open ports statistics for 2020</title>
        <link>https://untrustednetwork.net/en/2021/01/01/open-ports-statistics-for-2020/</link>
        <pubDate>Fri, 01 Jan 2021 17:00:00 +0200</pubDate>
        
        <atom:modified>Fri, 01 Jan 2021 17:00:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2021/01/01/open-ports-statistics-for-2020/</guid>
        <description>The last quarter of 2020 is behind us, which means it&amp;rsquo;s time for another look at some of the interesting ports accessible on public IPs. This time however, we will take a look at how the internet changed during the whole of 2020, not just at the past 3 months.
I would especially like to bring to your attention the steady decrease in ICS systems connected to the internet during 2020.</description>
        <content:encoded>&lt;p&gt;The last quarter of 2020 is behind us, which means it&amp;rsquo;s time for another look at some of the interesting ports accessible on public IPs. This time however, we will take a look at how the internet changed during the whole of 2020, not just at the past 3 months.&lt;/p&gt;
&lt;p&gt;I would especially like to bring to your attention the steady decrease in ICS systems connected to the internet during 2020. Although Shodan still sees almost 100k of IP addresses running services communicating using industrial protocols, it is over 30k less then it saw at the beginning of the year.&lt;/p&gt;
&lt;p&gt;As always, the data, on which the following charts are based, have been gathered using &lt;a href=&#34;https://www.shodan.io/&#34;&gt;Shodan&lt;/a&gt;. Therefore bear in mind that although the charts should give us a good enough view of more significant changes, they may not be completely accurate (see the &lt;a href=&#34;https://untrustednetwork.net/en/2020/09/30/open-ports-statistics-for-q3-2020/&#34;&gt;first post with quarterly statistics&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Should you be interested in the port situation in the Czech Republic, you may find corresponding charts &lt;a href=&#34;https://untrustednetwork.net/cs/2021/01/01/otev%C5%99en%C3%A9-porty-v-roce-2020/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Bellow, you may find charts for the following protocols and ports:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#ssh&#34;&gt;SSH (port 22)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#telnet&#34;&gt;Telnet (port 23)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#dns&#34;&gt;DNS (port 53)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#ntp&#34;&gt;NTP (port 123)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#snmp&#34;&gt;SNMP (port 161)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#smb&#34;&gt;SMB (port 445)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#rdp&#34;&gt;RDP (port 3389)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;web&#34;&gt;Web&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#web&#34;&gt;HTTP (port 80)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#https&#34;&gt;HTTPS (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;e-mail&#34;&gt;E-mail&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#smtp&#34;&gt;SMTP (port 25)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#smtps&#34;&gt;SMTPS (port 465)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#imap&#34;&gt;IMAP (port 143)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#imaps&#34;&gt;IMAPS (port 993)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#pop3&#34;&gt;POP3 (port 110)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#pop3s&#34;&gt;POP3S (port 995)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;a-hreficsindustrial-control-systems-icsa&#34;&gt;&lt;a href=&#34;#ics&#34;&gt;Industrial Control Systems (ICS)&lt;/a&gt;&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#modbus&#34;&gt;Modbus (port 502)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#eibnet&#34;&gt;EIBnet/IP (port 3671)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#bacnet&#34;&gt;BACnet/IP (port 47808)&lt;br /&gt;
&lt;br&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h4 id=&#34;ssh&#34;&gt;SSH (port 22)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/ssh.png&#34; alt=&#34;SSH&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;telnet&#34;&gt;Telnet (port 23)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/telnet.png&#34; alt=&#34;Telnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;dns&#34;&gt;DNS (port 53)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/dns.png&#34; alt=&#34;DNS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;ntp&#34;&gt;NTP (port 123)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/ntp.png&#34; alt=&#34;NTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;snmp&#34;&gt;SNMP (port 161)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/snmp.png&#34; alt=&#34;SNMP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;smb&#34;&gt;SMB (port 445)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/smb.png&#34; alt=&#34;SMB&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;rdp&#34;&gt;RDP (port 3389)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/rdp.png&#34; alt=&#34;RDP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;http&#34;&gt;HTTP (port 80)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/http.png&#34; alt=&#34;HTTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;https&#34;&gt;HTTPS (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/https.png&#34; alt=&#34;HTTPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;smtp&#34;&gt;SMTP (port 25)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/smtp.png&#34; alt=&#34;SMTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;smtps&#34;&gt;SMTPS (port 465)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/smtps.png&#34; alt=&#34;SMTPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;imap&#34;&gt;IMAP (port 143)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/imap.png&#34; alt=&#34;IMAP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;imaps&#34;&gt;IMAPS (port 993)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/imaps.png&#34; alt=&#34;IMAPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;pop3&#34;&gt;POP3 (port 110)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/pop3.png&#34; alt=&#34;POP3&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;pop3s&#34;&gt;POP3S (port 995)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/pop3s.png&#34; alt=&#34;POP3S&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;ics&#34;&gt;All ICS protocols&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/ics.png&#34; alt=&#34;All ICS protocols&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;modbus&#34;&gt;Modbus (port 502)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/modbus.png&#34; alt=&#34;Modbus&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;eibnet&#34;&gt;EIBnet/IP (port 3671)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/eibnet.png&#34; alt=&#34;EIBnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;bacnet&#34;&gt;BACnet/IP (port 47808)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q4/bacnet.png&#34; alt=&#34;BACnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/ports/2020/q4/ics.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SSL</category>
            
          
            
              <category>Telnet</category>
            
          
            
              <category>DNS</category>
            
          
            
              <category>NTP</category>
            
          
            
              <category>SNMP</category>
            
          
            
              <category>SMB</category>
            
          
            
              <category>RDP</category>
            
          
            
              <category>HTTP</category>
            
          
            
              <category>HTTPS</category>
            
          
            
              <category>SMTP</category>
            
          
            
              <category>SMTPS</category>
            
          
            
              <category>IMAP</category>
            
          
            
              <category>IMAPS</category>
            
          
            
              <category>POP3</category>
            
          
            
              <category>POP3S</category>
            
          
            
              <category>ICS</category>
            
          
            
              <category>Modbus</category>
            
          
            
              <category>EIBnet</category>
            
          
            
              <category>BACnet</category>
            
          
            
              <category>Shodan</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>Open port statistics</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - TLS 1.3 is now supported by about 1 in every 5 HTTPS servers</title>
        <link>https://untrustednetwork.net/en/2020/12/30/sans-isc-diary-tls-1.3-is-now-supported-by-about-1-in-every-5-https-servers/</link>
        <pubDate>Wed, 30 Dec 2020 12:55:00 +0100</pubDate>
        
        <atom:modified>Wed, 30 Dec 2020 12:55:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/12/30/sans-isc-diary-tls-1.3-is-now-supported-by-about-1-in-every-5-https-servers/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at the increse in support of TLS 1.3 by HTTPS servers and the decrease in support of SSL 2.0.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/TLS+13+is+now+supported+by+about+1+in+every+5+HTTPS+servers/26936/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at the increse in support of TLS 1.3 by HTTPS servers and the decrease in support of SSL 2.0.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>TLS</category>
            
          
            
              <category>SSL</category>
            
          
            
              <category>HTTPS</category>
            
          
            
              <category>Shodan</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Want to know what&#39;s in a folder you don&#39;t have a permission to access? Try asking your AV solution...</title>
        <link>https://untrustednetwork.net/en/2020/12/29/av_listing_bypass/</link>
        <pubDate>Tue, 29 Dec 2020 15:20:00 +0100</pubDate>
        
        <atom:modified>Tue, 29 Dec 2020 15:20:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/12/29/av_listing_bypass/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look a small issue present in many anti-malware tools, which may be used to bypass file system level folder listing permissions.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Want+to+know+whats+in+a+folder+you+dont+have+a+permission+to+access+Try+asking+your+AV+solution/26932/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look a small issue present in many anti-malware tools, which may be used to bypass file system level folder listing permissions.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Antivirus</category>
            
          
            
              <category>Information disclosure</category>
            
          
            
              <category>Vulnerability</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - A slightly optimistic tale of how patching went for CVE-2019-19781</title>
        <link>https://untrustednetwork.net/en/2020/12/18/sans-isc-diary-a-slightly-optimistic-tale-of-how-patching-went-for-cve-2019-19781/</link>
        <pubDate>Fri, 18 Dec 2020 10:00:00 +0100</pubDate>
        
        <atom:modified>Fri, 18 Dec 2020 10:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/12/18/sans-isc-diary-a-slightly-optimistic-tale-of-how-patching-went-for-cve-2019-19781/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at how many publicly accessible systems are still vulnerable to CVE-2019-19781, AKA Shitrix.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/A+slightly+optimistic+tale+of+how+patching+went+for+CVE201919781/26900/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at how many publicly accessible systems are still vulnerable to CVE-2019-19781, AKA Shitrix.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Shitrix</category>
            
          
            
              <category>Shodan</category>
            
          
            
              <category>Vulnerability</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Most common vulnerabilities based on Shodan scans</title>
        <link>https://untrustednetwork.net/en/2020/11/18/most-common-vulnerabilities-based-on-shodan/</link>
        <pubDate>Wed, 18 Nov 2020 21:00:00 +0100</pubDate>
        
        <atom:modified>Wed, 18 Nov 2020 21:00:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/11/18/most-common-vulnerabilities-based-on-shodan/</guid>
        <description>My recent post on the Internet Storm Center website about the surprisingly high number of systems still affected by critical vulnerabilities, which have been patched for a long time, received quite a positive feedback. I have consequently decided to take a look at the issue in a more comprehensive manner and since I didn’t know, which vulnerabilities Shodan was able to detect, I’ve used my TriOp tool to gather data for all of the approximately 190k CVEs ever published.</description>
        <content:encoded>&lt;p&gt;My recent &lt;a href=&#34;https://isc.sans.edu/diary/26798&#34;&gt;post on the Internet Storm Center&lt;/a&gt; website about the surprisingly high number of systems still affected by critical vulnerabilities, which have been patched for a long time, received quite a positive feedback. I have consequently decided to take a look at the issue in a more comprehensive manner and since I didn’t know, which vulnerabilities &lt;a href=&#34;https://www.shodan.io/&#34;&gt;Shodan&lt;/a&gt; was able to detect, I’ve used my &lt;a href=&#34;https://untrustednetwork.net/en/2020/09/30/open-ports-statistics-for-q3-2020/&#34;&gt;TriOp tool&lt;/a&gt; to gather data for all of the approximately &lt;a href=&#34;https://cve.mitre.org/data/downloads/index.html&#34;&gt;190k CVEs ever published&lt;/a&gt;. After couple of days the script took to run, I have the results and they are quite interesting…&lt;/p&gt;
&lt;p&gt;Before we get to them though, let’s take a quick look at how many vulnerabilities is Shodan capable of detecting. The magic number seems to currently be 2246. Or, rather, that is the number of CVEs, for which Shodan detected at least one affected IP address. Since for each of 40 different CVEs it detected only 1 vulnerable IP and for 99 more CVEs it detected only between 2 and 10 affected IPs, it is quite possible that Shodan is capable of identifying other vulnerabilities as well, but it didn’t find them on any of the systems it scanned in the past few days or weeks.&lt;/p&gt;
&lt;p&gt;On the other hand, as you may see from the following chart, there are a significant number of CVEs for which Shodan detected over 1 million affected IP addresses – 145, to be specific.&lt;/p&gt;
&lt;p&gt;&lt;a id=&#34;vulnerabilities-histogram&#34; href=&#34;https://untrustednetwork.net/images/2020/13-shodan_vulns/vulns-histogram.png&#34;&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/13-shodan_vulns/vulns-histogram.png&#34; alt=&#34;Number of IP addresses affected by different CVEs&#34; style=&#34;max-width:700px;width:100%&#34;&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;We won’t, for obvious reasons, discuss all of them but I thought that a closer look at the top 15 CVEs detected most often might be worth it, since all of these had more than 4 million detections.&lt;/p&gt;
&lt;p&gt;&lt;a id=&#34;top-15&#34; href=&#34;https://untrustednetwork.net/images/2020/13-shodan_vulns/top15.png&#34;&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/13-shodan_vulns/top15.png&#34; alt=&#34;Most common CVEs detected by Shodan&#34; style=&#34;max-width:700px;width:100%&#34;&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;As the chart above shows, we have couple of sets of vulnerabilities with similar numbers of detections. This is mostly due to them affecting the same version of a specific system, which corresponds with the similar (and sometimes nearly sequential) CVE numbers.&lt;/p&gt;
&lt;p&gt;The most common vulnerability seems to be CVE-2017-15906, which affects OpenSSH and luckily isn’t too critical. That unfortunately can’t be said about some of the other ones, as three vulnerabilities (two in Apache and one in PHP), which have made it into the top 15, have CVSSv3 score 9.8. You may take a find details for all of the most commonly detected vulnerabilities in the following table.&lt;/p&gt;
&lt;table style=&#34;width:600px;margin: 0px auto;&#34; cellspacing=&#34;1&#34; border=&#34;1&#34;&gt;
    &lt;tr&gt;
        &lt;th style=&#34;text-align:center;padding:5px;color:black&#34;&gt;CVE&lt;/th&gt;
        &lt;th style=&#34;text-align:center;padding:5px;color:black&#34;&gt;Number of affected IP addresses&lt;/th&gt;
        &lt;th style=&#34;text-align:center;padding:5px;color:black&#34;&gt;CVSSv3&lt;/th&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2017-15906&#34;&gt;CVE-2017-15906&lt;/a&gt;&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;7,551,378&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;5.3&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2018-1312&#34;&gt;CVE-2018-1312&lt;/a&gt;&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;6,936,210&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;9.8&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2019-0220&#34;&gt;CVE-2019-0220&lt;/a&gt;&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;5,687,693&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;5.3&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2017-7679&#34;&gt;CVE-2017-7679&lt;/a&gt;&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;5,581,571&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;9.8&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2018-17199&#34;&gt;CVE-2018-17199&lt;/a&gt;&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;5,392,949&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;7.5&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2018-15919&#34;&gt;CVE-2018-15919&lt;/a&gt;&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;5,299,655&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;5.3&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2016-8612&#34;&gt;CVE-2016-8612&lt;/a&gt;&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;5,267,545&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;4.3&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2016-4975&#34;&gt;CVE-2016-4975&lt;/a&gt;&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;5,051,548&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;6.1&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2018-1283&#34;&gt;CVE-2018-1283&lt;/a&gt;&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;4,971,245&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;5.3&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2017-15715&#34;&gt;CVE-2017-15715&lt;/a&gt;&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;4,971,235&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;8.1&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2017-15710&#34;&gt;CVE-2017-15710&lt;/a&gt;&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;4,971,199&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;7.5&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2019-9641&#34;&gt;CVE-2019-9641&lt;/a&gt;&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;4,149,029&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;9.8&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2019-9639&#34;&gt;CVE-2019-9639&lt;/a&gt;&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;4,149,025&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;7.5&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2019-9638&#34;&gt;CVE-2019-9638&lt;/a&gt;&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;4,149,024&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;7.5&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2019-9637&#34;&gt;CVE-2019-9637&lt;/a&gt;&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;4,149,015&lt;/td&gt;
        &lt;td style=&#34;text-align:center;padding:5px&#34;&gt;7.5&lt;/td&gt;
    &lt;/tr&gt;    
&lt;/table&gt;
&lt;br&gt;
&lt;p&gt;As we see, the vulnerabilities we discussed in the &lt;a href=&#34;https://isc.sans.edu/diary/26798&#34;&gt;ISC post&lt;/a&gt; may all have high impact, but would seem not to be the most common ones.&lt;/p&gt;
&lt;p&gt;Although it’s not too probable, let’s hope that the number of systems affected by the CVEs mentioned above start falling soon, as otherwise they might quite quickly become dangerous not just for their users but to others as well, since public exploits for some of the vulnerabilities are freely available…&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.net/images/2020/13-shodan_vulns/top15.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>Vulnerability</category>
            
          
            
              <category>Shodan</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Vulnerabilities don’t disappear just because we don’t talk about them anymore</title>
        <link>https://untrustednetwork.net/en/2020/11/16/sans-isc-diary-vulnerabilities-dont-disappear-just-because-we-dont-talk-about-them-anymore/</link>
        <pubDate>Mon, 16 Nov 2020 11:08:20 +0200</pubDate>
        
