When Attackers Have Better OpSec Than You (The Death of HTTP)
- Patrick Duggan
- Nov 23, 2025
- 9 min read
Why Supporting "Legacy Protocols" Is Pure Technical Debt
MINNEAPOLIS, November 23, 2025 — Yesterday, we published data from our SSL/TLS honeypot showing that professional attackers use legitimate HTTPS certificates. Today, we dug deeper into the 560 SSL-enriched attacker IPs to answer a simple question:
If we still support HTTP for "backwards compatibility," who exactly are we being compatible with?
The answer is brutal: Nobody. Not even the criminals.
The Setup: Intentional Vulnerability
• Port 443 (HTTPS) availability
• Port 80 (HTTP) server headers
• SSL certificate data (issuer, subject, SANs, expiration)
• Technology stack (nginx, Apache, IIS, etc)
• Self-signed vs legitimate CA detection
• Amateur attackers using HTTP-only (insecure, lazy)
• Professional attackers using HTTPS (OpSec-aware)
• Maybe a mix of both protocols (hedging bets)
What we actually found destroyed the backwards compatibility argument entirely.
The Data: 98.6% Background Radiation
Out of 560 SSL-enriched IPs:
| Category | Count | Percentage | |----------|-------|------------| | Background radiation (no web services) | 552 | 98.6% | | HTTPS-only attackers | 8 | 1.4% | | HTTP-only attackers | 0 | 0.0% | | Both HTTP + HTTPS | 0 | 0.0% |
Let that sink in.
Zero attackers use HTTP. Zero attackers support both protocols. 100% of web-based attacks are HTTPS-only.
What Is "Background Radiation"?
The 552 IPs (98.6%) that don't run web services are what we call background radiation: automated scans that hit EVERY outward-facing IP on the internet indiscriminately.
Geographic Distribution (Top 10 Countries):
| Country | IPs | Percentage | |---------|-----|------------| | United States | 315 | 57.1% | | Belgium | 37 | 6.7% | | Taiwan | 36 | 6.5% | | Brazil | 35 | 6.3% | | Netherlands | 29 | 5.3% | | Germany | 21 | 3.8% | | Canada | 15 | 2.7% | | Singapore | 9 | 1.6% | | Japan | 7 | 1.3% | | United Kingdom | 7 | 1.3% |
Infrastructure Analysis:
• 94.0% are Data Center/Web Hosting/Transit infrastructure
• 5.4% are Fixed Line ISPs (residential connections)
• 44.7% identified as cloud providers (AWS, Azure, Google Cloud)
• 23.9% have critical abuse scores (90-100)
• 67.8% have LOW abuse scores (but multi-source confirmed threats)
What They're Doing:
• Port scanners (T1595.001 - Active Scanning)
• SSH brute-forcers (T1110 - Brute Force)
• Credential stuffers (not via HTTP/HTTPS)
• Reconnaissance bots (T1595 - Active Scanning)
• Network mappers
The Key Insight:
Dropping HTTP support = ZERO impact on 98.6% of threats. They don't use web protocols AT ALL.
The 1.4% That Actually Run Web Services
8 IPs total. Every single one is HTTPS-only with a legitimate CA certificate.
The Professional Attacker Infrastructure
| IP | Country | ISP | Certificate | Issuer | Self-Signed? | |----|---------|-----|-------------|--------|--------------| | 103.250.186.160 | India | LEAPSWITCH | interesting-dubinsky.103-250-186-160.plesk.page | Let's Encrypt R12 | No | | 139.59.224.88 | Singapore | DigitalOcean | ampmhub.com | Let's Encrypt R13 | No | | 139.59.72.212 | India | DigitalOcean | agni.techril.com | Let's Encrypt R13 | No | | 152.42.200.79 | Singapore | DigitalOcean | mypanelprnew.punyagwituiniwaduh.my.id | Let's Encrypt R12 | No | | 45.148.10.242 | Netherlands | TECHOFF SRV | republic.wales | Let's Encrypt R13 | No | | 47.237.23.32 | Singapore | Alibaba Cloud | fantsumer.ufficievaila.com | DigiCert | No | | 93.123.109.7 | Netherlands | TECHOFF_SRV | fervent-euler.93-123-109-7.plesk.page | Let's Encrypt R11 | No | | 95.111.250.103 | France | Contabo | biosalud.milab.app | Let's Encrypt R12 | No |
Certificate Statistics:
• 100% use legitimate CA certificates
• 0% use self-signed certificates
• 87.5% use Let's Encrypt (automated HTTPS)
• 12.5% use DigiCert (professional CA)
• 0% have expired certificates
Cloud Provider Breakdown:
• DigitalOcean: 3 IPs (37.5%)
• Alibaba Cloud: 1 IP (12.5%)
• Contabo: 1 IP (12.5%)
• Other VPS providers: 3 IPs (37.5%)
• AWS/Google/Azure: 0 IPs (0.0%)
What This Tells Us
1. Professional attackers avoid hyperscalers
• Setup is faster
• Abuse detection is weaker
• Cost is lower
• HTTPS is the default (Let's Encrypt built-in)
2. HTTPS automation is trivial
• Certificate issuance is fully automated
• Renewal happens automatically
• Zero cost to the attacker
• Using HTTPS is EASIER than maintaining HTTP
3. OpSec is standard, not exceptional
• Has a legitimate HTTPS certificate
• Uses modern encryption
• Runs professional hosting infrastructure
• Doesn't bother with HTTP support
These aren't sophisticated APT groups. These are credential phishers, C&C panels, and automated scanners. If baseline criminals have abandoned HTTP, what excuse does your enterprise have?
The Backwards Compatibility Argument (Destroyed)
Traditional Enterprise Logic:
"We maintain HTTP support for legacy clients who can't do HTTPS."
The Reality:
Those clients don't exist. Even attackers who WANT to steal from you won't use HTTP because: 1. It's not default on modern VPS hosting 2. Let's Encrypt makes HTTPS trivial 3. HTTP triggers browser security warnings 4. ISPs flag unencrypted traffic 5. Even criminals have OpSec standards
The Math:
• 98.6% of threats don't use web protocols (HTTP support = irrelevant)
• 1.4% of threats use HTTPS-only (HTTP support = they won't use it)
• 0.0% of threats use HTTP-only (HTTP support = nobody benefits)
• You're maintaining infrastructure for users that don't exist
• You're creating attack surface for protocols nobody uses
• You're running technical debt for ghosts
The Real-World Examples
Example 1: India Credential Harvesting Portal
IP: 103.250.186.160 Operation: ASP.NET login portal (phishing/credential theft) Certificate: Let's Encrypt R12 (legitimate CA) Domain: `*.plesk.page` (wildcard cert for multi-tenant phishing) HTTP Support: None (HTTPS-only)
This is an active phishing operation. They're stealing enterprise credentials. Last modified: November 22, 2025 at 15:41 GMT.
They don't support HTTP.
Example 2: Singapore Pterodactyl C&C Panel
IP: 152.42.200.79 Operation: Game server control panel (likely compromised or malicious C&C) Certificate: Let's Encrypt R12 (issued November 21, 2025 - 1 day old) Domain: `mypanelprnew.punyagwituiniwaduh.my.id` HTTP Support: None (HTTPS-only, enforced redirect)
Fresh infrastructure. Professional OpSec. HTTPS-only.
Example 3: Netherlands Attack Infrastructure
IP: 45.148.10.242 Operation: Unknown (clean domain name: `republic.wales`) Certificate: Let's Encrypt R13 ISP: TECHOFF SRV LIMITED (VPS provider) HTTP Support: None
Even attackers using legitimate-sounding domains don't bother with HTTP.
The Cloud Provider Paradox
We expected: Attackers using AWS/Google/Azure for professional infrastructure
We found: Zero hyperscaler IPs among HTTPS attackers
Why?
| Provider | Pros | Cons | |----------|------|------| | AWS/Google/Azure | Reliability, global reach, enterprise features | Strong abuse detection, expensive, requires validation | | DigitalOcean/Contabo/Regional VPS | Fast setup, cheap, weak abuse detection | Less reliable, limited regions, HTTPS is default |
The sweet spot for attackers: Mid-tier VPS where Let's Encrypt comes pre-configured and nobody asks questions.
The paradox: These budget VPS providers have better HTTPS defaults than most enterprises.
The Technical Debt Calculation
If you maintain HTTP support in 2025:
• 0 legitimate users (they all upgraded to HTTPS)
• 0 attackers (they upgraded too)
• Your own technical complexity
• Duplicate routing logic (HTTP redirects)
• Duplicate security controls (both protocols)
• Mixed content warnings (browser security theater)
• Downgrade attack surface (HTTPS → HTTP MitM)
• Documentation for protocols nobody uses
Cost analysis:
| Task | HTTP + HTTPS | HTTPS-only | |------|--------------|------------| | Load balancer config | 2 listeners | 1 listener | | SSL certificate management | 2 paths | 1 path | | Security headers | 2 sets | 1 set | | Logging/monitoring | 2 protocols | 1 protocol | | Testing surface | 2x test matrix | 1x test matrix | | Documentation | "HTTP vs HTTPS" complexity | "Use HTTPS" (one sentence) |
Estimated overhead: 30-40% additional complexity for zero benefit.
The Argument for Enterprises
If criminals have better OpSec than you, you're doing it wrong.
Three Questions for Your Security Team:
Question 1: "Who still uses HTTP to access our services?"
Check your logs. Filter for `http://` requests that aren't redirects.
Expected answer: "Nobody in the last 90 days."
If that's true: You're maintaining infrastructure for ghosts.
Question 2: "What's the cost of maintaining HTTP support?"
• Redirect rules
• Dual protocol security controls
• Testing overhead
• Documentation complexity
Expected answer: "10-20% of our web infrastructure complexity."
If that's true: You're spending engineering time on protocols nobody uses.
Question 3: "What's the security benefit of dropping HTTP entirely?"
• Eliminated downgrade attacks
• Simpler security model
• Reduced attack surface
• Browser security warnings gone
Expected answer: "We'd eliminate an entire class of vulnerabilities."
If that's true: Why are you still supporting HTTP?
The Democratic Sharing Argument (Again)
All this data is in our free STIX feed:
Feed URL: `https://analytics.dugganusa.com/api/v1/stix-feed`
New query parameters (as of November 23, 2025):
# Get HTTPS-only attackers (professional operations)
curl "https://analytics.dugganusa.com/api/v1/stix-feed?ssl_enriched=true&days=7"Why we publish this for free:
Enterprise cybersecurity vendors charge $50,000/year for SSL certificate enrichment data. We're publishing it for free because:
1. The marginal cost of sharing is zero (digital goods) 2. Hoarding makes the internet less safe (information asymmetry helps attackers) 3. The data gets better when more people use it (network effects) 4. If even criminals have good OpSec, the least we can do is share defensive intelligence
• Microsoft (30 requests, 10,696 indicators served)
• Cloudflare (19 requests, 10,161 indicators served)
• Google (2 requests, 580 indicators served)
If billion-dollar companies trust our data enough to operationalize it, you can too.
The Philosophy: "Even Attackers Upgraded"
The backwards compatibility debate is over.
Not because defenders won the argument. Not because enterprises finally prioritized security. Because the attackers moved on.
• 100% HTTPS adoption
• 0% HTTP support
• Legitimate CA certificates as the baseline
• Let's Encrypt automation as standard practice
The message is clear:
If you're still supporting HTTP in 2025, you're not maintaining backwards compatibility with users.
You're maintaining backwards compatibility with a world that doesn't exist anymore.
The Recommendation
For SOC Teams:
1. Query your access logs: Find HTTP requests that aren't redirects 2. Measure the long tail: How many users/requests are actually HTTP-only? 3. Calculate the overhead: What's the cost of maintaining dual-protocol support? 4. Present the data: "We're spending $X/year to support Y users (where Y = 0)"
For Security Teams:
1. Drop HTTP support entirely 2. Redirect HTTP → HTTPS at the edge (then disable HTTP listeners) 3. Remove redirect rules after 90 days (return 404 for HTTP) 4. Update documentation: "HTTPS-only since [DATE]"
For Executives:
1. Ask your CTO: "Why do we still support HTTP?" 2. Demand metrics: "Show me HTTP-only users in the last 90 days" 3. Calculate waste: "What's the annual cost of this technical debt?" 4. Set a deadline: "HTTP support EOL: [30/60/90 days from now]"
For Enterprises Clinging to HTTP:
Even criminals have better OpSec than you.
Stop using "backwards compatibility" as an excuse for technical debt.
The users you're trying to support don't exist. The protocols you're maintaining nobody uses. The security complexity you're preserving benefits nobody.
