Defense News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Defense Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
DefenseNewsAsia Fumbles With Throttling Back Telnet Traffic in Region
Asia Fumbles With Throttling Back Telnet Traffic in Region
CybersecurityDefense

Asia Fumbles With Throttling Back Telnet Traffic in Region

•February 11, 2026
0
Dark Reading
Dark Reading•Feb 11, 2026

Companies Mentioned

GreyNoise

GreyNoise

Why It Matters

The uneven Telnet mitigation leaves a large attack surface in Asia, threatening IoT and small‑business networks and highlighting the need for coordinated security policies.

Key Takeaways

  • •Asia holds ~50% of global exposed Telnet devices
  • •Telnet traffic fell 83% globally, but Asia lagged
  • •Taiwan, India, Japan, China filtered 59‑77% of sessions
  • •AI web‑scraping spikes prompted ISPs to block Telnet traffic
  • •Telnet devices dropped from 1.3M to 1.2M

Pulse Analysis

Telnet, a legacy remote‑access protocol lacking encryption, remains surprisingly common in the Asia‑Pacific. GreyNoise and the Shadowserver Foundation report that roughly half of the world’s 839,000 publicly reachable Telnet endpoints sit in the region, with China, India and South Korea contributing the bulk of scan traffic. Small‑business routers, IoT cameras and consumer‑grade devices continue to expose plaintext login prompts, creating a fertile attack surface for credential‑stuffing and botnet recruitment. Despite industry warnings, many organizations have not replaced Telnet with secure alternatives such as SSH, leaving a persistent vulnerability gap.

In mid‑January, global Telnet sessions plunged from about 65,000 per hour to 11,000, an 83 % drop triggered by backbone providers throttling the protocol. Asian networks, however, saw only modest reductions, reflecting uneven filtering policies: Taiwan blocked 77 %, India 70 %, Japan 65 % and China 59 % of sessions. GreyNoise analysts attribute part of the slowdown to an unexpected side effect of AI‑driven web‑scraping. Massive bot‑like crawlers overwhelmed ISP routers, prompting operators to reset connections and, in many cases, to block inbound Telnet traffic altogether, unintentionally curbing malicious scans.

The episode underscores how legacy protocols can become collateral damage in broader network hygiene efforts. While the inadvertent block bought temporary relief, the underlying exposure remains; the number of active Telnet devices has only slipped from 1.3 million to 1.2 million over six months. Security teams should prioritize inventorying and decommissioning Telnet endpoints, especially on IoT gear, and replace them with SSH or VPN‑based access. Policymakers in the region may also consider coordinated mandates to enforce secure remote‑access standards, turning the current reactive throttling into a proactive, continent‑wide remediation strategy.

Asia Fumbles With Throttling Back Telnet Traffic in Region

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...