        <atom:modified>Mon, 16 Nov 2020 11:08:20 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/11/16/sans-isc-diary-vulnerabilities-dont-disappear-just-because-we-dont-talk-about-them-anymore/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at couple of pre-2020 high-impact vulnerabilities, which still affect surprising number of publicly accessible systems.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Heartbleed+BlueKeep+and+other+vulnerabilities+that+didnt+disappear+just+because+we+dont+talk+about+them+anymore/26798/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at couple of pre-2020 high-impact vulnerabilities, which still affect surprising number of publicly accessible systems.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>BlueKeep</category>
            
          
            
              <category>HeartBleed</category>
            
          
            
              <category>Shodan</category>
            
          
            
              <category>Vulnerability</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - SMBGhost - the critical vulnerability many seem to have forgotten to patch</title>
        <link>https://untrustednetwork.net/en/2020/10/28/sans-isc-diary-smbghost-the-critical-vulnerability-many-seem-to-have-forgotten-to-patch/</link>
        <pubDate>Wed, 28 Oct 2020 11:00:00 +0200</pubDate>
        
        <atom:modified>Wed, 28 Oct 2020 11:00:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/10/28/sans-isc-diary-smbghost-the-critical-vulnerability-many-seem-to-have-forgotten-to-patch/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at the concerning number of machines connected to the internet, that are still not patched for the critical SMBGhost vulnerability.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/SMBGhost+the+critical+vulnerability+many+seem+to+have+forgotten+to+patch/26732/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at the concerning number of machines connected to the internet, that are still not patched for the critical SMBGhost vulnerability.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>SMBGhost</category>
            
          
            
              <category>Windows</category>
            
          
            
              <category>Microsoft</category>
            
          
            
              <category>Vulnerability</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - BazarLoader phishing lures: plan a Halloween party, get a bonus and be fired in the same afternoon</title>
        <link>https://untrustednetwork.net/en/2020/10/22/sans-isc-diary-bazarloader-phishing-lures-plan-a-halloween-party-get-a-bonus-and-be-fired-in-the-same-afternoon/</link>
        <pubDate>Thu, 22 Oct 2020 11:00:00 +0200</pubDate>
        
        <atom:modified>Thu, 22 Oct 2020 11:00:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/10/22/sans-isc-diary-bazarloader-phishing-lures-plan-a-halloween-party-get-a-bonus-and-be-fired-in-the-same-afternoon/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at phishing campaigns spreading BazarLoader malware and the lures which they use.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/BazarLoader+phishing+lures+plan+a+Halloween+party+get+a+bonus+and+be+fired+in+the+same+afternoon/26710/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at phishing campaigns spreading BazarLoader malware and the lures which they use.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>BazarLoader</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Phishing kits as far as the eye can see</title>
        <link>https://untrustednetwork.net/en/2020/10/09/sans-isc-diary-phishing-kits-as-far-as-the-eye-can-see/</link>
        <pubDate>Fri, 09 Oct 2020 07:40:00 +0200</pubDate>
        
        <atom:modified>Fri, 09 Oct 2020 07:40:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/10/09/sans-isc-diary-phishing-kits-as-far-as-the-eye-can-see/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at phishing kits, which are offered on the indexed part of the web.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Phishing+kits+as+far+as+the+eye+can+see/26660/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at phishing kits, which are offered on the indexed part of the web.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Phishing kit</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Open ports statistics for Q3 2020</title>
        <link>https://untrustednetwork.net/en/2020/09/30/open-ports-statistics-for-q3-2020/</link>
        <pubDate>Wed, 30 Sep 2020 07:30:00 +0200</pubDate>
        
        <atom:modified>Wed, 30 Sep 2020 07:30:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/09/30/open-ports-statistics-for-q3-2020/</guid>
        <description>If you&amp;rsquo;ve read any of my posts about open ports on public IP addresses either here or on the SANS Internet Storm Center website, you probably know that I&amp;rsquo;m interested in how the internet changes over time and I try to gain at least some understanding of it by analyzing data gathered over time from Shodan.
To this end, I&amp;rsquo;ve been gathering daily statistics of different open ports/running services accessible on public IP addresses around the world and in different countries for about 18 months now.</description>
        <content:encoded>&lt;p&gt;If you&amp;rsquo;ve read any of my posts about open ports on public IP addresses either here or on the &lt;a href=&#34;https://isc.sans.edu/handler_list.html?author=1016653899&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website, you probably know that I&amp;rsquo;m interested in how the internet changes over time and I try to gain at least some understanding of it by analyzing data gathered over time from &lt;a href=&#34;https://www.shodan.io/&#34;&gt;Shodan&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;To this end, I&amp;rsquo;ve been gathering daily statistics of different open ports/running services accessible on public IP addresses around the world and in different countries for about 18 months now. In order to acquire this data, I wrote Python tool (which I&amp;rsquo;ve called &amp;ldquo;TriOp&amp;rdquo; for obvious reasons), that enables me to quickly create reusable batches of queries for Shodan and automatically gather the numbers of IP addresses, which satisfy these queries. I plan to open source the tool in the future, but I will first need to find some time to clean up the code a little, as although it works just fine in its current version, it is a bit too spaghetti-like in some places for my liking&amp;hellip;&lt;/p&gt;
&lt;p&gt;In any case, since I have access to this data and I&amp;rsquo;m probably not the only one who finds the changes in numbers of different open ports interesting, I&amp;rsquo;ve decided to start publishing quarterly (and perhaps yearly) charts of the numbers of IPs, which have some of the more interesting ports open to the internet.&lt;br /&gt;
The list of ports is intentionally small, but if you&amp;rsquo;d like to see a chart for any of the missing ones next quarter, let me know and I&amp;rsquo;ll consider adding it.&lt;/p&gt;
&lt;p&gt;I should mention that due to the way Shodan works, the numbers gathered from it may sometimes increase or decrease sharply and take a while to stabilize (see the first week of September in any of the charts bellow), which does not necessarily represent the real state of affairs. Short discussion of this issue may be found &lt;a href=&#34;https://isc.sans.edu/forums/diary/Did+the+recent+malicious+BlueKeep+campaign+have+any+positive+impact+when+it+comes+to+patching/25506/&#34;&gt;here&lt;/a&gt;. To alleviate this issue to at least some degree, I&amp;rsquo;ve included relative (i.e. percentage of IPs Shodan sees, which have a specific port open) as well as absolute values in all the charts.&lt;/p&gt;
&lt;p&gt;Given the limitations of Shodan and the fact that (except for ICS data) the values in the charts are gathered using only port queries (i.e. &amp;ldquo;port:80&amp;rdquo;) and are not limited by any service specification, they may be slightly imprecise. Still, the results are certainly interesting and provide at least somewhat accurate look at how the internet changes over time.&lt;/p&gt;
&lt;p&gt;Bellow, you may find charts for the following protocols and ports:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#ssh&#34;&gt;SSH (port 22)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#telnet&#34;&gt;Telnet (port 23)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#dns&#34;&gt;DNS (port 53)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#ntp&#34;&gt;NTP (port 123)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#snmp&#34;&gt;SNMP (port 161)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#smb&#34;&gt;SMB (port 445)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#rdp&#34;&gt;RDP (port 3389)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;web&#34;&gt;Web&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#web&#34;&gt;HTTP (port 80)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#https&#34;&gt;HTTPS (port 443)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;e-mail&#34;&gt;E-mail&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#smtp&#34;&gt;SMTP (port 25)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#smtps&#34;&gt;SMTPS (port 465)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#imap&#34;&gt;IMAP (port 143)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#imaps&#34;&gt;IMAPS (port 993)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#pop3&#34;&gt;POP3 (port 110)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#pop3s&#34;&gt;POP3S (port 995)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 id=&#34;industrial-control-systems-ics&#34;&gt;Industrial Control Systems (ICS)&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#modbus&#34;&gt;Modbus (port 502)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#eibnet&#34;&gt;EIBnet/IP (port 3671)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#bacnet&#34;&gt;BACnet/IP (port 47808)&lt;br /&gt;
&lt;br&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h4 id=&#34;ssh&#34;&gt;SSH (port 22)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/ssh.png&#34; alt=&#34;SSH&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;telnet&#34;&gt;Telnet (port 23)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/telnet.png&#34; alt=&#34;Telnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;dns&#34;&gt;DNS (port 53)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/dns.png&#34; alt=&#34;DNS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;ntp&#34;&gt;NTP (port 123)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/ntp.png&#34; alt=&#34;NTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;snmp&#34;&gt;SNMP (port 161)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/snmp.png&#34; alt=&#34;SNMP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;smb&#34;&gt;SMB (port 445)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/smb.png&#34; alt=&#34;SMB&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;rdp&#34;&gt;RDP (port 3389)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/rdp.png&#34; alt=&#34;RDP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;http&#34;&gt;HTTP (port 80)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/http.png&#34; alt=&#34;HTTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;https&#34;&gt;HTTPS (port 443)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/https.png&#34; alt=&#34;HTTPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;smtp&#34;&gt;SMTP (port 25)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/smtp.png&#34; alt=&#34;SMTP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;smtps&#34;&gt;SMTPS (port 465)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/smtps.png&#34; alt=&#34;SMTPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;imap&#34;&gt;IMAP (port 143)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/imap.png&#34; alt=&#34;IMAP&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;imaps&#34;&gt;IMAPS (port 993)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/imaps.png&#34; alt=&#34;IMAPS&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;pop3&#34;&gt;POP3 (port 110)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/pop3.png&#34; alt=&#34;POP3&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;pop3s&#34;&gt;POP3S (port 995)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/pop3s.png&#34; alt=&#34;POP3S&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;modbus&#34;&gt;Modbus (port 502)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/modbus.png&#34; alt=&#34;Modbus&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;eibnet&#34;&gt;EIBnet/IP (port 3671)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/eibnet.png&#34; alt=&#34;EIBnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
&lt;h4 id=&#34;bacnet&#34;&gt;BACnet/IP (port 47808)&lt;/h4&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/ports/2020/q3/bacnet.png&#34; alt=&#34;BACnet&#34; style=&#34;max-width:800px;width:100%&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/icons/stats.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SSL</category>
            
          
            
              <category>Telnet</category>
            
          
            
              <category>DNS</category>
            
          
            
              <category>NTP</category>
            
          
            
              <category>SNMP</category>
            
          
            
              <category>SMB</category>
            
          
            
              <category>RDP</category>
            
          
            
              <category>HTTP</category>
            
          
            
              <category>HTTPS</category>
            
          
            
              <category>SMTP</category>
            
          
            
              <category>SMTPS</category>
            
          
            
              <category>IMAP</category>
            
          
            
              <category>IMAPS</category>
            
          
            
              <category>POP3</category>
            
          
            
              <category>POP3S</category>
            
          
            
              <category>ICS</category>
            
          
            
              <category>Modbus</category>
            
          
            
              <category>EIBnet</category>
            
          
            
              <category>BACnet</category>
            
          
            
              <category>Shodan</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>Open port statistics</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Slightly broken overlay phishing</title>
        <link>https://untrustednetwork.net/en/2020/09/21/sans-isc-diary-slightly-broken-overlay-phishing/</link>
        <pubDate>Mon, 21 Sep 2020 12:50:00 +0200</pubDate>
        
        <atom:modified>Mon, 21 Sep 2020 12:50:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/09/21/sans-isc-diary-slightly-broken-overlay-phishing/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at an interesting (and slightly broken) phishing campaign, which overlays legitimate pages with fake login prompts.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Slightly+broken+overlay+phishing/26586/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at an interesting (and slightly broken) phishing campaign, which overlays legitimate pages with fake login prompts.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - A blast from the past - XXEncoded VB6.0 Trojan</title>
        <link>https://untrustednetwork.net/en/2020/09/04/sans-isc-diary-a-blast-from-the-past-xxencoded-vb6.0-trojan/</link>
        <pubDate>Fri, 04 Sep 2020 09:35:00 +0200</pubDate>
        
        <atom:modified>Fri, 04 Sep 2020 09:35:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/09/04/sans-isc-diary-a-blast-from-the-past-xxencoded-vb6.0-trojan/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at a campaign in which the malicious actors decided to go reall &amp;ldquo;old school&amp;rdquo; when it comes to file formats they would use.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/A+blast+from+the+past+XXEncoded+VB60+Trojan/26538/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at a campaign in which the malicious actors decided to go reall &amp;ldquo;old school&amp;rdquo; when it comes to file formats they would use.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Malware</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Security.txt - one small file for an admin, one giant help to a security researcher</title>
        <link>https://untrustednetwork.net/en/2020/08/27/sans-isc-diary-security.txt-one-small-file-for-an-admin-one-giant-help-to-a-security-researcher/</link>
        <pubDate>Thu, 27 Aug 2020 09:20:00 +0200</pubDate>
        
        <atom:modified>Thu, 27 Aug 2020 09:20:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/08/27/sans-isc-diary-security.txt-one-small-file-for-an-admin-one-giant-help-to-a-security-researcher/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at the draft standard for &amp;ldquo;A File Format to Aid in Security Vulnerability Disclosure&amp;rdquo;, better known as security.txt.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Securitytxt+one+small+file+for+an+admin+one+giant+help+to+a+security+researcher/26510/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at the draft standard for &amp;ldquo;A File Format to Aid in Security Vulnerability Disclosure&amp;rdquo;, better known as security.txt.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Definition of &#39;overkill&#39; - using 130 MB executable to hide 24 kB malware</title>
        <link>https://untrustednetwork.net/en/2020/08/14/sans-isc-diary-definition-of-overkill-using-130-mb-executable-to-hide-24-kb-malware/</link>
        <pubDate>Fri, 14 Aug 2020 14:20:00 +0200</pubDate>
        
        <atom:modified>Fri, 14 Aug 2020 14:20:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/08/14/sans-isc-diary-definition-of-overkill-using-130-mb-executable-to-hide-24-kb-malware/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at a 130 MB EXE carrying within it a 24 kB malicious payload.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Definition+of+overkill+using+130+MB+executable+to+hide+24+kB+malware/26464/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at a 130 MB EXE carrying within it a 24 kB malicious payload.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Trojan</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - What pages do bad bots look for?</title>
        <link>https://untrustednetwork.net/en/2020/08/01/sans-isc-diary-what-pages-do-bad-bots-look-for/</link>
        <pubDate>Sat, 01 Aug 2020 16:15:00 +0200</pubDate>
        
        <atom:modified>Sat, 01 Aug 2020 16:15:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/08/01/sans-isc-diary-what-pages-do-bad-bots-look-for/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at which interesting pages &amp;ldquo;bad&amp;rdquo; bots look for the most on web servers.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/What+pages+do+bad+bots+look+for/26414/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at which interesting pages &amp;ldquo;bad&amp;rdquo; bots look for the most on web servers.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Bots</category>
            
          
            
              <category>HTTP</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Couple of interesting Covid-19 related stats</title>
        <link>https://untrustednetwork.net/en/2020/07/21/sans-isc-diary-couple-of-interesting-covid-19-related-stats/</link>
        <pubDate>Tue, 21 Jul 2020 10:55:00 +0200</pubDate>
        
        <atom:modified>Tue, 21 Jul 2020 10:55:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/07/21/sans-isc-diary-couple-of-interesting-covid-19-related-stats/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at how regional travel restrictions impact (or don&amp;rsquo;t) the number of IP addresses which expose remote access protocols to the internet.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Couple+of+interesting+Covid19+related+stats/26374/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at how regional travel restrictions impact (or don&amp;rsquo;t) the number of IP addresses which expose remote access protocols to the internet.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Covid-19</category>
            
          
            
              <category>Shodan</category>
            
          
            
              <category>SSH</category>
            
          
            
              <category>Telnet</category>
            
          
            
              <category>RDP</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Using Shell Links as zero-touch downloaders and to initiate network connections</title>
        <link>https://untrustednetwork.net/en/2020/06/24/sans-isc-diary-using-shell-links-as-zero-touch-downloaders-and-to-initiate-network-connections/</link>
        <pubDate>Wed, 24 Jun 2020 09:45:00 +0200</pubDate>
        
