Many users choose weak passwords.
There are several reasons why there are so many brute force attempts over SSH on the internet:
- SSH is a popular protocol: SSH is a widely used protocol for remote access to servers and networked devices, and it is often used to manage critical systems. This popularity makes SSH a prime target for attackers who are looking to gain unauthorized access.
- Default configurations: Many SSH servers are configured with default settings, including default usernames and passwords. Attackers can use automated tools to scan for servers with these default configurations and then launch brute force attacks to try and gain access.
- Weak passwords: Many users choose weak passwords that are easy to guess, such as "password" or "123456". Attackers can use automated tools to launch brute force attacks that try thousands of password combinations in a short amount of time.
- Botnets: Some attackers use botnets, which are networks of compromised computers, to launch large-scale brute force attacks on SSH servers. These attacks can be difficult to defend against because they come from many different IP addresses and can overwhelm a server with traffic.
To protect against brute force attacks, it is important to use strong passwords or passphrase, disable default login credentials, implement rate limiting for login attempts, use multi-factor authentication and consider using a VPN for remote access instead of exposing SSH ports to the internet.