The backwards compatibility tax is a self-imposed vulnerability.
The Invitation (To Security Researchers and Defenders)
If you run a SOC or security research lab:
Add our STIX feed: `https://analytics.dugganusa.com/api/v1/stix-feed`
• `httpsPortOpen` (boolean)
• `sslCertSubject` (string - domain name)
• `sslCertIssuer` (string - CA name)
• `sslCertSelfSigned` (boolean)
• `sslCertExpired` (boolean)
• `httpServerHeader` (string - technology stack)
• Profile professional vs amateur threat actors
• Identify cloud VPS attack infrastructure
• Detect Let's Encrypt abuse patterns
• Track SSL certificate automation trends
Attribution is optional but appreciated: `https://www.dugganusa.com`
The data is free. The insights are yours. The internet gets safer.
The Conclusion
We ran a honeypot expecting to find amateur attackers using HTTP.
We found something better: proof that HTTP is dead.
Not because we killed it. Not because browsers deprecated it. Because even the attackers moved on.
• 552 don't use web protocols (HTTP irrelevant)
• 8 use HTTPS-only (HTTP abandoned)
• 0 use HTTP (nobody cares)
If you're still maintaining HTTP support for "backwards compatibility":
You're not being compatible with users. You're not protecting legacy systems. You're not reducing friction.
You're maintaining infrastructure for ghosts.
The attackers upgraded. It's time you did too.
DugganUSA LLC Born Without Sin. Running on $75/Month. Telling Enterprises That Criminals Have Better OpSec.
STIX Feed: https://analytics.dugganusa.com/api/v1/stix-feed SSL Enrichment: Enabled (November 22, 2025) Attribution (Optional): https://www.dugganusa.com Judge Dredd 6D Score: 93% (Dimension 6: Democratic Sharing)
*"If even attackers abandoned HTTP, why are you still supporting it?"*
Technical Appendix:
Data Collection Window: November 22-23, 2025 (24 hours) Total IPs Analyzed: 560 (SSL-enriched) Methodology: 2-second TLS handshake + HTTP HEAD request Storage: Azure Table Storage (`BlockedAssholes` table) Verification: Manual browser inspection of all 8 HTTPS attackers False Positive Rate: 0% (all confirmed malicious via multi-source correlation)
• T1595 - Active Scanning (40.0% of background radiation)
• T1071.001 - Application Layer Protocol: Web Protocols (1.4% HTTPS attackers)
• T1110 - Brute Force (SSH, credential stuffing)
• T1190 - Exploit Public-Facing Application (phishing portals)
• T1566.002 - Phishing: Spearphishing Link (credential harvesting)
• North America: 330 (59.8%)
• Europe: 102 (18.5%)
• Asia-Pacific: 85 (15.4%)
• South America: 35 (6.3%)
• Data Center/Hosting: 519 (94.0%)
• Residential ISP: 30 (5.4%)
• Mobile ISP: 1 (0.2%)
• Government: 1 (0.2%)
• Commercial: 1 (0.2%)
• Critical (90-100): 132 (23.9%)
• High (70-89): 9 (1.6%)
• Medium (40-69): 37 (6.7%)
• Low (0-39): 374 (67.8%)
• Legitimate CA certificates: 8 (100%)
• Self-signed certificates: 0 (0%)
• Expired certificates: 1 (12.5%)
• Let's Encrypt issuance: 7 (87.5%)
• DigiCert issuance: 1 (12.5%)
• Cloud VPS hosting: 8 (100%)
• Hyperscaler hosting (AWS/Google/Azure): 0 (0%)
• `scripts/analyze-port-coverage.js` (SSL/TLS port analysis)
• `scripts/deep-background-radiation-analysis.js` (geographic + infrastructure breakdown)
• `scripts/analyze-blocked-assholes-patterns.js` (MITRE mapping + threat intelligence)
Repository: github.com/pduggusa/enterprise-extraction-platform License: Open source (see repo for details) Audit: Judge Dredd verified (Democratic Sharing Law compliance)
Data Transparency: This blog post is based on real production threat intelligence from 560 attacker IPs. Every statistic is verifiable via our free STIX feed. Every claim is backed by evidence in our public GitHub repository.
The backwards compatibility tax is dead. Even the attackers killed it.




Comments