        <atom:modified>Wed, 24 Jun 2020 09:45:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/06/24/sans-isc-diary-using-shell-links-as-zero-touch-downloaders-and-to-initiate-network-connections/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at a weakness handling of LNK files in Windows, through which one may force the OS to download an arbitrary file from a remote server any time the shortcut file is displayed.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Using+Shell+Links+as+zerotouch+downloaders+and+to+initiate+network+connections/26276/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at a weakness handling of LNK files in Windows, through which one may force the OS to download an arbitrary file from a remote server any time the shortcut file is displayed.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>LNK</category>
            
          
            
              <category>Microsoft</category>
            
          
            
              <category>Windows</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Broken phishing accidentally exploiting Outlook zero-day</title>
        <link>https://untrustednetwork.net/en/2020/06/18/sans-isc-diary-broken-phishing-accidentally-exploiting-outlook-zero-day/</link>
        <pubDate>Thu, 18 Jun 2020 11:35:00 +0200</pubDate>
        
        <atom:modified>Thu, 18 Jun 2020 11:35:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/06/18/sans-isc-diary-broken-phishing-accidentally-exploiting-outlook-zero-day/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at a phishing, which accidentally exploited a 0-day vulnerability in Outlook, which allows for creation or modification of links when an e-mail is forwarded by Outlook.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Broken+phishing+accidentally+exploiting+Outlook+zeroday/26254/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at a phishing, which accidentally exploited a 0-day vulnerability in Outlook, which allows for creation or modification of links when an e-mail is forwarded by Outlook.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>0-day</category>
            
          
            
              <category>Outlook</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Update of overview of free online malware analysis sandboxes</title>
        <link>https://untrustednetwork.net/en/2020/05/30/online_sandboxes_v1.2/</link>
        <pubDate>Sat, 30 May 2020 13:30:00 +0200</pubDate>
        
        <atom:modified>Sat, 30 May 2020 13:30:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/05/30/online_sandboxes_v1.2/</guid>
        <description>Since there have been some small changes in the free online malware analysis sandbox landscape over the last couple of months, I&amp;rsquo;ve updated the comparison table to reflect them. You may find the new 1.2 version here.</description>
        <content:encoded>&lt;p&gt;Since there have been some small changes in the free online malware analysis sandbox landscape over the last couple of months, I&amp;rsquo;ve updated the &lt;a href=&#34;https://untrustednetwork.net/en/2020/03/12/overview-of-free-online-malware-analysis-sandboxes-2020-edition/&#34;&gt;comparison table&lt;/a&gt; to reflect them. You may find the new 1.2 version &lt;a href=&#34;https://www.untrustednetwork.net/en/sandboxes/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Malware</category>
            
          
            
              <category>Sandbox</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Frankenstein&#39;s phishing using Google Cloud Storage</title>
        <link>https://untrustednetwork.net/en/2020/05/27/sans-isc-diary-frankensteins-phishing-using-google-cloud-storage/</link>
        <pubDate>Wed, 27 May 2020 10:40:00 +0200</pubDate>
        
        <atom:modified>Wed, 27 May 2020 10:40:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/05/27/sans-isc-diary-frankensteins-phishing-using-google-cloud-storage/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at a strange phishing campaign, which was, due to combination of quite sophisticated and extremely amateurish components, reminiscent of the creation of Shelley&amp;rsquo;s Dr. Frankenstein.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Frankensteins+phishing+using+Google+Cloud+Storage/26174/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at a strange phishing campaign, which was, due to combination of quite sophisticated and extremely amateurish components, reminiscent of the creation of Shelley&amp;rsquo;s Dr. Frankenstein.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>SPF</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Agent Tesla delivered by the same phishing campaign for over a year</title>
        <link>https://untrustednetwork.net/en/2020/04/28/sans-isc-diary-agent-tesla-delivered-by-the-same-phishing-campaign-for-over-a-year/</link>
        <pubDate>Tue, 28 Apr 2020 08:45:00 +0200</pubDate>
        
        <atom:modified>Tue, 28 Apr 2020 08:45:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/04/28/sans-isc-diary-agent-tesla-delivered-by-the-same-phishing-campaign-for-over-a-year/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at a phishing campaign that has been running almost unchanged for more than a year and seems to be distributing exclusively Agent Tesla.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Agent+Tesla+delivered+by+the+same+phishing+campaign+for+over+a+year/26062/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at a phishing campaign that has been running almost unchanged for more than a year and seems to be distributing exclusively Agent Tesla.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Agent Tesla</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Look at the same phishing campaign 3 months apart</title>
        <link>https://untrustednetwork.net/en/2020/04/13/sans-isc-diary-look-at-the-same-phishing-campaign-3-months-apart/</link>
        <pubDate>Mon, 13 Apr 2020 11:35:00 +0200</pubDate>
        
        <atom:modified>Mon, 13 Apr 2020 11:35:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/04/13/sans-isc-diary-look-at-the-same-phishing-campaign-3-months-apart/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at two phishing e-mails from the same campaign sent out 3 months apart.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Look+at+the+same+phishing+campaign+3+months+apart/26018/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at two phishing e-mails from the same campaign sent out 3 months apart.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Open ports in the Time of Corona</title>
        <link>https://untrustednetwork.net/en/2020/04/02/open-ports-in-the-time-of-corona/</link>
        <pubDate>Thu, 02 Apr 2020 08:59:20 +0200</pubDate>
        
        <atom:modified>Thu, 02 Apr 2020 08:59:20 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/04/02/open-ports-in-the-time-of-corona/</guid>
        <description>One of the side effects of social distancing and self-quarantining due to COVID-19 was a large increase in the use of VPNs (and, in some cases, different remote access protocols, such as RDP or SSH) by companies around the world, so that their employees might work from home.
I was wondering how large this increase would be when compared to the usual state of affairs. To determine this, I took a look at data I gathered from Shodan over the course of March and made couple of - hopefully interesting - charts.</description>
        <content:encoded>&lt;p&gt;One of the side effects of social distancing and self-quarantining due to COVID-19 was a large increase in the use of VPNs (and, in some cases, different remote access protocols, such as RDP or SSH) by companies around the world, so that their employees might work from home.&lt;br /&gt;
I was wondering how large this increase would be when compared to the usual state of affairs. To determine this, I took a look at data I gathered from Shodan over the course of March and made couple of - hopefully interesting - charts.&lt;/p&gt;
&lt;p&gt;Before we get to them, however, I should mention that simply looking at absolute numbers gathered from Shodan wouldn&amp;rsquo;t give us much due to the way Shodan operates (for more details, take a look at &lt;a href=&#34;https://isc.sans.edu/diary/25506&#34;&gt;my diary about patching BlueKeep&lt;/a&gt;). Therefore, while Shodan saw a significant absolute increase in open ports/detected IPs in March (almost 12% rise in detected IP addresses globally), we will take a look at both absolute and the relative values - counts as well as percentages of all IPs globally/in a specific country, which have a certain port open.&lt;/p&gt;
&lt;p&gt;If you&amp;rsquo;re interested in how the situation looked before, I&amp;rsquo;ll add that Shodan itself recently released an article with analysis of some of the trends they saw from the start of July 2019 to the end of January 2020. You may find it &lt;a href=&#34;https://blog.shodan.io/trends-in-internet-exposure/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;One last thing I will mention before we get to &amp;ldquo;the good stuff&amp;rdquo; is that I didn&amp;rsquo;t include all the countries, for which I have data, in the charts, since that would make the post too large. If data for your country isn&amp;rsquo;t included in the charts and you would like to see how the situation changed where you live, &lt;a href=&#34;https://www.untrustednetwork.net/en/about/&#34;&gt;get in touch with me&lt;/a&gt; and if I have the data, I&amp;rsquo;ll try to add a chart for your country as well.&lt;/p&gt;
&lt;p&gt;Now, let&amp;rsquo;s take a look at the charts themselves. I picked the ports which have seen a high significant absolute increase globally - namely ports 22 (SSH), 80 (HTTP), 443 (HTTPS and many TLS-based services and VPN solutions) and 3389 (RDP). Unfortunatelly, I don&amp;rsquo;t have data for the usual VPN ports and related services (IKE, PPTP, etc.), but I assume that the jump in those was similarly significant as the one in TLS.&lt;/p&gt;
&lt;p&gt;Here is the list of countries for which charts are available:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;#global&#34;&gt;Global data&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#australia&#34;&gt;Australia&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#canada&#34;&gt;Canada&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#cz&#34;&gt;Czech Republic&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#gb&#34;&gt;Great Britain&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#germany&#34;&gt;Germany&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#china&#34;&gt;China&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#italy&#34;&gt;Italy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#netherlands&#34;&gt;Netherlands&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#romania&#34;&gt;Romania&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#russia&#34;&gt;Russia&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#slovakia&#34;&gt;Slovakia&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#spain&#34;&gt;Spain&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;#usa&#34;&gt;USA&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;global&#34;&gt;Global situation&lt;/h2&gt;
&lt;p&gt;In addition to the ports mentioned above, on a global level we will take a look at SMB as well. There has been a signifficant increase in SMB open to the internet and, unfortunatelly, that was true even for SMBv1 on Windows.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/global-ssh.png&#34; alt=&#34;Global situation - SSH&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/global-http.png&#34; alt=&#34;Global situation - HTTP&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/global-https.png&#34; alt=&#34;Global situation - HTTPS&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/global-smb.png&#34; alt=&#34;Global situation - SMB&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/global-rdp.png&#34; alt=&#34;Global situation - RDP&#34; /&gt;&lt;/p&gt;
&lt;p&gt;As we may see, although there was a significant absolute increase in IPs which offer the protocols and services we were interested in, the percentage of IPs offering these protocols actually went down in cases of SSH and RDP. As the following charts demonstrate, this trend held for some countries as well, but not all of them.&lt;/p&gt;
&lt;h2 id=&#34;australia&#34;&gt;Australia&lt;/h2&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/australia-ssh.png&#34; alt=&#34;Australia - SSH&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/australia-http.png&#34; alt=&#34;Australia - HTTP&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/australia-https.png&#34; alt=&#34;Australia - HTTPS&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/australia-rdp.png&#34; alt=&#34;Australia - RDP&#34; /&gt;&lt;/p&gt;
&lt;h2 id=&#34;canada&#34;&gt;Canada&lt;/h2&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/canada-ssh.png&#34; alt=&#34;Canada - SSH&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/canada-http.png&#34; alt=&#34;Canada - HTTP&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/canada-https.png&#34; alt=&#34;Canada - HTTPS&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/canada-rdp.png&#34; alt=&#34;Canada - RDP&#34; /&gt;&lt;/p&gt;
&lt;h2 id=&#34;cz&#34;&gt;Czech Republic&lt;/h2&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/cz-ssh.png&#34; alt=&#34;Czech Republic - SSH&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/cz-http.png&#34; alt=&#34;Czech Republic - HTTP&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/cz-https.png&#34; alt=&#34;Czech Republic - HTTPS&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/cz-rdp.png&#34; alt=&#34;Czech Republic - RDP&#34; /&gt;&lt;/p&gt;
&lt;h2 id=&#34;gb&#34;&gt;Great Britain&lt;/h2&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/gb-ssh.png&#34; alt=&#34;Great Britain - SSH&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/gb-http.png&#34; alt=&#34;Great Britain - HTTP&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/gb-https.png&#34; alt=&#34;Great Britain - HTTPS&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/gb-rdp.png&#34; alt=&#34;Great Britain - RDP&#34; /&gt;&lt;/p&gt;
&lt;h2 id=&#34;germany&#34;&gt;Germany&lt;/h2&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/germany-ssh.png&#34; alt=&#34;Germany - SSH&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/germany-http.png&#34; alt=&#34;Germany - HTTP&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/germany-https.png&#34; alt=&#34;Germany - HTTPS&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/germany-rdp.png&#34; alt=&#34;Germany - RDP&#34; /&gt;&lt;/p&gt;
&lt;h2 id=&#34;china&#34;&gt;China&lt;/h2&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/china-ssh.png&#34; alt=&#34;China - SSH&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/china-http.png&#34; alt=&#34;China - HTTP&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/china-https.png&#34; alt=&#34;China - HTTPS&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/china-rdp.png&#34; alt=&#34;China - RDP&#34; /&gt;&lt;/p&gt;
&lt;h2 id=&#34;italy&#34;&gt;Italy&lt;/h2&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/italy-ssh.png&#34; alt=&#34;Italy - SSH&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/italy-http.png&#34; alt=&#34;Italy - HTTP&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/italy-https.png&#34; alt=&#34;Italy - HTTPS&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/italy-rdp.png&#34; alt=&#34;Italy - RDP&#34; /&gt;&lt;/p&gt;
&lt;h2 id=&#34;netherlands&#34;&gt;Netherlands&lt;/h2&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/netherlands-ssh.png&#34; alt=&#34;Netherlands - SSH&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/netherlands-http.png&#34; alt=&#34;Netherlands - HTTP&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/netherlands-https.png&#34; alt=&#34;Netherlands - HTTPS&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/netherlands-rdp.png&#34; alt=&#34;Netherlands - RDP&#34; /&gt;&lt;/p&gt;
&lt;h2 id=&#34;romania&#34;&gt;Romania&lt;/h2&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/romania-ssh.png&#34; alt=&#34;Romania - SSH&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/romania-http.png&#34; alt=&#34;Romania - HTTP&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/romania-https.png&#34; alt=&#34;Romania - HTTPS&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/romania-rdp.png&#34; alt=&#34;Romania - RDP&#34; /&gt;&lt;/p&gt;
&lt;h2 id=&#34;russia&#34;&gt;Russia&lt;/h2&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/russia-ssh.png&#34; alt=&#34;Russia - SSH&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/russia-http.png&#34; alt=&#34;Russia - HTTP&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/russia-https.png&#34; alt=&#34;Russia - HTTPS&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/russia-rdp.png&#34; alt=&#34;Russia - RDP&#34; /&gt;&lt;/p&gt;
&lt;h2 id=&#34;slovakia&#34;&gt;Slovakia&lt;/h2&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/slovakia-ssh.png&#34; alt=&#34;Slovakia - SSH&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/slovakia-http.png&#34; alt=&#34;Slovakia - HTTP&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/slovakia-https.png&#34; alt=&#34;Slovakia - HTTPS&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/slovakia-rdp.png&#34; alt=&#34;Slovakia - RDP&#34; /&gt;&lt;/p&gt;
&lt;h2 id=&#34;spain&#34;&gt;Spain&lt;/h2&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/spain-ssh.png&#34; alt=&#34;Spain - SSH&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/spain-http.png&#34; alt=&#34;Spain - HTTP&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/spain-https.png&#34; alt=&#34;Spain - HTTPS&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/spain-rdp.png&#34; alt=&#34;Spain - RDP&#34; /&gt;&lt;/p&gt;
&lt;h2 id=&#34;usa&#34;&gt;USA&lt;/h2&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/usa-ssh.png&#34; alt=&#34;USA - SSH&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/usa-http.png&#34; alt=&#34;USA - HTTP&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/usa-https.png&#34; alt=&#34;USA - HTTPS&#34; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/06-corona_ports/usa-rdp.png&#34; alt=&#34;USA - RDP&#34; /&gt;&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/icons/stats.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SSL</category>
            
          
            
              <category>TLS</category>
            
          
            
              <category>SSH</category>
            
          
            
              <category>RDP</category>
            
          
            
              <category>HTTP</category>
            
          
            
              <category>HTTPS</category>
            
          
            
              <category>COVID-19</category>
            
          
            
              <category>Shodan</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Crashing explorer.exe with(out) a click</title>
        <link>https://untrustednetwork.net/en/2020/03/30/sans-isc-diary-crashing-explorer.exe-without-a-click/</link>
        <pubDate>Mon, 30 Mar 2020 07:55:00 +0100</pubDate>
        
        <atom:modified>Mon, 30 Mar 2020 07:55:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/03/30/sans-isc-diary-crashing-explorer.exe-without-a-click/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at a vulnerability in the way Windows handles self-referential links, which makes it possible to use specially crafted URL and LNK files to crash Explorer.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Crashing+explorerexe+without+a+click/25966/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at a vulnerability in the way Windows handles self-referential links, which makes it possible to use specially crafted URL and LNK files to crash Explorer.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Windows</category>
            
          
            
