Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


06:45 PM

Network Data Shows Spikes, Vulnerability of Work-at-Home Shift

Traffic on the public Internet has grown by half this year, and videoconferencing bandwidth has grown by a factor of five, all driven by remote-work edicts.

As social-distancing mandates forced employees to work from home, bandwidth consumption and potential security weaknesses have risen, according to data from network providers and network-intelligence firms. 

Traffic on the public Internet jumped by half since the beginning of the year, as employees moved to remote work, with videoconferencing seeing the greatest increase — 500% — according to Kentik, a provider of machine-learning-based network operations. Overall, the week-to-week growth in bandwidth consumption matched the month-to-month growth seen last year, says Avi Freedman, co-founder and CEO of Kentik.

Total Destination Traffic for US Index (click to enlarge)

Total Destination Traffic for US Videoconferencing Index (click to enlarge)

Network providers, in general, have handled the spikes in bandwidth consumption well, he says. 

"Across broadband and transit networks, the first surges in growth this year were generally handled by existing overprovisioned capacity," Freedman says. "It has put a lot of networks into accelerated growth mode, which has also meant the usual kind of 'micro outages' but accelerated into a compressed time frame. However, it hasn't caused [many] large-scale or sustained outages."

Yet there are signs that the move to remote work caught many companies by surprise, leaving them with weaknesses in their infrastructure. 

Data from the end of March collected by port-scanning service Shodan suggested that the number of systems exposing the remote desktop protocol (RDP) had increased in the past month and continued a general two-year trend of increased exposure.

At the same time, the number of Internet source scanning for the most common RDP port, 3389, jumped by 40% in March, according to the SANS Institute.

Overall, companies are finding that they are living their disaster plans, says Kentik's Freedman. If they had a good disaster plan, they are doing well. If not, they are having problems transitioning.

Companies "are focusing on helping and holding their organizations together, but across 30-plus customers I’ve talked to recently, almost all of them already had substantial remote [work provisions]," he says. "So even though they've had to go from 'situation usual,' some systems were already in place — or at least described — and able to assist in reacting quickly to new work habits."

Peak Movement
Comcast, the operator of the largest residential Internet network in the United States, has seen peak Internet traffic
increase by 32% — 60% in some markets — along with a 24% increase in mobile data usage, according to the company. In addition, while 9 p.m. local time was the peak download time across residential markets, now 7:30 p.m. is the peak time, perhaps reflecting a lack of commute time before workers sit down to relax. More interestingly, the peak upload time has shifted from 9 p.m. to during work hours, although the exact time differs.

Comcast also saw virtual private network (VPN) traffic jump 40% and videoconferencing traffic rise 212% since March 1. 

"We are seeing an unprecedented shift in network usage, but it's within the capability of our network," the company states on a page dedicated to its response to the shift, adding that "while the COVID-19 experience is new and unprecedented, the internet ecosystem is flexible and performing the way it was designed."

Remote Work Causes Initial Rise in Exposed Desktops
To keep business going and employees working, many companies exposed desktops to the Internet for direct connection. A common, but often insecure, protocol for accomplishing this is RDP. 

Scanning service Shodan saw an increase in exposed RDP ports — both the standard 3389 and an alternate 3388 — from January to February.

More attackers focused on the protocol as well, according to data from the SANS Institute. The group saw an approximate 40% increase in the number of RDP sources.

"This is attackers expecting to find more vulnerable RDP servers, so they are scanning more," says Johannes Ullrich, dean of researcher at the SANS Technology Institute. "There is not a huge shift, but that increase is there."

Uneven Impact
The work-at-home mandate has also exposed the inequities in broadband access for rural and urban communities. Nearly a quarter of households do not have a broadband connection, which includes more than 4 million schoolchildren, according to consumer-focused publication Consumer Report.

Overall, providers see few major hurdles for network stability in the future, but the uneven distribution of high-speed Internet is apparent in the network data as well, Kentik's Freedman says.

"We're starting to see unequal effects of the COVID-19 situation on health and outcomes, but while things are going OK for the 'already connected,' there is some concern about what might happen if remote education is the default for the fall," he says. "There are already communities where organizations are opening Wi-Fi because there is insufficient quality of reach of broadband — for rural areas as well as more urban neighborhoods."

Related Content:

A listing of free products and services compiled for Dark Reading by Omdia analysts to help meet the challenges of COVID-19. 

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's featured story: "When All Behavior is Abnormal, How Do We Detect Anomalies?"

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Mobile App Fraud Jumped in Q1 as Attackers Pivot from Browsers
Jai Vijayan, Contributing Writer,  7/10/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-10
Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authenticati...
PUBLISHED: 2020-07-10
In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director's memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in...
PUBLISHED: 2020-07-10
Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to...
PUBLISHED: 2020-07-10
osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables l...
PUBLISHED: 2020-07-10
An exploitable SQL injection vulnerability exists in the Admin Reports functionality of Glacies IceHRM v26.6.0.OS (Commit bb274de1751ffb9d09482fd2538f9950a94c510a) . A specially crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerabi...