{"id":5333,"date":"2016-04-05T20:47:48","date_gmt":"2016-04-05T19:47:48","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5333"},"modified":"2024-05-16T19:08:46","modified_gmt":"2024-05-16T18:08:46","slug":"network-probes-and-scans-the-silent-assassin-of-network-security","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/network-probes-and-scans-the-silent-assassin-of-network-security","title":{"rendered":"Network probes &#8211; the silent assassins of cyber crime"},"content":{"rendered":"<p>Pretty much any MSP or IT professional that manages large networks will tell you that their networks have been probed at some point or another.<\/p>\n<p>Although technically network probes are not intrusions themselves, they shouldn\u2019t be ignored as they can easily lead to actual intrusions and infections.<\/p>\n<p>So what are they and where do they come from?<\/p>\n<p>It all boils down to the fact that there are known (and sometime not that well known) vulnerabilities in software and hardware that hackers have discovered. Network probes are a result of the pieces of software these hackers have written searching out vulnerabilities to exploit on your network.<\/p>\n<h2>The phases of attack from\u00a0network probes<\/h2>\n<p>There are two phases of a network probe-based attack. First, the malware will scan your network, either using a port scan or a ping sweep. If it locates a vulnerable device it will infect that device with the malware.<img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"size-medium wp-image-6292 alignleft\" title=\"\" src=\"\/wp-content\/uploads\/blog\/maxiq\/2016\/04\/attack-350x173.jpg\" alt=\"attack\" width=\"350\" height=\"173\" align=\"left\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/><\/p>\n<p>Second, once installed, the host device becomes part of the infection matrix as on top of allowing the bad guys into that network as and when they chose, the malware will also then scan for other vulnerable devices on the Internet. And so the process goes as the malware copies itself from machine to machine and the infection spreads.<\/p>\n<p>One common misconception is that with the hundreds and thousands of different devices attached to the Internet and the billions of people using it, the chances of getting infected in this way would be fairly remote.<\/p>\n<h2>Spreading the infection<\/h2>\n<p>However, a story from last year proves just how easily this can happen if you let your guard down. In this instance a\u00a0<a class=\"ext\" href=\"https:\/\/www.theguardian.com\/technology\/2015\/mar\/03\/phishing-scam-targets-routers-that-use-default-security-settings\" target=\"_blank\" rel=\"noopener noreferrer\">Brazilian ISP supplied routers<\/a>\u00a0to its customers with a common vulnerability \u2013 generic router login details such as \u2018admin\u2019.<img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"size-medium wp-image-6293 alignright\" title=\"\" src=\"\/wp-content\/uploads\/blog\/maxiq\/2016\/04\/infection-350x173.jpg\" alt=\"infection\" width=\"350\" height=\"173\" align=\"right\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/><\/p>\n<p>With tens of thousands of customers all with the same hardware or basic models of the same hardware, this presented a treasure trove of opportunity for the bad guys to get in. Furthermore, with all potential victims being from the same ISP, the malware in this particular case was able to spread quickly as it was able to scan merely a subset of the Internet where it knew \u2013 or was at least fairly certain \u2013 it would find what it was looking for.<\/p>\n<p>Of course, once an infection has taken place, all sorts of activity can happen on the target networks as unrestricted access can now easily be gained by the bad guys. But network probes is how it all begins.<\/p>\n<h2>Making sure you\u2019re protected<\/h2>\n<p>This is largely an automated attack with infected systems reaching out to find other vulnerable systems. It can also be difficult to detect. The Brazilian ISP is a useful case study as this could happen to any ISP because the routers provided at commercial level more often than not don\u2019t have a lot of robust features or don\u2019t undergo solid vulnerability and Q&amp;A assessments.<\/p>\n<p>On top of this, the ISP would usually be responsible for this piece of hardware, and patching and updating that as required. In a lot of cases these attacks continue until the supplier discovers that there is a problem, and they then face a huge expense patching and updating the machines in their infrastructure.<\/p>\n<p>So what should your mitigation strategy be?<\/p>\n<p>One of the biggest lessons here is not to rely on the infrastructure that is provided to you. In the case of ISPs, put in your own firewall or router to control access to your network. This can be tough for small and medium businesses but relying on hardware supplied by smaller ISPs, for example, could leave you way too open to attack.<\/p>\n<p><strong>To find out more about how to defend against this type of attack and to know what tools you need to protect your networks\u00a0by\u00a0<a class=\"ext\" href=\"http:\/\/pages.logicnow.com\/Cyber-Threat-Guide_Gen-LP.html?_ga=1.189722408.2060008530.1448977820\" target=\"_blank\" rel=\"noopener noreferrer\">downloading our free Cyber Threat Guide<\/a>.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Network probes can happen frequently. While they don&#8217;t always lead to an attack they should always be taken seriously. Learn more with this post.<\/p>\n","protected":false},"author":63,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5333","post","type-post","status-publish","format-standard","hentry","topic-msp-business"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Network probes - the silent assassins of cyber crime - N-able<\/title>\n<meta name=\"description\" content=\"Network probes can happen frequently. While they don&#039;t always lead to an attack they should always be taken seriously. Learn more with this post.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/network-probes-and-scans-the-silent-assassin-of-network-security\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Network probes - the silent assassins of cyber crime - N-able\" \/>\n<meta property=\"og:description\" content=\"Network probes can happen frequently. While they don&#039;t always lead to an attack they should always be taken seriously. Learn more with this post.