              <category>Vulnerability</category>
            
          
            
              <category>Microsoft</category>
            
          
            
              <category>Post-exploitation</category>
            
          
            
              <category>Red teaming</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Desktop.ini as a post-exploitation tool</title>
        <link>https://untrustednetwork.net/en/2020/03/16/sans-isc-diary-desktop.ini-as-a-post-exploitation-tool/</link>
        <pubDate>Mon, 16 Mar 2020 07:55:00 +0100</pubDate>
        
        <atom:modified>Mon, 16 Mar 2020 07:55:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/03/16/sans-isc-diary-desktop.ini-as-a-post-exploitation-tool/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at a vulnerability in the way Windows handles desktop.ini files, which makes it possible to use them as an interesting post-exploitation tool.
UPDATE 27. 5. 2020: I put together a shor video demonstrating the vulnerabiltiy while preparing materials for SANSFIRE 2020. You may find it here.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Desktopini+as+a+postexploitation+tool/25912/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at a vulnerability in the way Windows handles desktop.ini files, which makes it possible to use them as an interesting post-exploitation tool.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;UPDATE 27. 5. 2020: I put together a shor video demonstrating the vulnerabiltiy while preparing materials for &lt;a href=&#34;https://www.sans.org/event/sansfire-2020/&#34;&gt;SANSFIRE 2020&lt;/a&gt;. You may find it &lt;a href=&#34;https://www.youtube.com/watch?v=pVqJiaUnstA&#34;&gt;here&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Windows</category>
            
          
            
              <category>Vulnerability</category>
            
          
            
              <category>Microsoft</category>
            
          
            
              <category>Post-exploitation</category>
            
          
            
              <category>Red teaming</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Overview of free online malware analysis sandboxes – 2020 edition</title>
        <link>https://untrustednetwork.net/en/2020/03/12/overview-of-free-online-malware-analysis-sandboxes-2020-edition/</link>
        <pubDate>Thu, 12 Mar 2020 08:33:11 +0100</pubDate>
        
        <atom:modified>Thu, 12 Mar 2020 08:33:11 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/03/12/overview-of-free-online-malware-analysis-sandboxes-2020-edition/</guid>
        <description>UPDATE 13/3/2020: Interactive (and hopefully current) version of the table may be found here.
Whether your work has anything to do with security monitoring, malware analysis, incident response, or just general IT administration, you’ve probably come across VirusTotal. It is an invaluable tool when it comes to identifying malicious code, however sometimes we need to dig a bit deeper than just getting a &amp;ldquo;detection score&amp;rdquo; for a potentially dangerous file. In such instances, we may turn to free online sandboxes (or paid or local ones, if we have access to them, but let’s assume we don’t), which can provide us with more detailed information about the behavior of our file by executing or opening it in a virtual environment and monitoring its activities.</description>
        <content:encoded>&lt;p&gt;&lt;em&gt;UPDATE 13/3/2020: Interactive (and hopefully current) version of the table may be found &lt;a href=&#34;https://untrustednetwork.net/en/sandboxes/&#34;&gt;here&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Whether your work has anything to do with security monitoring, malware analysis, incident response, or just general IT administration, you’ve probably come across &lt;a href=&#34;https://www.virustotal.com/&#34;&gt;VirusTotal&lt;/a&gt;. It is an invaluable tool when it comes to identifying malicious code, however sometimes we need to dig a bit deeper than just getting a &amp;ldquo;detection score&amp;rdquo; for a potentially dangerous file. In such instances, we may turn to free online sandboxes (or paid or local ones, if we have access to them, but let’s assume we don’t), which can provide us with more detailed information about the behavior of our file by executing or opening it in a virtual environment and monitoring its activities.&lt;/p&gt;
&lt;p&gt;There have been many such tools over the years. But since some of the old ones are not working anymore (&lt;a href=&#34;https://malwr.com/&#34;&gt;malwr.com&lt;/a&gt; to name one), while others appeared only relatively recently, I thought it might be interesting to take a look at what free sandboxes and analytical platforms are available to us at the beginning of 2020 and what their features are.&lt;/p&gt;
&lt;p&gt;After going through all the free online sandboxes I could find, I picked out nine, which I believe are most useful, and summarized their features in the following table. I should mention that I intentionally didn’t put in it &amp;ldquo;specialized&amp;rdquo; sandboxes, such as &lt;a href=&#34;https://amaaas.com/&#34;&gt;AMAaaS&lt;/a&gt;, as I was mainly going for general-use platforms. Although the table is therefore far from being exhaustive, I think it may provide a useful quick reference to what you can get and where you can get it if you need to analyze (potentially) malicious files under specific conditions.&lt;/p&gt;
&lt;p&gt;It should be noted that at the time of writing, none of the free sandboxes mentioned bellow support private submissions. This means that any uploaded files may be accessible to other users and/or organizations and it would therefore be unwise to upload anything sensitive to any of the platforms.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://untrustednetwork.net/images/2020/04-sandboxes/free-malware-analysis-sandboxes-overview-3-2020.png&#34;&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/04-sandboxes/free-malware-analysis-sandboxes-overview-3-2020.png&#34; alt=&#34;Overview of free online malware analysis sandboxes – 3/2020&#34; style=&#34;width:700px; border:1px solid grey&#34;&gt;&lt;/a&gt;&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Malware</category>
            
          
            
              <category>Sandbox</category>
            
          
            
              <category>VirusTotal</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Secure vs. cleartext protocols – couple of interesting stats</title>
        <link>https://untrustednetwork.net/en/2020/03/02/sans-isc-diary-secure-vs.-cleartext-protocols-couple-of-interesting-stats/</link>
        <pubDate>Mon, 02 Mar 2020 06:55:00 +0100</pubDate>
        
        <atom:modified>Mon, 02 Mar 2020 06:55:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/03/02/sans-isc-diary-secure-vs.-cleartext-protocols-couple-of-interesting-stats/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we delve into the support of HTTP and HTTPS among web servers on the internet, as well as support for Telnet and SSH, over the last six months.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Secure+vs+cleartext+protocols+couple+of+interesting+stats/25854/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we delve into the support of HTTP and HTTPS among web servers on the internet, as well as support for Telnet and SSH, over the last six months.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>TLS</category>
            
          
            
              <category>HTTP</category>
            
          
            
              <category>HTTPS</category>
            
          
            
              <category>Telnet</category>
            
          
            
              <category>SSH</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Quick look at a couple of current online scam campaigns</title>
        <link>https://untrustednetwork.net/en/2020/02/25/sans-isc-diary-quick-look-at-a-couple-of-current-online-scam-campaigns/</link>
        <pubDate>Tue, 25 Feb 2020 06:57:00 +0100</pubDate>
        
        <atom:modified>Tue, 25 Feb 2020 06:57:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/02/25/sans-isc-diary-quick-look-at-a-couple-of-current-online-scam-campaigns/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at couple of online scam campaigns I came accross in the last weeks. A closer look at one of the landing pages used in the campaign, which was almost certainly authored by the FizzCore group, may be found here (in Czech).</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Quick+look+at+a+couple+of+current+online+scam+campaigns/25838/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at couple of online scam campaigns I came accross in the last weeks. A closer look at one of the landing pages used in the campaign, which was almost certainly authored by the FizzCore group, may be found &lt;a href=&#34;https://www.untrustednetwork.net/cs/2020/02/22/ct24_podvodna_stranka/&#34;&gt;here&lt;/a&gt; (in Czech).&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Scam</category>
            
          
            
              <category>FizzCore</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Discovering contents of folders in Windows without permissions</title>
        <link>https://untrustednetwork.net/en/2020/02/18/sans-isc-diary-discovering-contents-of-folders-in-windows-without-permissions/</link>
        <pubDate>Tue, 18 Feb 2020 07:18:21 +0100</pubDate>
        
        <atom:modified>Tue, 18 Feb 2020 07:18:21 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/02/18/sans-isc-diary-discovering-contents-of-folders-in-windows-without-permissions/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. This one deals with a strange side effect of the way in which Windows deals with file permissions, which enables any user, regardless of permissions, to brute-force contents of any local folder.
UPDATE 20. 5. 2020: I put together a shor video demonstrating the weakness/vulnerability while preparing materials for SANSFIRE 2020. You may find it here.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Discovering+contents+of+folders+in+Windows+without+permissions/25816/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. This one deals with a strange side effect of the way in which Windows deals with file permissions, which enables any user, regardless of permissions, to brute-force contents of any local folder.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;UPDATE 20. 5. 2020: I put together a shor video demonstrating the weakness/vulnerability while preparing materials for &lt;a href=&#34;https://www.sans.org/event/sansfire-2020/&#34;&gt;SANSFIRE 2020&lt;/a&gt;. You may find it &lt;a href=&#34;https://www.youtube.com/watch?v=5yT-QFdKOqg&#34;&gt;here&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Microsoft</category>
            
          
            
              <category>Windows</category>
            
          
            
              <category>Vulnerability</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Current PayPal phishing campaign or &#39;give me all your personal information&#39;</title>
        <link>https://untrustednetwork.net/en/2020/02/10/sans-isc-diary-current-paypal-phishing-campaign-or-give-me-all-your-personal-information/</link>
        <pubDate>Mon, 10 Feb 2020 09:37:58 +0100</pubDate>
        
        <atom:modified>Mon, 10 Feb 2020 09:37:58 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/02/10/sans-isc-diary-current-paypal-phishing-campaign-or-give-me-all-your-personal-information/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one we take a look at a current phishing campaign which shows quite well the current &amp;ldquo;let&amp;rsquo;s get all the users&#39; data&amp;rdquo; mentality of the attackers.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Current+PayPal+phishing+campaign+or+give+me+all+your+personal+information/25786/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one we take a look at a current phishing campaign which shows quite well the current &amp;ldquo;let&amp;rsquo;s get all the users&#39; data&amp;rdquo; mentality of the attackers.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>PayPal</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Analysis of a triple-encrypted AZORult downloader</title>
        <link>https://untrustednetwork.net/en/2020/02/03/sans-isc-diary-analysis-of-a-triple-encrypted-azorult-downloader/</link>
        <pubDate>Mon, 03 Feb 2020 07:45:10 +0100</pubDate>
        
        <atom:modified>Mon, 03 Feb 2020 07:45:10 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/02/03/sans-isc-diary-analysis-of-a-triple-encrypted-azorult-downloader/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one we take a look at analysis of an interesting malicious document which turned out to be AZORult downloader. What made it stand out - among its other aspects - were 3 layers of home-grown encryption&amp;hellip;
EDIT 04/02/2020: Tom from Threat Post liked the diary and wrote an article based on it - you may find it here.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Analysis+of+a+tripleencrypted+AZORult+downloader/25768/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one we take a look at analysis of an interesting malicious document which turned out to be AZORult downloader. What made it stand out - among its other aspects - were 3 layers of home-grown encryption&amp;hellip;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;EDIT 04/02/2020: Tom from Threat Post liked the diary and wrote an article based on it - you may find it &lt;a href=&#34;https://threatpost.com/azorult-campaign-encryption-technique/152508/&#34;&gt;here&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>AZORult</category>
            
          
            
              <category>Macro</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Picks of 2019 malware - the large, the small and the one full of null bytes</title>
        <link>https://untrustednetwork.net/en/2020/01/16/sans-isc-diary-picks-of-2019-malware-the-large-the-small-and-the-one-full-of-null-bytes/</link>
        <pubDate>Thu, 16 Jan 2020 07:52:08 +0100</pubDate>
        
        <atom:modified>Thu, 16 Jan 2020 07:52:08 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/01/16/sans-isc-diary-picks-of-2019-malware-the-large-the-small-and-the-one-full-of-null-bytes/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one we take a look at what last year brought us, when it comes to malware delivered by e-mail, specifically at the smallest and largest malicious files I found in my e-mail quarantine.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Picks+of+2019+malware+the+large+the+small+and+the+one+full+of+null+bytes/25718/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one we take a look at what last year brought us, when it comes to malware delivered by e-mail, specifically at the smallest and largest malicious files I found in my e-mail quarantine.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Pony</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Most visited adult sites actually beat some e-banking portals when it comes to encryption</title>
        <link>https://untrustednetwork.net/en/2020/01/01/most-visited-adult-sites-actually-beat-some-e-banking-portals-when-it-comes-to-encryption/</link>
        <pubDate>Wed, 01 Jan 2020 12:09:20 +0100</pubDate>
        
