Regional Threat Perspectives: Australia
ATT&CK techniques detected
T1190Exploit Public-Facing Application
94%
"the leaked nsa / cia exploit in 2017 ; and http port 80, the web traffic standard. these targeted ports indicate run - of - the - mill attacks looking for access to web applications. figure 8 : top 20 attacked ports and services conclusion organizations should continually run ext…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1071.001Web Protocols
54%
"regional threat perspectives : australia f5 labs, in conjunction with our partner baffin bay networks, researched attacks by geographic region to get a better understanding of the threat landscape region to region. we sought to understand if the global attack landscape was consis…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1584.005Botnet
46%
"were seen consistently attacking systems across the entire world. the following 19 networks exclusively targeted australian systems, most of which were hosting companies : figure 5 : networks targeting australian systems not seen targeting other regions top attacking ip addresses…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1584.008Network Devices
32%
"lists globally. figure 3 : top 25 attacking asns by attack count the table in figure 4 shows the top 50 asns attacking australia from dec 1, 2018 to march 1, 2019 in order of highest to lowest number of attacks. interestingly, these top 50 networks were split fifty - fifty betwee…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Attackers using IP addresses in China, the United States, and the Netherlands focus on attacking applications over SSH, SMB and HTTP.