security

UniFi Threat Landscape Report: January 2025

Monthly analysis of threats targeting UniFi networks including SSH brute force trends, IoT botnet activity, DNS tunneling patterns, and actionable recommendations.

SNT

Sentinel Nerd Team

#threat-intelligence #monthly-report #trends

Every month, we analyze anonymized threat data from Sentinel Nerd deployments to identify trends, emerging threats, and actionable recommendations for UniFi administrators. This is our January 2025 report.

Note: All data is aggregated and anonymized. No individual customer data is exposed. Participation in threat intelligence sharing is opt-in.

Executive Summary

January 2025 saw a significant uptick in credential-based attacks across UniFi networks. SSH brute force attempts increased 34% month-over-month, driven primarily by a new botnet variant targeting consumer and small-business routers. IoT-focused attacks also rose, with a 22% increase in attempts to compromise smart home devices on poorly segmented networks.

The good news: organizations using network segmentation and automated response saw 89% fewer successful compromises compared to flat networks with manual monitoring.

Key numbers:

  • 12.4 million security events analyzed
  • 847,000 alerts generated across all deployments
  • 34% increase in SSH brute force attempts
  • 22% increase in IoT-targeted attacks
  • 3 notable CVEs affecting UniFi environments

Top Threats

1. SSH Brute Force Attacks

SSH brute force remained the #1 threat by volume for the sixth consecutive month. What changed in January:

  • New credential lists — Attackers are using updated wordlists that include credentials leaked in recent breaches
  • Distributed sources — Attacks now originate from 5-10 IPs simultaneously to evade rate limiting
  • Slower pace — Instead of rapid-fire attempts, many attackers space login attempts 30-60 seconds apart to avoid traditional detection

Top source countries: China (28%), Russia (19%), Brazil (12%), Vietnam (8%), India (7%)

Recommendation: Enable SSH key-only authentication, disable password login, and create a Sentinel Nerd detection rule with a lower threshold for distributed attempts:

id: distributed-ssh-brute-force
name: Distributed SSH Brute Force
description: Detects SSH failures from multiple sources to the same target
severity: high
category: credential-attack
enabled: true

conditions:
  - field: event.type
    operator: equals
    value: ssh_login_failed

aggregation:
  group_by: destination_ip
  distinct_count: source_ip
  threshold: 5
  window: 15m

actions:
  - alert
  - tag: distributed-brute-force

2. IoT Botnet Activity

We observed a 22% increase in traffic associated with known IoT botnets, particularly:

  • Mirai variants — Scanning for default credentials on IoT devices (port 23, 2323)
  • Mozi — Targeting DHT protocol on IoT devices
  • InfectedSlurs — A newer botnet exploiting NVR and router vulnerabilities

IoT devices on flat networks (no VLAN segmentation) were 6x more likely to show signs of compromise.

Recommendation: Isolate IoT devices on a dedicated VLAN with internet-only access. Block all inbound connections from the internet to IoT VLANs. Monitor for unusual outbound traffic patterns.

3. DNS Tunneling

DNS tunneling attempts increased 18% in January. Attackers use DNS queries to exfiltrate data or establish command-and-control channels, bypassing traditional firewall rules since DNS traffic is typically allowed.

Indicators we track:

  • DNS queries with unusually long subdomain labels (50+ characters)
  • High volume of DNS queries to a single domain from one host
  • TXT record queries with encoded payloads
  • NXDOMAIN response spikes from single hosts

Recommendation: Monitor DNS query patterns with Sentinel Nerd. Flag hosts generating more than 100 DNS queries per minute or queries with encoded-looking subdomains.

Attack Source Distribution

Country% of Attack TrafficChange from Dec
China24%+3%
United States18%-1%
Russia14%+2%
Brazil9%+4%
Vietnam7%+1%
India6%0%
Indonesia5%+2%
Other17%-11%

Notable: Brazil moved up to 4th place with a significant increase in attack traffic, primarily driven by compromised IoT devices being recruited into botnets.

Target Distribution

Most attacks targeted:

  1. SSH services (port 22) — 38% of all attack traffic
  2. Web services (ports 80/443) — 24%
  3. IoT protocols (ports 23, 2323, 8080) — 15%
  4. RDP (port 3389) — 12%
  5. SIP/VoIP (port 5060) — 6%
  6. Other — 5%

Daily attack events per deployment (median):

  • January 2025: 1,847 events/day
  • December 2024: 1,502 events/day
  • November 2024: 1,389 events/day

The upward trend reflects both increasing attack activity and improved detection coverage in Sentinel Nerd v2.0’s new detection engine.

Alert-to-event ratio: 6.8% of events generated alerts (up from 5.2% in December), indicating better signal extraction from our updated rule set.

Notable CVEs

Three CVEs from January are particularly relevant for UniFi environments:

CVE-2025-0282 — Ivanti Connect Secure

While not a UniFi vulnerability, many organizations run Ivanti VPN alongside UniFi infrastructure. This critical RCE vulnerability was actively exploited in the wild. If you use Ivanti, patch immediately and monitor for indicators of compromise.

CVE-2025-0411 — 7-Zip Mark of the Web Bypass

This vulnerability allows attackers to bypass Windows security warnings on extracted files. Relevant for organizations using UniFi in Windows-heavy environments. Ensure 7-Zip is updated to version 24.09+.

CVE-2024-45200 — UniFi Network Application

A medium-severity CSRF vulnerability in UniFi Network Application versions prior to 8.6.2. Action: Update your UniFi Network Application to the latest version. Sentinel Nerd monitors controller versions and will alert you if you’re running a vulnerable version.

Recommendations

Based on January’s threat data, we recommend:

  1. Review SSH access — Disable password authentication, use key-only login, and limit SSH access to management VLAN
  2. Segment IoT devices — If you haven’t already, create a dedicated IoT VLAN with restricted access
  3. Monitor DNS patterns — Enable DNS query logging and set up detection rules for tunneling indicators
  4. Update firmware — Ensure all UniFi devices are on the latest firmware. Check controller version for CVE-2024-45200
  5. Review firewall rules — Audit your rules quarterly. Remove any rules that are too permissive
  6. Enable Active Response — For SSH brute force, automated blocking significantly reduces exposure
  7. Check your backups — Verify controller backups are current. Test a restore procedure

Methodology

This report is based on anonymized, aggregated data from Sentinel Nerd deployments that have opted into threat intelligence sharing. We analyze:

  • Syslog data from UniFi Network controllers
  • IDS/IPS alert metadata
  • Threat intelligence enrichment from AbuseIPDB and VirusTotal
  • Network flow data (metadata only, not payload content)

Individual deployment data is never shared or identifiable. All analysis is performed on aggregated statistics.


The February 2025 threat landscape report will be published in early March. To ensure your network is represented in our data (and to benefit from our collective threat intelligence), enable threat sharing in Settings > Privacy > Threat Intelligence Sharing.

Questions about this report? Contact us at research@sentinelnerd.com.

Share this article

Related Articles

Ready to secure your UniFi network?

Start your free 14-day trial today. No credit card required.

Start Free Trial