        <atom:modified>Wed, 01 Jan 2020 12:09:20 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/01/01/most-visited-adult-sites-actually-beat-some-e-banking-portals-when-it-comes-to-encryption/</guid>
        <description>After I finished the analysis of SSL/TLS configuration of almost 1400 internet banking portals (see the relevant ISC Diary, a question came to me. Internet banking portals should be among the best secured systems put online, yet not all of them made the mark when it came to encryption used to secure HTTP traffic. Would the situation be even worse for sites which are commonly assumed to lack proper security measures?</description>
        <content:encoded>&lt;p&gt;After I finished the analysis of SSL/TLS configuration of almost 1400 internet banking portals (see the relevant &lt;a href=&#34;https://untrustednetwork.net/en/2019/12/13/sans-isc-diary-internet-banking-sites-and-their-use-of-tls...-and-sslv3...-and-sslv2/&#34;&gt;ISC Diary&lt;/a&gt;, a question came to me. Internet banking portals should be among the best secured systems put online, yet not all of them made the mark when it came to encryption used to secure HTTP traffic. Would the situation be even worse for sites which are commonly assumed to lack proper security measures?&lt;/p&gt;
&lt;p&gt;Websites with adult content seemed to be the ideal starting place to determine this, so I tried to look for a list of the most popular ones. Contrary to my expectations, I wasn&amp;rsquo;t able to find any current list with more than &amp;ldquo;Top 10&amp;rdquo; or &amp;ldquo;Top 25&amp;rdquo; sites, so I turned to Alexa. Among other information, Alexa offers &amp;ldquo;Top 500 sites&amp;rdquo; lists for the following categories:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Adult&lt;/li&gt;
&lt;li&gt;Arts&lt;/li&gt;
&lt;li&gt;Business&lt;/li&gt;
&lt;li&gt;Computers&lt;/li&gt;
&lt;li&gt;Games&lt;/li&gt;
&lt;li&gt;Health&lt;/li&gt;
&lt;li&gt;Home&lt;/li&gt;
&lt;li&gt;Kids and Teens&lt;/li&gt;
&lt;li&gt;News&lt;/li&gt;
&lt;li&gt;Recreation&lt;/li&gt;
&lt;li&gt;Reference&lt;/li&gt;
&lt;li&gt;Regional&lt;/li&gt;
&lt;li&gt;Science&lt;/li&gt;
&lt;li&gt;Shopping&lt;/li&gt;
&lt;li&gt;Society&lt;/li&gt;
&lt;li&gt;Sports&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Unfortunately, without a paid account, one may only access first 50 sites of the Top 500 list for each category. Although I originally wanted our sample to be much larger, it was not to be&amp;hellip; But the limitation gave me an idea. Since one may access list of the top 50 sites in each category, why not scan all the 50 sites for each of the 16 categories? Of course, with such a small sample size, the results could not be considered anywhere near representative, but they might be interesting nonetheless.&lt;/p&gt;
&lt;p&gt;With the plan set, I put it into action on 25 December 2019. I used the same methodology as in the case of the banking portals - I conducted an Nmap scan using the &amp;ldquo;ssl-enum-ciphers&amp;rdquo; and &amp;ldquo;sslv2&amp;rdquo; scripts which enabled me to determine which SSL/TLS protocols were supported by the servers (except for TLSv1.3) as well as the weakest supported ciphersuite (once again, see the Diary for more details). In the end, the scans managed to gather information about 790 of the 800 domains (the 10 errors were mostly due to second level domains not having an A record set).&lt;/p&gt;
&lt;p&gt;In contrast to the case of internet banking portals, none of the servers in the &amp;ldquo;Top 50&amp;rdquo; lists supported SSLv2 (which 0.8% of tested internet banking servers did) or supported a ciphersuite marked with an F (as was the case with 0.29% of e-banking servers). So in this regard (and actually several others), even the 50 most visited adult sites were actually better configured than some of the internet banking portals.&lt;/p&gt;
&lt;p&gt;Apart from that, the results were a bit of a mixed bag, as you may see from the following table of results. I added the numbers for the internet banking sites as well, so you may judge the resulting grades for yourselves.&lt;br /&gt;
&lt;br&gt;&lt;br&gt;&lt;/p&gt;
&lt;table&gt;
    &lt;col width=&#34;150&#34;&gt;
    &lt;col width=&#34;80&#34;&gt;
    &lt;col width=&#34;80&#34;&gt;
    &lt;col width=&#34;80&#34;&gt;
    &lt;col width=&#34;80&#34;&gt;
    &lt;tr&gt;
        &lt;td&gt;&lt;b&gt;Category&lt;/b&gt;&lt;/td&gt;
        &lt;td&gt;&lt;b&gt;A&lt;/b&gt;&lt;/td&gt;
        &lt;td&gt;&lt;b&gt;C&lt;/b&gt;&lt;/td&gt;
        &lt;td&gt;&lt;b&gt;D&lt;/b&gt;&lt;/td&gt;
        &lt;td&gt;&lt;b&gt;F&lt;/b&gt;&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Business&lt;/td&gt;
        &lt;td&gt;78.72&lt;/td&gt;
        &lt;td&gt;17.02&lt;/td&gt;
        &lt;td&gt;4.26&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Health&lt;/td&gt;
        &lt;td&gt;75.00&lt;/td&gt;
        &lt;td&gt;25.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Reference&lt;/td&gt;
        &lt;td&gt;75.00&lt;/td&gt;
        &lt;td&gt;22.92&lt;/td&gt;
        &lt;td&gt;2.08&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Science&lt;/td&gt;
        &lt;td&gt;74.42&lt;/td&gt;
        &lt;td&gt;23.26&lt;/td&gt;
        &lt;td&gt;2.33&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Kids and Teens&lt;/td&gt;
        &lt;td&gt;73.91&lt;/td&gt;
        &lt;td&gt;21.74&lt;/td&gt;
        &lt;td&gt;4.35&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Regional&lt;/td&gt;
        &lt;td&gt;72.34&lt;/td&gt;
        &lt;td&gt;23.40&lt;/td&gt;
        &lt;td&gt;4.26&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Shopping&lt;/td&gt;
        &lt;td&gt;72.34&lt;/td&gt;
        &lt;td&gt;25.53&lt;/td&gt;
        &lt;td&gt;2.13&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Society&lt;/td&gt;
        &lt;td&gt;71.74&lt;/td&gt;
        &lt;td&gt;28.26&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr style=&#34;color: darkgrey;&#34;&gt;
        &lt;td&gt;Internet Banking&lt;/td&gt;
        &lt;td&gt;70.47&lt;/td&gt;
        &lt;td&gt;24.29&lt;/td&gt;
        &lt;td&gt;4.95&lt;/td&gt;
        &lt;td&gt;0.29&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Home&lt;/td&gt;
        &lt;td&gt;67.35&lt;/td&gt;
        &lt;td&gt;32.65&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;News&lt;/td&gt;
        &lt;td&gt;67.35&lt;/td&gt;
        &lt;td&gt;32.65&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Recreation&lt;/td&gt;
        &lt;td&gt;66.67&lt;/td&gt;
        &lt;td&gt;31.11&lt;/td&gt;
        &lt;td&gt;2.22&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Adult&lt;/td&gt;
        &lt;td&gt;63.27&lt;/td&gt;
        &lt;td&gt;34.69&lt;/td&gt;
        &lt;td&gt;2.04&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Games&lt;/td&gt;
        &lt;td&gt;63.04&lt;/td&gt;
        &lt;td&gt;32.61&lt;/td&gt;
        &lt;td&gt;4.35&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Arts&lt;/td&gt;
        &lt;td&gt;61.70&lt;/td&gt;
        &lt;td&gt;34.04&lt;/td&gt;
        &lt;td&gt;4.26&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Sports&lt;/td&gt;
        &lt;td&gt;61.70&lt;/td&gt;
        &lt;td&gt;31.91&lt;/td&gt;
        &lt;td&gt;6.38&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Computers&lt;/td&gt;
        &lt;td&gt;52.00&lt;/td&gt;
        &lt;td&gt;46.00&lt;/td&gt;
        &lt;td&gt;2.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
&lt;/table&gt;
&lt;br&gt;
&lt;p&gt;Besides the marks for different categories, protocol support was interesting as well. As was already mentioned, none of the tested sites supported SSLv2, however one further point that should be mentioned is that on average, more internet banking sites still supported SSLv3 than servers in any of the Alexa categories and less of banking sites supported TLSv1.2 than even the sites in the Adult category. Since the sample sizes varied widely between the analyses, this should be considered more of an interesting observation than anything else, but I think it does merit at least this small remark.&lt;br /&gt;
&lt;br&gt;&lt;br&gt;&lt;/p&gt;
&lt;table&gt;
    &lt;col width=&#34;150&#34;&gt;
    &lt;col width=&#34;80&#34;&gt;
    &lt;col width=&#34;80&#34;&gt;
    &lt;col width=&#34;80&#34;&gt;
    &lt;col width=&#34;80&#34;&gt;
    &lt;tr&gt;
        &lt;td&gt;&lt;b&gt;Category&lt;/b&gt;&lt;/td&gt;
        &lt;td&gt;&lt;b&gt;SSLv3&lt;/b&gt;&lt;/td&gt;
        &lt;td&gt;&lt;b&gt;TLSv1.0&lt;/b&gt;&lt;/td&gt;
        &lt;td&gt;&lt;b&gt;TLSv1.1&lt;/b&gt;&lt;/td&gt;
        &lt;td&gt;&lt;b&gt;TLSv1.2&lt;/b&gt;&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Computers&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;74.00&lt;/td&gt;
        &lt;td&gt;82.00&lt;/td&gt;
        &lt;td&gt;100.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Adult&lt;/td&gt;
        &lt;td&gt;2.00&lt;/td&gt;
        &lt;td&gt;68.00&lt;/td&gt;
        &lt;td&gt;80.00&lt;/td&gt;
        &lt;td&gt;98.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;News&lt;/td&gt;
        &lt;td&gt;2.00&lt;/td&gt;
        &lt;td&gt;68.00&lt;/td&gt;
        &lt;td&gt;76.00&lt;/td&gt;
        &lt;td&gt;98.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Home&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;52.00&lt;/td&gt;
        &lt;td&gt;64.00&lt;/td&gt;
        &lt;td&gt;98.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Sports&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;68.75&lt;/td&gt;
        &lt;td&gt;85.42&lt;/td&gt;
        &lt;td&gt;97.92&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr style=&#34;color: darkgrey;&#34;&gt;
        &lt;td&gt;Internet Banking&lt;/td&gt;
        &lt;td&gt;3.49&lt;/td&gt;
        &lt;td&gt;47.64&lt;/td&gt;
        &lt;td&gt;57.75&lt;/td&gt;
        &lt;td&gt;96.65&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Reference&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;52.00&lt;/td&gt;
        &lt;td&gt;70.00&lt;/td&gt;
        &lt;td&gt;96.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Arts&lt;/td&gt;
        &lt;td&gt;2.04&lt;/td&gt;
        &lt;td&gt;63.27&lt;/td&gt;
        &lt;td&gt;71.43&lt;/td&gt;
        &lt;td&gt;95.92&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Society&lt;/td&gt;
        &lt;td&gt;2.08&lt;/td&gt;
        &lt;td&gt;47.92&lt;/td&gt;
        &lt;td&gt;58.33&lt;/td&gt;
        &lt;td&gt;95.83&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Health&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;46.94&lt;/td&gt;
        &lt;td&gt;67.35&lt;/td&gt;
        &lt;td&gt;93.88&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Shopping&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;36.73&lt;/td&gt;
        &lt;td&gt;63.27&lt;/td&gt;
        &lt;td&gt;93.88&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Business&lt;/td&gt;
        &lt;td&gt;2.04&lt;/td&gt;
        &lt;td&gt;36.73&lt;/td&gt;
        &lt;td&gt;53.06&lt;/td&gt;
        &lt;td&gt;93.88&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Kids and Teens&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;56.00&lt;/td&gt;
        &lt;td&gt;78.00&lt;/td&gt;
        &lt;td&gt;92.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Regional&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;56.00&lt;/td&gt;
        &lt;td&gt;78.00&lt;/td&gt;
        &lt;td&gt;92.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Recreation&lt;/td&gt;
        &lt;td&gt;2.04&lt;/td&gt;
        &lt;td&gt;42.86&lt;/td&gt;
        &lt;td&gt;63.27&lt;/td&gt;
        &lt;td&gt;91.84&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Games&lt;/td&gt;
        &lt;td&gt;2.00&lt;/td&gt;
        &lt;td&gt;66.00&lt;/td&gt;
        &lt;td&gt;82.00&lt;/td&gt;
        &lt;td&gt;90.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Science&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;44.90&lt;/td&gt;
        &lt;td&gt;67.35&lt;/td&gt;
        &lt;td&gt;87.76&lt;/td&gt;
    &lt;/tr&gt;
&lt;/table&gt;
&lt;br&gt;
&lt;p&gt;When it came to vulnerabilities, several servers in Society and Adult categories were found to be vulnerable to POODLE, couple in the Science category still supported the use of RC4 and quite a large number of sites in all categories supported ciphersuites vulnerable to SWEET32.&lt;br /&gt;
&lt;br&gt;&lt;br&gt;&lt;/p&gt;
&lt;table&gt;
    &lt;col width=&#34;150&#34;&gt;
    &lt;col width=&#34;80&#34;&gt;
    &lt;col width=&#34;80&#34;&gt;
    &lt;col width=&#34;80&#34;&gt;
    &lt;tr&gt;
        &lt;td&gt;&lt;b&gt;Category&lt;/b&gt;&lt;/td&gt;
        &lt;td&gt;&lt;b&gt;SWEET32&lt;/b&gt;&lt;/td&gt;
        &lt;td&gt;&lt;b&gt;RC4&lt;/b&gt;&lt;/td&gt;
        &lt;td&gt;&lt;b&gt;POODLE&lt;/b&gt;&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Society&lt;/td&gt;
        &lt;td&gt;27.08&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;2.08&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Adult&lt;/td&gt;
        &lt;td&gt;36.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;2.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr style=&#34;color: darkgrey;&#34;&gt;
        &lt;td&gt;Internet Banking&lt;/td&gt;
        &lt;td&gt;30.55&lt;/td&gt;
        &lt;td&gt;0.51&lt;/td&gt;
        &lt;td&gt;0.07&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Science&lt;/td&gt;
        &lt;td&gt;20.41&lt;/td&gt;
        &lt;td&gt;2.04&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Computers&lt;/td&gt;
        &lt;td&gt;48.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Sports&lt;/td&gt;
        &lt;td&gt;37.50&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Arts&lt;/td&gt;
        &lt;td&gt;36.73&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Games&lt;/td&gt;
        &lt;td&gt;34.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;News&lt;/td&gt;
        &lt;td&gt;34.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Home&lt;/td&gt;
        &lt;td&gt;32.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Recreation&lt;/td&gt;
        &lt;td&gt;30.61&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Shopping&lt;/td&gt;
        &lt;td&gt;26.53&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Regional&lt;/td&gt;
        &lt;td&gt;26.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Health&lt;/td&gt;
        &lt;td&gt;24.49&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Kids and Teens&lt;/td&gt;
        &lt;td&gt;24.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Reference&lt;/td&gt;
        &lt;td&gt;24.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
        &lt;td&gt;Business&lt;/td&gt;
        &lt;td&gt;20.41&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
        &lt;td&gt;0.00&lt;/td&gt;
    &lt;/tr&gt;
&lt;/table&gt;
&lt;br&gt;
&lt;p&gt;The last thing, which should be mentioned is that on average only 23.54% of the sites from the Alexa&amp;rsquo;s categories were configured in accordance with the current security best practices (i.e. they only supported TLSv1.2 and possibly TLSv1.3). Percentages for all of the categories tested may be found in the following chart.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://untrustednetwork.net/images/2020/01-tls-ssl-alexa/tlsv12_only.png&#34;&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2020/01-tls-ssl-alexa/tlsv12_only.png&#34; alt=&#34;Percentage of sites configured in accordance with current security best practices&#34; style=&#34;width:600px;&#34;&gt;&lt;/a&gt;&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/icons/stats.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SSL</category>
            
          
            
              <category>TLS</category>
            
          
            
              <category>Bank</category>
            
          
            
              <category>Alexa</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Internet banking sites and their use of TLS... and SSLv3... and SSLv2?!</title>
        <link>https://untrustednetwork.net/en/2019/12/13/sans-isc-diary-internet-banking-sites-and-their-use-of-tls...-and-sslv3...-and-sslv2/</link>
        <pubDate>Fri, 13 Dec 2019 08:22:37 +0100</pubDate>
        
        <atom:modified>Fri, 13 Dec 2019 08:22:37 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/12/13/sans-isc-diary-internet-banking-sites-and-their-use-of-tls...-and-sslv3...-and-sslv2/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one we take a look at the use of TLS (and SSL) on banking sites all over the world.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Internet+banking+sites+and+their+use+of+TLS+and+SSLv3+and+SSLv2/25606/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one we take a look at the use of TLS (and SSL) on banking sites all over the world.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>SSL</category>
            
          
            
              <category>TLS</category>
            
          
            
              <category>Bank</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Phishing with a self-contained credential-stealing webpage</title>
        <link>https://untrustednetwork.net/en/2019/12/06/sans-isc-diary-phishing-with-a-self-contained-credential-stealing-webpage/</link>
        <pubDate>Fri, 06 Dec 2019 07:30:00 +0100</pubDate>
        
        <atom:modified>Fri, 06 Dec 2019 07:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/12/06/sans-isc-diary-phishing-with-a-self-contained-credential-stealing-webpage/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one we take a look at an interesting phishing message, which carried a complete phishing web page as its attachment.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Phishing+with+a+selfcontained+credentialsstealing+webpage/25580/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one we take a look at an interesting phishing message, which carried a complete phishing web page as its attachment.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - E-mail from Agent Tesla</title>
        <link>https://untrustednetwork.net/en/2019/12/05/sans-isc-diary-e-mail-from-agent-tesla/</link>
        <pubDate>Thu, 05 Dec 2019 07:30:00 +0100</pubDate>
        
        <atom:modified>Thu, 05 Dec 2019 07:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/12/05/sans-isc-diary-e-mail-from-agent-tesla/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one we take a look at a multi-stage downloader for Agent Tesla.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Email+from+Agent+Tesla/25576/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one we take a look at a multi-stage downloader for Agent Tesla.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Malware Analysis</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Analysis of a strangely poetic malware</title>
        <link>https://untrustednetwork.net/en/2019/12/04/sans-isc-diary-analysis-of-a-strangely-poetic-malware/</link>
        <pubDate>Wed, 04 Dec 2019 08:14:33 +0100</pubDate>
        
        <atom:modified>Wed, 04 Dec 2019 08:14:33 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/12/04/sans-isc-diary-analysis-of-a-strangely-poetic-malware/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one we take a look at a macro-based dropper sent to the Internet Storm Center by one of our readers.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Analysis+of+a+strangely+poetic+malware/25572/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one we take a look at a macro-based dropper sent to the Internet Storm Center by one of our readers.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Malware Analysis</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Lessons learned from playing a willing phish</title>
        <link>https://untrustednetwork.net/en/2019/11/26/sans-isc-diary-lessons-learned-from-playing-a-willing-phish/</link>
        <pubDate>Tue, 26 Nov 2019 12:08:19 +0100</pubDate>
        
        <atom:modified>Tue, 26 Nov 2019 12:08:19 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/11/26/sans-isc-diary-lessons-learned-from-playing-a-willing-phish/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one we take a look at baiting phishing attackers and at some of the lessons we may learn from it.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Lessons+learned+from+playing+a+willing+phish/25552/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one we take a look at baiting phishing attackers and at some of the lessons we may learn from it.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Did the recent malicious BlueKeep campaign have any positive impact when it comes to patching?</title>
        <link>https://untrustednetwork.net/en/2019/11/10/sans-isc-diary-did-the-recent-malicious-bluekeep-campaign-have-any-positive-impact-when-it-comes-to-patching/</link>
        <pubDate>Sun, 10 Nov 2019 11:55:40 +0100</pubDate>
        
