# Half of 6 Million Internet-Facing FTP Servers Still Transmit Data Without Encryption
A comprehensive security assessment has revealed a critical vulnerability landscape across the internet: approximately 3 million FTP servers remain accessible from the public internet without encryption, exposing organizations worldwide to interception attacks, credential theft, and unauthorized data access. The finding, which examined roughly 6 million publicly accessible FTP servers globally, underscores a persistent and widespread security blind spot in enterprise infrastructure.
## The Threat
The statistics are staggering. Out of an estimated 6 million FTP (File Transfer Protocol) servers accessible from the internet, roughly 50% operate without encryption, meaning credentials and file transfers traverse the internet in plaintext. This creates a direct pathway for attackers to capture sensitive data, intercept login credentials, and establish footholds in organizational networks.
Unencrypted FTP operates through the standard FTP protocol (port 21), which transmits all data—including usernames, passwords, and file contents—in human-readable format across the network. An attacker positioned anywhere between the client and server (through ARP spoofing, DNS hijacking, BGP hijacking, or network compromise) can capture this traffic with minimal effort using tools as simple as tcpdump or Wireshark.
## Background and Context
FTP has been the subject of security concerns for decades. The protocol, standardized in 1985 (RFC 959), predates modern encryption standards and was designed for an era when network security was not a primary concern. Despite its age and known vulnerabilities, FTP remains deeply embedded in enterprise infrastructure for several reasons:
While secure alternatives like SFTP (SSH File Transfer Protocol) and FTPS (FTP Secure) have been available for two decades, adoption has been slow and inconsistent across organizations.
## Technical Details
### How Unencrypted FTP Works
Standard FTP operates in cleartext across two channels:
1. Control Channel (Port 21): Transmits commands and authentication credentials
2. Data Channel (Port 20 or ephemeral ports): Transfers file contents
Both channels lack encryption entirely. A network packet capture reveals:
Username: admin
Password: MyP@ssw0rd!An attacker capturing these packets can immediately log in as the authenticated user.
### The Encryption Gap
The secure alternatives present a stark contrast:
| Protocol | Encryption | Authentication | Current Adoption |
|----------|-----------|-----------------|------------------|
| FTP | None | Plaintext credentials | 50% of exposed servers |
| FTPS | TLS/SSL | Certificate-based | Less common |
| SFTP | SSH | Key-based or password | Industry standard |
| HTTPS (REST APIs) | TLS | Various | Widespread |
Organizations deploying unencrypted FTP expose themselves not only to eavesdropping but also to man-in-the-middle (MITM) attacks, where an attacker intercepts and modifies file contents in transit.
## The Broader Picture
### Global Exposure Scale
The 3 million exposed unencrypted FTP servers represent a massive attack surface. Key findings include:
### Why This Persists
Several factors explain why organizations continue running unencrypted FTP at scale:
1. Migration complexity: Upgrading protocols in mature environments requires careful planning, testing, and coordination
2. Vendor support gaps: Some legacy applications and devices only support FTP natively
3. Organizational silos: IT operations may be unaware of FTP servers running in specific departments
4. False sense of security: Internal networks protected by firewalls may seem "safe" until accessed remotely
5. Compliance misunderstanding: Organizations may meet minimum compliance standards while missing critical security best practices
## Implications for Organizations
### Immediate Risks
Credential compromise: An attacker capturing FTP credentials gains direct access to sensitive file repositories. These credentials are often reused across systems, enabling lateral movement.
Data interception: Sensitive documents, source code, financial records, and intellectual property transmitted via unencrypted FTP can be captured and exfiltrated.
Business continuity threats: Attackers could modify files in transit, causing data corruption or introducing malware into file transfers.
Compliance violations: Many regulatory frameworks (HIPAA, PCI-DSS, GDPR, SOC 2) explicitly require encryption for data in transit. Organizations running unencrypted FTP may be in violation.
### Ransomware and APT Vectors
Exposed FTP servers have become popular initial access vectors for ransomware operations and advanced persistent threats (APTs). A compromised FTP account provides:
## Security Recommendations
### Immediate Actions
Organizations hosting any FTP servers should take these steps immediately:
1. Inventory all FTP servers: Conduct a comprehensive audit to identify every FTP server, both internal and accessible externally
2. Disable internet-facing FTP: If FTP is accessible from the internet, restrict access to VPN or internal networks only
3. Enable encryption: Deploy SFTP or FTPS on all FTP infrastructure
4. Rotate credentials: Change all FTP credentials, as they should be considered potentially compromised
5. Monitor access logs: Review FTP logs for suspicious activity or unauthorized access
### Long-Term Strategy
### For Security Teams
## What This Means Moving Forward
The persistence of unencrypted FTP at this scale represents a critical gap between known threats and organizational action. While the technology to secure file transfers has existed for decades, adoption gaps persist due to legacy constraints, organizational inertia, and competing priorities.
However, the trend is clear: security teams must treat unencrypted FTP as a legacy protocol requiring immediate remediation, not an acceptable standard practice. With 3 million exposed servers representing billions of potential data exposures, the business case for migration has never been stronger.
Organizations should view this as an urgent call to action. Encrypting file transfer protocols is not a future optimization—it is a present-day security imperative.