SSH Brute Force
SSH brute force remains the most prevalent attack vector on the internet. Automated tools like Hydra and Medusa attempt thousands of username and password combinations against SSH servers on port 22. Attackers use botnets of compromised machines to distribute attempts and evade rate limiting. A successful compromise often leads to cryptocurrency mining, botnet recruitment, or ransomware deployment.
Malware Distribution and Hosting
Malware hosting involves servers that distribute malicious payloads including trojans, information stealers, and ransomware. These servers host files that victims download via phishing emails, drive-by downloads, or watering hole attacks. Threat actors rotate hosting infrastructure rapidly, using bulletproof hosting providers and compromised legitimate servers to stay ahead of takedown efforts.
Botnet Command and Control
Botnet C2 (command and control) servers coordinate networks of compromised devices. These servers issue commands to infected machines, exfiltrate stolen data, and orchestrate distributed attacks. Modern botnets use encrypted communications, domain generation algorithms (DGA), and peer-to-peer protocols to resist takedown. Detecting C2 traffic is critical for identifying compromised systems in your network.
Port Scanning and Reconnaissance
Port scanning is the reconnaissance phase of most attacks. Tools like masscan and ZMap can scan the entire IPv4 address space in minutes, identifying hosts with open services such as SSH (22), HTTP (80/443), RDP (3389), and database ports. This reconnaissance data is then used to target vulnerable services with exploits or credential attacks. While not directly harmful, port scanning is a reliable predictor of imminent attacks.
Web Application Attacks
Web application attacks include SQL injection, cross-site scripting (XSS), directory traversal, and brute force attacks against login forms. Automated scanners probe web applications for known vulnerabilities in content management systems, frameworks, and custom applications. These attacks are often the first step toward data breaches, defacement, or server compromise.