        <atom:modified>Sun, 10 Nov 2019 11:55:40 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/11/10/sans-isc-diary-did-the-recent-malicious-bluekeep-campaign-have-any-positive-impact-when-it-comes-to-patching/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. If you wondered whether the recent &amp;ldquo;BlueKeep worm scare&amp;rdquo; had any impact when it comes to the number of vulnerable systems out there, then this one is for you.
EDIT 13/11/2019: Shaun from The Register liked the post and wrote an article based on it - you may find it here.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Did+the+recent+malicious+BlueKeep+campaign+have+any+positive+impact+when+it+comes+to+patching/25506/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. If you wondered whether the recent &amp;ldquo;BlueKeep worm scare&amp;rdquo; had any impact when it comes to the number of vulnerable systems out there, then this one is for you.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;EDIT 13/11/2019: Shaun from The Register liked the post and wrote an article based on it - you may find it &lt;a href=&#34;https://www.theregister.co.uk/2019/11/11/bluekeep_didnt_boost_patching/&#34;&gt;here&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>BlueKeep</category>
            
          
            
              <category>Malware</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - EML attachments in O365 - a recipe for phishing</title>
        <link>https://untrustednetwork.net/en/2019/10/31/sans-isc-diary-eml-attachments-in-o365-a-recipe-for-phishing/</link>
        <pubDate>Thu, 31 Oct 2019 11:15:35 +0100</pubDate>
        
        <atom:modified>Thu, 31 Oct 2019 11:15:35 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/10/31/sans-isc-diary-eml-attachments-in-o365-a-recipe-for-phishing/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at the absence of filtering of EML attachments in O365 and what it can lead to.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/EML+attachments+in+O365+a+recipe+for+phishing/25474/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at the absence of filtering of EML attachments in O365 and what it can lead to.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>O365</category>
            
          
            
              <category>EML</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Phishing e-mail spoofing SPF-enabled domain</title>
        <link>https://untrustednetwork.net/en/2019/10/17/sans-isc-diary-phishing-e-mail-spoofing-spf-enabled-domain/</link>
        <pubDate>Thu, 17 Oct 2019 11:49:25 +0200</pubDate>
        
        <atom:modified>Thu, 17 Oct 2019 11:49:25 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/10/17/sans-isc-diary-phishing-e-mail-spoofing-spf-enabled-domain/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at SPF and when even SPF-enabled domains may be spoofed.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Phishing+email+spoofing+SPFenabled+domain/25426/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at SPF and when even SPF-enabled domains may be spoofed.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Phishing</category>
            
          
            
              <category>SPF</category>
            
          
            
              <category>Malware</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>ALEF Security Report 2019</title>
        <link>https://untrustednetwork.net/en/2019/09/16/alef-security-report-2019/</link>
        <pubDate>Mon, 16 Sep 2019 20:40:35 +0200</pubDate>
        
        <atom:modified>Mon, 16 Sep 2019 20:40:35 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/09/16/alef-security-report-2019/</guid>
        <description>Couple of months back, my colleagues and I created a report covering current cyber security situation in the Czech Republic. If you&amp;rsquo;d like to know, what security services were most in demand during the last couple of years, how large is the percentage of Czech organizations, which conduct phishing tests of their employees, or how STARTTLS adoption is progressing in Czech Republic, you may download it here.</description>
        <content:encoded>&lt;p&gt;Couple of months back, my colleagues and I created a report covering current cyber security situation in the Czech Republic. If you&amp;rsquo;d like to know, what security services were most in demand during the last couple of years, how large is the percentage of Czech organizations, which conduct phishing tests of their employees, or how STARTTLS adoption is progressing in Czech Republic, you may download it &lt;a href=&#34;https://untrustednetwork.net/files/2019/ALEF_Security_Report_2019_EN.pdf&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>ALEF</category>
            
          
            
              <category>ALEF CSIRT</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Tricky LNK points to TrickBot</title>
        <link>https://untrustednetwork.net/en/2019/09/03/sans-isc-diary-tricky-lnk-points-to-trickbot/</link>
        <pubDate>Tue, 03 Sep 2019 13:06:21 +0200</pubDate>
        
        <atom:modified>Tue, 03 Sep 2019 13:06:21 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/09/03/sans-isc-diary-tricky-lnk-points-to-trickbot/</guid>
        <description>A Guest Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at analyzing a malicious LNK file which leads us to a sample of Trickbot.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Guest+Diary+Tricky+LNK+points+to+TrickBot/25290/&#34;&gt;Guest Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at analyzing a malicious LNK file which leads us to a sample of Trickbot.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Malware Analysis</category>
            
          
            
              <category>Trickbot</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Open Redirect: A Small But Very Common Vulnerability</title>
        <link>https://untrustednetwork.net/en/2019/08/28/sans-isc-diary-open-redirect-a-small-but-very-common-vulnerability/</link>
        <pubDate>Wed, 28 Aug 2019 14:27:02 +0200</pubDate>
        
        <atom:modified>Wed, 28 Aug 2019 14:27:02 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/08/28/sans-isc-diary-open-redirect-a-small-but-very-common-vulnerability/</guid>
        <description>A Guest Diary of mine was published today on the SANS Internet Storm Center. In this one, I discuss open redirect vulnerabilities and how to find them. If you&amp;rsquo;ve never heard of open redirects, this might be a useful introductory text.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Guest+Diary+Open+Redirect+A+Small+But+Very+Common+Vulnerability/25276/&#34;&gt;Guest Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, I discuss open redirect vulnerabilities and how to find them. If you&amp;rsquo;ve never heard of open redirects, this might be a useful introductory text.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Vulnerability</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Where are all the machines affected by BlueKeep hiding - part 2</title>
        <link>https://untrustednetwork.net/en/2019/08/10/where-are-all-the-machines-affected-by-bluekeep-hiding-part-2/</link>
        <pubDate>Sat, 10 Aug 2019 10:11:50 +0200</pubDate>
        
        <atom:modified>Sat, 10 Aug 2019 10:11:50 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/08/10/where-are-all-the-machines-affected-by-bluekeep-hiding-part-2/</guid>
        <description>Last week, we took a look at Shodan results to try to determine which countries are the &amp;ldquo;richest&amp;rdquo; in the world when it comes to machines vulnerable to BlueKeep visible from the internet. Since the number of vulnerable machines Shodan detects grows every day (see the following chart), I thought it might be interesting to have another look at the numbers. But in a way which is a little different.</description>
        <content:encoded>&lt;p&gt;Last week, we &lt;a href=&#34;https://untrustednetwork.net/en/2019/08/01/where-are-all-the-machines-affected-by-bluekeep-hiding/&#34;&gt;took a look at Shodan results&lt;/a&gt; to try to determine which countries are the &amp;ldquo;richest&amp;rdquo; in the world when it comes to machines vulnerable to BlueKeep visible from the internet. Since the number of vulnerable machines Shodan detects grows every day (see the following chart), I thought it might be interesting to have another look at the numbers. But in a way which is a little different.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2019/bluekeep-global.png&#34; alt=&#34;BlueKeep detections by Shodan&#34; /&gt;&lt;/p&gt;
&lt;p&gt;It should be mentioned that the rise in the number of affected machines is most likely due to Shodan scanning previously unscanned IP ranges and not because there are actually more vulnerable machines out there. In fact it is quite probable that a not insignificant percentage of machines shown by Shodan as vulnerable have either been assigned different IP addresses since the detection (and could therefore have even been counted multiple times) of have been patched since the detection. If you&amp;rsquo;d like to see something closer to an actual &amp;ldquo;real-time&amp;rdquo; look at the number of machines which are still vulnerable to BlueKeep and accessible from the internet, &lt;a href=&#34;https://rdpscan.shadowserver.org/statsbluekeep/&#34;&gt;Shadowserver&lt;/a&gt; will probably be a better place to look then Shodan.&lt;br /&gt;
But that doesn&amp;rsquo;t mean that Shodan can&amp;rsquo;t still give us something quite interesting in this area.&lt;br /&gt;
&lt;br&gt;&lt;br&gt;&lt;br /&gt;
Since very little has changed in terms of positions of different countries (see the &lt;a href=&#34;https://untrustednetwork.net/en/2019/08/01/where-are-all-the-machines-affected-by-bluekeep-hiding/&#34;&gt;previous post&lt;/a&gt; if you are interested who still has the dubious honor of belonging to the &amp;ldquo;BlueKeep Top 10 Club of Countries&amp;rdquo; as there were no changes in the first 10 places), I believe it might be more interesting to explore another aspect of the numbers, namely what percentage of machines which are accessible on the usual RDP ports (3388 and 3389) in the different countries are actually vulnerable. I quite like the idea since it could give us at least some idea of how large a percentage of all affected machines are potentially still unpatched in the countries in question.&lt;br /&gt;
&lt;br&gt;&lt;br&gt;&lt;br /&gt;
It is true that machines directly accessible from the internet are not the best sample for &amp;ldquo;all the machines out there&amp;rdquo;, however some lose correlation between patch levels of servers accessible from the internet and patch levels of all the other machines certainly exists. One could even realistically expect that servers directly connected to the internet should be patched more often than other servers/machines so using what Shodan sees as a sample isn&amp;rsquo;t that inappropriate.&lt;br /&gt;
Although, since we&amp;rsquo;re listing weaknesses of this approach, we should mention that we&amp;rsquo;re completely skipping over identifying operating systems of machines behind the RDP ports and we&amp;rsquo;re counting anything with any service accessible on 3388 or 3389 as either vulnerable or patched. I.e. the following results are interesting but take them with a grain of salt.&lt;br /&gt;
&lt;br&gt;&lt;br&gt;&lt;br /&gt;
Based on Shodan detections, of the 30 countries with highest numbers of affected machines, Hong Kong, South Korea, Argentina, China and Ukraine seem to be worse off when it comes to the percentages of machines with open RDP ports that are vulnerable to BlueKeep.&lt;br /&gt;
I&amp;rsquo;ve left the chart ordered by number of detected vulnerable machines in different countries so you can draw your own conclusions. The percentages themselves are in a table at the end of the post.&lt;br /&gt;
What seems most interesting is that although the US is second overall in the number of vulnerable machines detected (over 109k machines on the day of writing), it appears that the local patching culture is much better than in the rest of the &amp;ldquo;Top 30&amp;rdquo; BlueKeep countries as this number represents less than 3.7% of all systems with open RDP ports in the US.&lt;br /&gt;
This well illustrates the fact number of vulnerable systems in a certain country often doesn&amp;rsquo;t give us the whole story&amp;hellip;&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2019/bluekeep-percentages.png&#34; alt=&#34;Percentage of machines with open RDP ports affected by BlueKeep &#34; /&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Position&lt;/th&gt;
&lt;th&gt;Country&lt;/th&gt;
&lt;th&gt;Vulnerable machines&lt;/th&gt;
&lt;th&gt;Percentage of vulnerable machines&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td&gt;China&lt;/td&gt;
&lt;td&gt;355449&lt;/td&gt;
&lt;td&gt;24.34%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;td&gt;United States&lt;/td&gt;
&lt;td&gt;109011&lt;/td&gt;
&lt;td&gt;3.67%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;South Korea&lt;/td&gt;
&lt;td&gt;32300&lt;/td&gt;
&lt;td&gt;29.07%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;Brazil&lt;/td&gt;
&lt;td&gt;29137&lt;/td&gt;
&lt;td&gt;19.66%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;Russian Federation&lt;/td&gt;
&lt;td&gt;28432&lt;/td&gt;
&lt;td&gt;20.12%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6&lt;/td&gt;
&lt;td&gt;Hong Kong&lt;/td&gt;
&lt;td&gt;25015&lt;/td&gt;
&lt;td&gt;30.67%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7&lt;/td&gt;
&lt;td&gt;Germany&lt;/td&gt;
&lt;td&gt;13971&lt;/td&gt;
&lt;td&gt;6.58%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8&lt;/td&gt;
&lt;td&gt;Taiwan&lt;/td&gt;
&lt;td&gt;13394&lt;/td&gt;
&lt;td&gt;22.36%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9&lt;/td&gt;
&lt;td&gt;Japan&lt;/td&gt;
&lt;td&gt;12444&lt;/td&gt;
&lt;td&gt;10.15%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10&lt;/td&gt;
&lt;td&gt;United Kingdom&lt;/td&gt;
&lt;td&gt;11691&lt;/td&gt;
&lt;td&gt;8.75%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11&lt;/td&gt;
&lt;td&gt;France&lt;/td&gt;
&lt;td&gt;10413&lt;/td&gt;
&lt;td&gt;7.74%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12&lt;/td&gt;
&lt;td&gt;Canada&lt;/td&gt;
&lt;td&gt;10086&lt;/td&gt;
&lt;td&gt;9.78%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13&lt;/td&gt;
&lt;td&gt;Italy&lt;/td&gt;
&lt;td&gt;9585&lt;/td&gt;
&lt;td&gt;16.99%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14&lt;/td&gt;
&lt;td&gt;Spain&lt;/td&gt;
&lt;td&gt;9428&lt;/td&gt;
&lt;td&gt;17.13%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15&lt;/td&gt;
&lt;td&gt;India&lt;/td&gt;
&lt;td&gt;7732&lt;/td&gt;
&lt;td&gt;11.00%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16&lt;/td&gt;
&lt;td&gt;Mexico&lt;/td&gt;
&lt;td&gt;7361&lt;/td&gt;
&lt;td&gt;16.50%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17&lt;/td&gt;
&lt;td&gt;Netherlands&lt;/td&gt;
&lt;td&gt;6941&lt;/td&gt;
&lt;td&gt;4.48%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18&lt;/td&gt;
&lt;td&gt;Argentina&lt;/td&gt;
&lt;td&gt;6826&lt;/td&gt;
&lt;td&gt;27.86%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;19&lt;/td&gt;
&lt;td&gt;Ukraine&lt;/td&gt;
&lt;td&gt;6516&lt;/td&gt;
&lt;td&gt;22.41%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;20&lt;/td&gt;
&lt;td&gt;Australia&lt;/td&gt;
&lt;td&gt;5555&lt;/td&gt;
&lt;td&gt;8.69%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;21&lt;/td&gt;
&lt;td&gt;Viet Nam&lt;/td&gt;
&lt;td&gt;5455&lt;/td&gt;
&lt;td&gt;13.07%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;22&lt;/td&gt;
&lt;td&gt;Singapore&lt;/td&gt;
&lt;td&gt;5226&lt;/td&gt;
&lt;td&gt;6.45%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;23&lt;/td&gt;
&lt;td&gt;Turkey&lt;/td&gt;
&lt;td&gt;4915&lt;/td&gt;
&lt;td&gt;10.92%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;24&lt;/td&gt;
&lt;td&gt;Thailand&lt;/td&gt;
&lt;td&gt;4522&lt;/td&gt;
&lt;td&gt;15.52%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;25&lt;/td&gt;
&lt;td&gt;Poland&lt;/td&gt;
&lt;td&gt;4241&lt;/td&gt;
&lt;td&gt;14.01%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;26&lt;/td&gt;
&lt;td&gt;South Africa&lt;/td&gt;
&lt;td&gt;4175&lt;/td&gt;
&lt;td&gt;13.95%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;27&lt;/td&gt;
&lt;td&gt;Colombia&lt;/td&gt;
&lt;td&gt;2962&lt;/td&gt;
&lt;td&gt;14.59%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;28&lt;/td&gt;
&lt;td&gt;Czech Republic&lt;/td&gt;
&lt;td&gt;2890&lt;/td&gt;
&lt;td&gt;10.40%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;29&lt;/td&gt;
&lt;td&gt;Iran&lt;/td&gt;
&lt;td&gt;2822&lt;/td&gt;
&lt;td&gt;14.14%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;30&lt;/td&gt;
&lt;td&gt;Malaysia&lt;/td&gt;
&lt;td&gt;2725&lt;/td&gt;
&lt;td&gt;17.82%&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/icons/stats.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>Vulnerability</category>
            
          
            
              <category>BlueKeep</category>
            
          
            
              <category>Shodan</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
      </item>
      
