News

Top 4 FTP Exploits Used Hackers and the Solutions

自定义模板 (68)

Enterprises rely on safe and reliable information access methods to meet today's rapidly developing market demand. Accordingly, sharing data internally and externally is essential for any organization.

File Transfer Protocol FTP is one of the earliest and still used data sharing methods. Although IT teams and business users are familiar with this, FTP lacks much vital security, compliance, and workflow requirements in modern organizations, especially in data security.

The following are four different FTP vulnerabilities attacked by hackers:

1. Anonymous authentication

Anonymous authentication is an FTP vulnerability, which allows users to use FTP username or log in anonymously. In many cases, users will provide their email address as a password. However, the user's login credentials (username and password) and the commands used are unencrypted, visible, and easy to access. At the same time, any data sent via FTP or hosted on an anonymous FTP server will not be protected. Once, the FBI found that hackers actively used FTP to target medical and dental industries and access protected health information.

2. Directory traversal attack

Directory traversal attack is another FTP vulnerability, and its successful attack will overwrite or create unauthorized files, which are stored outside the Webroot folder. In turn, the original FTP owner is subject to the permission of files or directories and the control of hackers.

3. Cross-site scripting

When attackers use Web applications to send malicious code, XSS attacks are usually sent to end-users in the form of browser-side scripts. Defects that allow attacks to succeed are very common and may occur anywhere where user input is used without verification or coding in the output generated by Web applications.

Attackers can use XXS to send malicious scripts to unsuspecting users. The end user's browser cannot know that the script is not trusted and execute the script. Because the malicious script thinks that the script comes from a trusted source, it can access any data, session token, or other sensitive information stored on the user's local terminal that is reserved by the browser and used with the site.

4. Malware attack based on Dridex

It was discovered for the first time in 2014 that Dridex malware has been re-invented and introduced in unexpected ways after the UK became the target of bank attacks. Internet users targeted by Dridex malware will open Word or Excel email attachments, which will cause macros to download the malware and infect computers, thus exposing users to bank theft. In the latest version of Dridex malware, hackers use FTP sites and credentials to avoid being detected by e-mail gateway and network policy of trusted FTP. Updating FTP credentials regularly can help prevent Dridex-based attacks.

As far as the FTP server itself is concerned, it can no longer meet the system functions required by the big data business in the information age. From the point of view of security, transfer efficiency, and compliance, the FTP server itself cannot be expanded and it is very likely to bring high-cost loss. In the big data market, big file transfer (MFT) software came into being and was promised to meet the above business requirements.

Large file transfer technology provides higher control and security than FTP, which usually has the following features:

  • In-depth report (e.g., notification of completion of file transfer)

  • The global visibility of all data transfer activities

  • End-to-end security, encrypting data in transit and at rest

  • Performance indicators, monitoring, and support for compliance requirements

  • Workflow automation

Raysync- large file transfer software

High performance

Raysync high-speed transfer protocol, the bandwidth utilization rate is over 96%, the transfer rate is increased by 100X, and TB-level large files and massive small files are easily transmitted.

High security

TLS+AES-356 encryption technology and built-in multiple firewalls make the enterprise data security network impenetrable.

Highly available

Support mainstream servers and desktop operating systems, support various storage devices and cloud service models and maintain high integration with enterprise business systems.

Low cost

Pay as you go: Effectively meet the needs of low-frequency large file transfer and eliminate resource waste;

Pro: GB, TB, PB global high-speed circulation, no need to wait, small and medium-sized team's selected transfer software;

Enterprise: 4-layer load balancing, multi-server, and database fast docking, unlimited users enjoy high-speed transfer;

Strict control

Global central control, transfer log live monitoring data information, enterprise core business data visible, controllable, and traceable.

Fast deployment

Quick access to WEB browser, it takes 30 seconds to complete client deployment, no need to set, installation can be used.

As the head brand of enterprise-level large file transfer, Raysync has provided high-performance, stable, and secure data transfer services for 2W+ enterprises in IT, finance, film and television, biological genes, manufacturing, and many other fields. In some cases, a large file transfer platform can be used together with FTP in the process of transition to safer and more effective information flow (such as Raysync FTP acceleration).

Previous:What is File Transfer Service?

Next:How to Preserve Office Security When Staff Leave?

Key Words

Big data transferFile synchronization softwarefile syncFile transfer softwareOversized file transferTransfer solutionTransfer toolTransfer file via emailFile transfer serverFile transfer servicesManaged File TransferFast File Transferpoint to point transferData ManagementaesFile sharingftpssftpmftshared fileSend Large Filesfile transfer protocolSecure file transfersmall file transfersynchronous transmissiondata syncfile transfervideo transmissionlong distance transmissionftpfile transfercross-border data transmissiontransfer filesmedia industrytransmission systemTLStransfer softwarenetwork diskteletransmissiontransmit dataTransnational transmissionCross border file transferFile transfer solutionraysync cloudLarge file transfer solutionraysyncraysync SoftwareLarge file transferFile management systemLarge file transferfile transferraysync cloudraysync transmissiondata transmissionLDAPADHTTPtcpHigh speed transmissionRemote large file transferTransnational file transferAccelerated transmissionFile share transferfile dataTransfer large filesCross border transmissionFile sharingData transmission softwareLarge file transfer softwareEnterprise file transfer softwareHigh speed data transmissionFile synchronous transferFTP transmissionTransnational transmissionHigh AvailabilityTransmission encryptionHigh speed transmission protocolasperaHigh speed transmissionBreakpoint renewalsocks5CachenetworkSecure transmissionCloud storagesaasEnterprise Network DiskOperational toolscloud computingFile management Foreign tradeData exchangeTelecommutingHigh-speed transmissionSD-WANHigh-speed file transferFile synchronization