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/network-probes-and-scans-the-silent-assassin-of-network-security\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-05T19:47:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-16T18:08:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pete Roythorne\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pete Roythorne\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"4\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/network-probes-and-scans-the-silent-assassin-of-network-security#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/network-probes-and-scans-the-silent-assassin-of-network-security\"},\"author\":{\"name\":\"Pete Roythorne\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/d6ca231a620b3d6123d2775901a88837\"},\"headline\":\"Network probes &#8211; the silent assassins of cyber crime\",\"datePublished\":\"2016-04-05T20:47:48+01:00\",\"dateModified\":\"2024-05-16T18:08:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/network-probes-and-scans-the-silent-assassin-of-network-security\"},\"wordCount\":648,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"MSP Business\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/network-probes-and-scans-the-silent-assassin-of-network-security\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/network-probes-and-scans-the-silent-assassin-of-network-security\",\"name\":\"Network probes - the silent assassins of cyber crime - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2016-04-05T20:47:48+01:00\",\"dateModified\":\"2024-05-16T18:08:46+00:00\",\"description\":\"Network probes can happen frequently. While they don't always lead to an attack they should always be taken seriously. Learn more with this post.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/network-probes-and-scans-the-silent-assassin-of-network-security#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/network-probes-and-scans-the-silent-assassin-of-network-security\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/network-probes-and-scans-the-silent-assassin-of-network-security#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"MSP Business\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/msp-business\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Network probes &#8211; the silent assassins of cyber crime\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/d6ca231a620b3d6123d2775901a88837\",\"name\":\"Pete Roythorne\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g\",\"caption\":\"Pete Roythorne\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Network probes - the silent assassins of cyber crime - N-able","description":"Network probes can happen frequently. While they don't always lead to an attack they should always be taken seriously. Learn more with this post.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/network-probes-and-scans-the-silent-assassin-of-network-security","og_locale":"de_DE","og_type":"article","og_title":"Network probes - the silent assassins of cyber crime - N-able","og_description":"Network probes can happen frequently. While they don't always lead to an attack they should always be taken seriously. Learn more with this post.","og_url":"https:\/\/www.n-able.com\/de\/blog\/network-probes-and-scans-the-silent-assassin-of-network-security","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2016-04-05T19:47:48+00:00","article_modified_time":"2024-05-16T18:08:46+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"Pete Roythorne","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"Pete Roythorne","Gesch\u00e4tzte Lesezeit":"4\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/network-probes-and-scans-the-silent-assassin-of-network-security#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/network-probes-and-scans-the-silent-assassin-of-network-security"},"author":{"name":"Pete Roythorne","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/d6ca231a620b3d6123d2775901a88837"},"headline":"Network probes &#8211; the silent assassins of cyber crime","datePublished":"2016-04-05T20:47:48+01:00","dateModified":"2024-05-16T18:08:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/network-probes-and-scans-the-silent-assassin-of-network-security"},"wordCount":648,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["MSP Business"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/network-probes-and-scans-the-silent-assassin-of-network-security","url":"https:\/\/www.n-able.com\/de\/blog\/network-probes-and-scans-the-silent-assassin-of-network-security","name":"Network probes - the silent assassins of cyber crime - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2016-04-05T20:47:48+01:00","dateModified":"2024-05-16T18:08:46+00:00","description":"Network probes can happen frequently. While they don't always lead to an attack they should always be taken seriously. Learn more with this post.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/network-probes-and-scans-the-silent-assassin-of-network-security#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/network-probes-and-scans-the-silent-assassin-of-network-security"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/network-probes-and-scans-the-silent-assassin-of-network-security#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"MSP Business","item":"https:\/\/www.n-able.com\/de\/blog\/category\/msp-business"},{"@type":"ListItem","position":2,"name":"Network probes &#8211; the silent assassins of cyber crime"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/d6ca231a620b3d6123d2775901a88837","name":"Pete Roythorne","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g","caption":"Pete Roythorne"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/5333","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/63"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=5333"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/5333\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=5333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}