      <item>
        <title>SANS ISC Diary - The good, the bad and the non-functional</title>
        <link>https://untrustednetwork.net/en/2019/08/08/sans-isc-diary-the-good-the-bad-and-the-non-functional/</link>
        <pubDate>Thu, 08 Aug 2019 21:31:08 +0200</pubDate>
        
        <atom:modified>Thu, 08 Aug 2019 21:31:08 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/08/08/sans-isc-diary-the-good-the-bad-and-the-non-functional/</guid>
        <description>A Guest Diary of mine was published today on the SANS Internet Storm Center. If you&amp;rsquo;ve wondered how do the less usual cyber attacks look, it might be worth a read&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Guest+Diary+The+good+the+bad+and+the+nonfunctional+or+how+not+to+do+an+attack+campaign/25218/&#34;&gt;Guest Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. If you&amp;rsquo;ve wondered how do the less usual cyber attacks look, it might be worth a read&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>Attack</category>
            
          
            
              <category>SANS</category>
            
          
            
              <category>Drupal</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>Where are all the machines affected by BlueKeep hiding?</title>
        <link>https://untrustednetwork.net/en/2019/08/01/where-are-all-the-machines-affected-by-bluekeep-hiding/</link>
        <pubDate>Thu, 01 Aug 2019 11:23:55 +0200</pubDate>
        
        <atom:modified>Mon, 05 Aug 2019 16:13:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/08/01/where-are-all-the-machines-affected-by-bluekeep-hiding/</guid>
        <description>EDIT 8/5/2019: Wrong CVE - CVE-2019-0709 was mentioned instead of CVE-2019-0708&amp;hellip;
We&amp;rsquo;ve all read about the hundereds of thousands of machines affected by BlueKeep connected to the internet, but where are they hiding? With the help of Shodan, we can try to figure it out.
At the time of writing, Shodan returns 667243 results for CVE-2019-0708. In the leading place is China with 291686 results, followed by United States (88625 results), Korea (26578 results), Brazil (23756 results) and Russia (22682).</description>
        <content:encoded>&lt;p&gt;&lt;em&gt;EDIT 8/5/2019: Wrong CVE - CVE-2019-0709 was mentioned instead of CVE-2019-0708&amp;hellip;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;We&amp;rsquo;ve all read about the hundereds of thousands of machines affected by BlueKeep connected to the internet, but where are they hiding? With the help of Shodan, we can try to figure it out.&lt;/p&gt;
&lt;p&gt;At the time of writing, Shodan returns 667243 results for CVE-2019-0708. In the leading place is China with 291686 results, followed by United States (88625 results), Korea (26578 results), Brazil (23756 results) and Russia (22682).&lt;/p&gt;
&lt;p&gt;Top 49 countries are each the home of more than 1000 vulnerable servers (the Czech Republic has 2327 results and is in 29th place) and each of the top 97 countries has at least 100 detections.&lt;/p&gt;
&lt;p&gt;For those of you who would like to take a look at all the countries (though it is possible I missed some of them) where there was at least one vulnerable machine, you may take a look at the following chart.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2019/bluekeep.png&#34; alt=&#34;BlueKeep&#34; /&gt;&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/icons/stats.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>Vulnerability</category>
            
          
            
              <category>BlueKeep</category>
            
          
            
              <category>Shodan</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
      </item>
      
      <item>
        <title>Half-open redirect vulnerability in Youtube</title>
        <link>https://untrustednetwork.net/en/2019/07/22/half-open-redirect-vulnerability-in-youtube/</link>
        <pubDate>Mon, 22 Jul 2019 19:33:43 +0200</pubDate>
        
        <atom:modified>Mon, 22 Jul 2019 19:33:43 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/07/22/half-open-redirect-vulnerability-in-youtube/</guid>
        <description>If you open any Youtube video, which has in its description a link to an external URL, you may notice that the link points to a Youtube redirection mechanism (https://www.youtube.com/redirect?&amp;hellip;), with the target URL being passed to it as a parameter, rather than to the target URL itself. In such a case, the link has the following structure:
https://www.youtube.com/redirect?q=[target_URL]&amp;amp;redir_token=[token]&amp;amp;event=video_description&amp;amp;v=[video_ID]
Since there is a redir_token parameter in the URL, one might assume that the redirect mechanism isn&amp;rsquo;t open, i.</description>
        <content:encoded>&lt;p&gt;If you open any Youtube video, which has in its description a link to an external URL, you may notice that the link points to a Youtube redirection mechanism (ht&lt;span&gt;tps://www.yout&lt;/span&gt;ube.com/redirect?&amp;hellip;), with the target URL being passed to it as a parameter, rather than to the target URL itself. In such a case, the link has the following structure:&lt;/p&gt;
&lt;p&gt;&lt;kbd&gt;ht&lt;span&gt;tps://www.you&lt;/span&gt;tube.com/redirect?q=[target_URL]&amp;amp;redir_token=[token]&amp;amp;event=video_description&amp;amp;v=[video_ID]&lt;/p&gt;
&lt;p&gt;Since there is a &lt;em&gt;redir_token&lt;/em&gt; parameter in the URL, one might assume that the redirect mechanism isn&amp;rsquo;t open, i.e. that can&amp;rsquo;t be used for redirection to an arbitrary URL. One would, however, be only half-right.&lt;/p&gt;
&lt;p&gt;The value of the token seems to be connected with the current Youtube session (though there isn&amp;rsquo;t any obvious corelation between values of relevant cookies and the token). And while parameters &lt;em&gt;event&lt;/em&gt; and &lt;em&gt;v&lt;/em&gt; are optional, if you try to use the redirection mechanism without the &lt;em&gt;redir_token&lt;/em&gt; parameter - or with an invalid value of this parameter - you will be greeted with the following message:&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2019/youtube/are_you_sure.png&#34; alt=&#34;Are you sure?&#34; /&gt;&lt;/p&gt;
&lt;p&gt;You may try this out for yourself yourself using this &lt;a href=&#34;https://www.youtube.com/redirect?q=https%3A%2F%2Fwww.untrustednetwork.net&#34;&gt;link&lt;/a&gt;. So far everything seems to be in order.&lt;/p&gt;
&lt;p&gt;A problem - if only a small one - however, starts to become obvious when we try to use a valid token along with another URL (i.e. we copy a valid link, perhaps delete the optional parameters, and change the value of the parameter &lt;em&gt;q&lt;/em&gt;). In this case, a browser will indeed be redirected (using HTTP code 303) to the new URL, because the tokens are in no way dependent on the value of &lt;em&gt;q&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;This means that if you can get a valid redirect link from a user, who has an active Youtube session established, you could modify it in such a way, that - if this user opened it - it would redirect his/her browser to the URL of your choice. As the tokens seem to last (although I tried to determine the maximum age for a token on only one ocasion so don&amp;rsquo;t quote me on it) for approximately 24 hours, one could hypotetically use this (it should probably be called &amp;ldquo;partially-missing input validation&amp;rdquo;, but &amp;ldquo;half-open redirect&amp;rdquo; will do) vulnerability in a real world scenario. Although it is almost completely useless for malicious phishing campaigns, it could be used quite effectively against - for example - one&amp;rsquo;s coleagues and/or friends (e.g. &amp;ldquo;Jack, could you please send me the link under this video? Thank you. Now, here is a link to a video you&amp;rsquo;re going to love&amp;hellip;&amp;quot;). Plus, it might be a good example of dangers of clicking on seemingly safe links in e-mail for any security awareness classes out there.&lt;/p&gt;
&lt;p&gt;Since Google replied to me that they don&amp;rsquo;t intend to fix this small vulnerability and don&amp;rsquo;t mind if I publish it, use it (&lt;strong&gt;ethically&lt;/strong&gt;, please) as you see fit.&lt;/p&gt;
&lt;p&gt;It should be added that there seems to be some regularity to the values of tokens being generated (e.g. when a site is refreshed), but at first glance there doesn&amp;rsquo;t seem to be any obvious way to use this regularity to craft valid tokens, although I didn&amp;rsquo;t spend much time on verifying that.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Vulnerabilities</category>
            
          
            
              <category>Youtube</category>
            
          
            
              <category>Google</category>
            
          
        
        
          
            
              <category>Vulnerabilities</category>
            
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
      </item>
      
      <item>
        <title>How big of a problem is the &#39;open redirect&#39; in Babel?</title>
        <link>https://untrustednetwork.net/en/2019/03/02/how-big-of-a-problem-is-the-open-redirect-in-babel/</link>
        <pubDate>Sat, 02 Mar 2019 12:35:00 +0100</pubDate>
        
        <atom:modified>Sat, 02 Mar 2019 12:35:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/03/02/how-big-of-a-problem-is-the-open-redirect-in-babel/</guid>
        <description>During a recent research into prevalence of open redirection vulnerabilities within the ccTLD .CZ we&amp;rsquo;ve done with my colleagues from ALEF CSIRT (description of its results in Czech may be foud here), I’ve noticed that many of the vulnerable sites seemed to be using CMS Made Simple with Babel multi-language module. This seemed to warrant a closer investigation&amp;hellip;
Before we go further, let’s briefly describe what „open redirection“ (CWE-601) weakness/vulnerability actually is.</description>
        <content:encoded>&lt;p&gt;During a recent research into prevalence of open redirection vulnerabilities within the ccTLD .CZ we&amp;rsquo;ve done with my colleagues from ALEF CSIRT (description of its results in Czech may be foud &lt;a href=&#34;https://www.root.cz/clanky/jak-velky-problem-jsou-open-redirection-zranitelnosti-nejen-na-ceskem-webu/&#34;&gt;here&lt;/a&gt;), I’ve noticed that many of the vulnerable sites seemed to be using CMS Made Simple with Babel multi-language module. This seemed to warrant a closer investigation&amp;hellip;&lt;/p&gt;
&lt;p&gt;Before we go further, let’s briefly describe what „open redirection“ (CWE-601) weakness/vulnerability actually is. The term is usually used to describe a mechanism which – when present on a certain website and queried in a specific way (usually by passing a specific parameter to it) - automatically redirects visiting browser to a different (arbitrary) domain/URL. What this means in practical terms is that it is possible to create a link to the website in question, which redirects user to any other - pontentially malicious or untrusted - site.&lt;br /&gt;
This behaviour might be intentionally present on certain websites, but in most cases, it is considered a vulnerability and/or bad practice since may be quite easily misused. Imagine, for example, how easy it would be to create a successful phishing campaign targeting clients of a bank which has open redirection vulnerability on its website.&lt;/p&gt;
&lt;p&gt;An example of a site with intentional open redirection functionality, which will enable us to demonstrate the principle in practice, is 1gr.cz – a logger which counts clickthroughs for ad and marketing purposes. A link to 1gr.cz which automatically redirects visitors to untrustednetwork.net could be crafted in the following way:&lt;/p&gt;
&lt;p&gt;&lt;kbd&gt;ht&lt;span&gt;tp://1g&lt;/span&gt;r.cz/log/redir.aspx?url=ht&lt;span&gt;tps://www.u&lt;/span&gt;ntrustednetwork.net/&lt;/kbd&gt;&lt;/p&gt;
&lt;p&gt;Now, let us dive right into the interesting details regarding CMS Made Simple and Bable.&lt;br /&gt;
CMS Made Simple (CMSMS) is one of the lesser known CMS platforms out there.  Although it is not too widely used, vulnerabilities in the CMSMS core or in its plugins or modules may still affect thousands of websites. This appears to be the case with the vulnerability I found in Babel – a module which brings multilingual functionality to CMSMS sites.&lt;br /&gt;
The full write up of the vulnerability may be found &lt;a href=&#34;https://untrustednetwork.net/en/2019/02/20/open-redirection-vulnerability-in-babel/&#34;&gt;here&lt;/a&gt;, but in simple terms, Babel in all its versions translates content by redirecting user to different pages based on their language preferences. This is not a bad idea per se, however in Babel, the same mechanism enables anyone to create a link to the CMSMS-enabled site, which redirects to an arbitrary URL.&lt;br /&gt;
Babel – when installed – uses the path domain.root/modules/babel to hold all its PHP files. Among these is redirect.php, a file containing PHP script through which the translation is handled. The relevant code looks like this:&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;div class=&#34;chroma&#34;&gt;
&lt;table class=&#34;lntable&#34;&gt;&lt;tr&gt;&lt;td class=&#34;lntd&#34;&gt;
&lt;pre class=&#34;chroma&#34;&gt;&lt;code&gt;&lt;span class=&#34;lnt&#34;&gt;1
&lt;/span&gt;&lt;span class=&#34;lnt&#34;&gt;2
&lt;/span&gt;&lt;span class=&#34;lnt&#34;&gt;3
&lt;/span&gt;&lt;span class=&#34;lnt&#34;&gt;4
&lt;/span&gt;&lt;span class=&#34;lnt&#34;&gt;5
&lt;/span&gt;&lt;span class=&#34;lnt&#34;&gt;6
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;
&lt;td class=&#34;lntd&#34;&gt;
&lt;pre class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-js&#34; data-lang=&#34;js&#34;&gt;&lt;span class=&#34;k&#34;&gt;if&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;(&lt;/span&gt;&lt;span class=&#34;o&#34;&gt;!&lt;/span&gt;&lt;span class=&#34;nx&#34;&gt;isset&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;(&lt;/span&gt;&lt;span class=&#34;nx&#34;&gt;$_GET&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;[&lt;/span&gt;&lt;span class=&#34;s2&#34;&gt;&amp;#34;newurl&amp;#34;&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;])&lt;/span&gt; &lt;span class=&#34;p&#34;&gt;){&lt;/span&gt;
	&lt;span class=&#34;cm&#34;&gt;/*code not important for our purposes removed here*/&lt;/span&gt;
&lt;span class=&#34;p&#34;&gt;}&lt;/span&gt;&lt;span class=&#34;k&#34;&gt;else&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;{&lt;/span&gt;
	&lt;span class=&#34;cm&#34;&gt;/*code not important for our purposes removed here*/&lt;/span&gt;
	&lt;span class=&#34;nx&#34;&gt;header&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;(&lt;/span&gt;&lt;span class=&#34;s2&#34;&gt;&amp;#34;location: &amp;#34;&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;.&lt;/span&gt;&lt;span class=&#34;nx&#34;&gt;$_GET&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;[&lt;/span&gt;&lt;span class=&#34;s2&#34;&gt;&amp;#34;newurl&amp;#34;&lt;/span&gt;&lt;span class=&#34;p&#34;&gt;]);&lt;/span&gt;
&lt;span class=&#34;p&#34;&gt;}&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;p&gt;What it basically means is that if the &amp;ldquo;newurl&amp;rdquo; parameter is set, browser will be redirected to the URL contained therein. Since there are no checks or limits regarding the target URL, the fact that there is an &amp;ldquo;open&amp;rdquo; redirection vulnerability should be obvious.&lt;/p&gt;
&lt;p&gt;So how big of a problem is this vulnerability? Well, not too big. As has been said before, open redirection is mainly useful for phishing and not that many sites interesting to phishers use the Babel module&amp;hellip; But with approximately 3.700 URLs affected before the disclosure was published it is not insignificant either. That number is based on relevant Google search results (so take it with a grain of salt - in terms of affected sites, it was probably a lot less&amp;hellip;although the latest version of the vulnerable module was downloaded from the CMS website more than 5.700 times, so who knows) from February 14th 2019.&lt;/p&gt;
&lt;p&gt;I was interested in the distribution of vulnerable sites/URLs around different TLDs, so I&amp;rsquo;ve done a search for each of the 20 most used TLDs and a serach for each of the ccTLDs of European countries. The &amp;ldquo;Top 10&amp;rdquo; results are:&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;TLD&lt;/th&gt;
&lt;th align=&#34;right&#34;&gt;Count&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;========&lt;/td&gt;
&lt;td align=&#34;right&#34;&gt;========&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;COM&lt;/td&gt;
&lt;td align=&#34;right&#34;&gt;1590&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;BE&lt;/td&gt;
&lt;td align=&#34;right&#34;&gt;448&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;FR&lt;/td&gt;
&lt;td align=&#34;right&#34;&gt;408&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;NL&lt;/td&gt;
&lt;td align=&#34;right&#34;&gt;227&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;PT&lt;/td&gt;
&lt;td align=&#34;right&#34;&gt;226&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;CH&lt;/td&gt;
&lt;td align=&#34;right&#34;&gt;207&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;DE&lt;/td&gt;
&lt;td align=&#34;right&#34;&gt;142&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;CZ&lt;/td&gt;
&lt;td align=&#34;right&#34;&gt;96&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;LV&lt;/td&gt;
&lt;td align=&#34;right&#34;&gt;78&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;AT&lt;/td&gt;
&lt;td align=&#34;right&#34;&gt;46&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;br&gt;
&lt;p&gt;That covers most of what seems to be out there, but if you want to see the results for all top level domains with at least one relevant search result, they are summarized in the following chart.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/babel-tlds-chart.png&#34; alt=&#34;Vulnerable sites in different TLDs&#34; /&gt;&lt;/p&gt;
&lt;p&gt;As you may see, a number of the vulnerable websites are hosted on domains within ccTLDs belonging to different European countries. What&amp;rsquo;s more, based on a quick look at the .COM results, it seems that most of those domains are also registered by European citizens and companies. I&amp;rsquo;m not sure whether CMSMS as a whole or just Babel have mostly Euro-centric user base, but this regional disparity seemes quite interesting either way.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Vulnerability</category>
            
          
            
              <category>ALEF</category>
            
          
            
              <category>Babel</category>
            
          
        
        
          
            
              <category>Vulnerabilities</category>
            
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
      </item>
      
      <item>
        <title>It&#39;s 2019 and WannaCry is still not dead</title>
        <link>https://untrustednetwork.net/en/2019/01/30/its-2019-and-wannacry-is-still-not-dead/</link>
        <pubDate>Wed, 30 Jan 2019 17:20:48 +0100</pubDate>
        
        <atom:modified>Wed, 30 Jan 2019 17:20:48 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/01/30/its-2019-and-wannacry-is-still-not-dead/</guid>
        <description>Unless you live completely cut off from the rest of human civilization, chances are good you&amp;rsquo;ve heard about the WannaCry ransomware. However, so we&amp;rsquo;re all on the same page, I&amp;rsquo;ll go over the salient points of its history before discussing why it is still a threat.
WannaCry - the first successful crypto-ransomware worm - started to spread on May 12th 2017 using the EternalBlue exploit and DoublePulsar backdoor implant (both courtesy of the Shadow Brokers and - by proxy - Equation Group/NSA) and supposedly hit more than 100 countries within the first 24 hours.</description>
        <content:encoded>&lt;p&gt;Unless you live completely cut off from the rest of human civilization, chances are good you&amp;rsquo;ve heard about the WannaCry ransomware. However, so we&amp;rsquo;re all on the same page, I&amp;rsquo;ll go over the salient points of its history before discussing why it is still a threat.&lt;/p&gt;
&lt;p&gt;WannaCry - the first successful crypto-ransomware worm - started to spread on May 12th 2017 using the EternalBlue exploit and DoublePulsar backdoor implant (both courtesy of the Shadow Brokers and - by proxy - Equation Group/NSA) and supposedly hit more than 100 countries within the first 24 hours. Although the speed of spreading was nowhere near the famous SQL Slammer/Saphire/Helkern or even CodeRed levels, it was still quite impressive.&lt;/p&gt;
&lt;p&gt;As it is usually the case when a new malware starts to succesfully spread, many researchers started analyzing samples of it. Among these researchers was also the controversial Markus Hutchins, who noticed that the malware used tried to query an at-that-time non-existant domain to decide if it should encrypt data and spread further when it infected any new computer.&lt;br /&gt;
Basically, it tried to connect to the &lt;em&gt;www[.]iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[.]com&lt;/em&gt; domain and if it succeeded, it didn&amp;rsquo;t encrypt any data nor did it spread further.&lt;/p&gt;
&lt;p&gt;If fact, except for connecting to this domain on reboot to make sure it was there, the ransomware didn&amp;rsquo;t do much of anything from that point onward. It is unknown why this functionality was implemented in WannaCry (although there are a lot of theories - the two most popular ones considers it either an anti-sandboxing mechanism, or an intentional killswitch to stop the infection should the attacker wish it). However when Hutchins noticed this behaviour, he registered this domain and &amp;ldquo;sinkholed&amp;rdquo; it, which pretty much stopped WannaCry from spreading&amp;hellip;until another version without this &amp;ldquo;killswitch&amp;rdquo; functionality was released, that is.&lt;/p&gt;
&lt;p&gt;Although the number of infected computers was in the hundreds of thousands at least (see the chart bellow - especially the situation in China seems to have been quite interesitng), the outbreak was more or less dealt with within few weeks. Computers spreading WannaCry were disinfected, admins who didn&amp;rsquo;t do so before patched the vulnerability used by EternalBlue exploit and pretty much everyone considered WannaCry dealt with.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2019/WannaCry-countries-time.png&#34; alt=&#34;WannaCry victims distribution&#34; /&gt;&lt;/p&gt;
&lt;div align=right&gt;&lt;kbd&gt;Source: [Bleeping Computer](https://www.bleepingcomputer.com/news/security/new-data-shows-most-wannacry-victims-are-from-china-not-russia/)&lt;/kbd&gt;&lt;/div&gt;
&lt;p&gt;That however seems to be very far from the true state of affairs. Jamie Hankins from KryptosLogic (company which currently takes care of the killswitch domain) published couple of interesting charts based on monitoring of the killswitch in December. As these charts and other information from Hankins show, quite a large number of computers still try to connect to the killswitch domain every day. From the first chart bellow, you may see that during working hours on weekdays, there are between 500,000 and 600,000 requests detected every 3 hours. This indicates that there are still at least tens of thousands of computers infected by the original version of WannaCry. This is both unexpected and quite scary.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2019/w_cry-requests.jpg&#34; alt=&#34;WannaCry killswitch requests&#34; /&gt;&lt;/p&gt;
&lt;div align=right&gt;&lt;kbd&gt;Source: [Jamie Hankins](https://twitter.com/2sec4u/status/1076151355759308800)&lt;/kbd&gt;&lt;/div&gt;
&lt;p&gt;Since the killswitch domain works as it should, the ransomware doesn&amp;rsquo;t do anything malicious at the moment. But should the domain go down or be unaccesible for some reason, WannaCry on the infected computers would &amp;ldquo;wake up&amp;rdquo; again and continue with its normal operations, which would undoubtedly cause major problems to all affected subjects.&lt;/p&gt;
&lt;p&gt;On the second chart bellow, you may see that most of the infected machines seem to be in Asia, however that doesn&amp;rsquo;t mean there are no infections still active in other regions.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://untrustednetwork.net/images/2019/w_cry-countries.jpg&#34; alt=&#34;WannaCry victims distribution 2018&#34; /&gt;&lt;/p&gt;
&lt;div align=right&gt;&lt;kbd&gt;Source: [Jamie Hankins](https://twitter.com/2sec4u/status/1076151355759308800)&lt;/kbd&gt;&lt;/div&gt;
&lt;p&gt;So this is where we are now - we know WannaCry is still with us and still presents a potential threat. What can we do? It&amp;rsquo;s actually fairly simple. If you don&amp;rsquo;t have any security devices monitoring DNS and web traffic in place, try going through DNS logs for your infrastructure and try to find any lookups for the WannaCry killswitch domain. You probably won&amp;rsquo;t, but it&amp;rsquo;s better to be safe then sorry.&lt;/p&gt;
&lt;p&gt;An if you still haven&amp;rsquo;t applied the &lt;a href=&#34;https://docs.microsoft.com/en-us/security-updates/securitybulletins/2017/ms17-010&#34;&gt;MS17-010&lt;/a&gt; update, well&amp;hellip; in such a case WannaCry might not be your biggest concern, but it&amp;rsquo;d still recommend you apply the patch. After all, it&amp;rsquo;s better to do so more than 18 months late than never.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Malware</category>
            
          
            
              <category>WannaCry</category>
            
          
            
              <category>Ransomware</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
      </item>
      
      <item>
        <title>Miscelaneous tools and links</title>
        <link>https://untrustednetwork.net/en/2019/01/08/miscelaneous-tools-and-links/</link>
        <pubDate>Tue, 08 Jan 2019 08:19:11 +0100</pubDate>
        
        <atom:modified>Tue, 08 Jan 2019 08:19:11 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2019/01/08/miscelaneous-tools-and-links/</guid>
        <description>I&amp;rsquo;ve added a new page to the site with links to miscelaneous tools and materials useful for Incident Response, Malware Analysis, Penetration Testing, etc. It may be accessed here or through the easily remembered URL http://csirt.xyz.</description>
        <content:encoded>&lt;p&gt;I&amp;rsquo;ve added a new page to the site with links to miscelaneous tools and materials useful for Incident Response, Malware Analysis, Penetration Testing, etc. It may be accessed &lt;a href=&#34;https://www.untrustednetwork.net/en/csirt/&#34;&gt;here&lt;/a&gt; or through the easily remembered URL &lt;a href=&#34;http://csirt.xyz&#34;&gt;http://csirt.xyz&lt;/a&gt;.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Tools</category>
            
          
            
              <category>Pentest</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2019</category>
            
          
        
        
      </item>
      
      <item>
        <title>It&#39;s alive (again) !</title>
        <link>https://untrustednetwork.net/en/2018/12/27/its-alive-again/</link>
        <pubDate>Thu, 27 Dec 2018 12:09:22 +0100</pubDate>
        
        <atom:modified>Thu, 27 Dec 2018 12:09:22 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2018/12/27/its-alive-again/</guid>
        <description>Untrusted Network is back! I&amp;rsquo;ve managed to salvage most of the posts from old version of the site so you may find links to those on the main page. So far that&amp;rsquo;s the only content but you may look forward to new posts in 2019!
In the mean time, to post at least something new for 2018, here you may find my presentation from this years DefCamp conference about interesting Open Directories which ALEF CSIRT found in the .</description>
        <content:encoded>&lt;p&gt;Untrusted Network is back! I&amp;rsquo;ve managed to salvage most of the posts from old version of the site so you may find links to those on the main page. So far that&amp;rsquo;s the only content but you may look forward to new posts in 2019!&lt;/p&gt;
&lt;p&gt;In the mean time, to post at least something new for 2018, &lt;a href=&#34;https://www.youtube.com/watch?v=NILZ_NkUnlc&amp;amp;t=26m07s&#34;&gt;here&lt;/a&gt; you may find my presentation from this years DefCamp conference about interesting Open Directories which ALEF CSIRT found in the .CZ and .SK ccTLDs.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>ALEF CSIRT</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2018</category>
            
          
        
        
      </item>
      
      <item>
        <title>ALEF Hacker Challenge</title>
        <link>https://untrustednetwork.net/en/2016/03/15/alef-hacker-challenge/</link>
        <pubDate>Tue, 15 Mar 2016 20:35:41 +0100</pubDate>
        
        <atom:modified>Tue, 15 Mar 2016 20:35:41 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2016/03/15/alef-hacker-challenge/</guid>
        <description>ALEF NULA (in the interest of full disclosure, I&amp;rsquo;d like to mention that I am currently employed by AN) launched a new competition called ALEF Hacker Challenge last week. The intended aim is to compromise a specific system and gather data from it. Although not unique, it is an interesting competition and not only because the main price is 12 000 CZK.</description>
        <content:encoded>&lt;p&gt;ALEF NULA (in the interest of full disclosure, I&amp;rsquo;d like to mention that I am currently employed by AN) launched a new competition called &lt;a href=&#34;https://www.alef.com/alefnula/alef-nula-hacker-challenge.c-209.html&#34;&gt;ALEF Hacker Challenge&lt;/a&gt; last week. The intended aim is to compromise a specific system and gather data from it. Although not unique, it is an interesting competition and not only because the main price is 12 000 CZK.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/AlefHC.png&#34; alt=&#34;ALEF Hacker Challenge&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>ALEF</category>
            
          
            
              <category>CTF</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2016</category>
            
          
        
        
      </item>
      
      <item>
        <title>Rowhammer - an attack which uses a weakness in DDR3 memory</title>
        <link>https://untrustednetwork.net/en/2015/03/10/rowhammer-an-attack-which-uses-a-weakness-in-ddr3-memory/</link>
        <pubDate>Tue, 10 Mar 2015 13:57:46 +0100</pubDate>
        
        <atom:modified>Tue, 10 Mar 2015 13:57:46 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2015/03/10/rowhammer-an-attack-which-uses-a-weakness-in-ddr3-memory/</guid>
        <description>Researchers from Google&amp;rsquo;s Project Zero have released information about a new attack based on flipping bits in DDR3 memory. The attack uses approach called Rowhammer which was devised last year by a team from Carnegie Mellon University and Intel Labs. It is based on repeated writing to and reading from a part of memory in a very short time which causes flipping values of bits in adjacent memory (the flipping is made possible by interaction between adjacent memory cells caused by their close proximity).</description>
        <content:encoded>&lt;p&gt;Researchers from Google&amp;rsquo;s Project Zero have released &lt;a href=&#34;http://googleprojectzero.blogspot.cz/2015/03/exploiting-dram-rowhammer-bug-to-gain.html&#34;&gt;information&lt;/a&gt; about a new attack based on flipping bits in DDR3 memory. The attack uses approach called Rowhammer which was &lt;a href=&#34;http://users.ece.cmu.edu/~yoonguk/papers/kim-isca14.pdf&#34;&gt;devised&lt;/a&gt; last year by a team from Carnegie Mellon University and Intel Labs. It is based on repeated writing to and reading from a part of memory in a very short time which causes flipping values of bits in adjacent memory (the flipping is made possible by interaction between adjacent memory cells caused by their close proximity).&lt;br /&gt;
Using the described principle, researchers from Project Zero created two exploits which they used to successfully elevate user privileges on a x86-64 Linux system where they achieved unrestricted access to the entire physical memory by flipping bits in page table entries (PTEs). In their announcement, they reported that the described approach was successfully used on machines with DDR3 memory without ECC (error correcting code). Flipping of bits has not been seen on machines with ECC memories. Source codes for the test program used to determine if a machine is vulnerable to Rowhammering have been released by the authors and may be found &lt;a href=&#34;https://github.com/google/rowhammer-test&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Rowhammer</category>
            
          
            
              <category>Vulnerability</category>
            
          
            
              <category>Project Zero</category>
            
          
            
              <category>Linux</category>
            
          
            
              <category>Hardware</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2015</category>
            
          
        
        
      </item>
      
      <item>
        <title>FREAK - a high impact vulnerability in TLS/SSL</title>
        <link>https://untrustednetwork.net/en/2015/03/04/freak-a-high-impact-vulnerability-in-tls/ssl/</link>
        <pubDate>Wed, 04 Mar 2015 10:06:49 +0100</pubDate>
        
        <atom:modified>Wed, 04 Mar 2015 10:06:49 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2015/03/04/freak-a-high-impact-vulnerability-in-tls/ssl/</guid>
        <description>An international research team has devised attack called FREAK (Factoring attack on RSA Export Keys) with which it is possible to lower the level of encryption used in SSL connections. Attack is based on forcing server and client to use legacy (the vulnerability has been present for a long time) weak cryptographic suites which are still supported by some of the mainstream browsers (Safari and OpenSSL-based Android browser among others) and servers.</description>
        <content:encoded>&lt;p&gt;An international research team has devised attack called &lt;a href=&#34;https://www.smacktls.com/#freak&#34;&gt;FREAK&lt;/a&gt; (Factoring attack on RSA Export Keys) with which it is possible to lower the level of encryption used in SSL connections. Attack is based on forcing server and client to use legacy (the vulnerability has been present for a long time) weak cryptographic suites which are still supported by some of the mainstream browsers (Safari and OpenSSL-based Android browser among others) and servers. After a key has been factored a man-in-the-middle attack may be launched by attacker against encrypted connection between a server and a browser. The aformentioned legacy cryptographic suites have been added to SSL implementations at a time when export regulations for cryptographic material were in effect in USA and only specific (weak) cryptographic suites were legally allowed to be exported. A link to a page containing further information about potentially vulnerable sites and a test for vulnerability on the client side may be found &lt;a href=&#34;https://freakattack.com/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>TLS/SSL</category>
            
          
            
              <category>Cryptography</category>
            
          
            
              <category>Vulnerability</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2015</category>
            
          
        
        
      </item>
      

    
  </channel>
</rss>