Article Details

Scrape Timestamp (UTC): 2025-09-03 05:48:10.083

Source: https://www.theregister.com/2025/09/03/censys_abuse_sigcomm_paper/

Original Article Text

Click to Toggle View

Internet mapping and research tool Censys reveals state-based abuse, harassment. ‘Universities are being used to proxy offensive government operations, turning research access decisions political’. Censys Inc, vendor of the popular Censys internet-mapping tool, has revealed that state-based actors are trying to abuse its services by hiding behind academic researchers. Censys started life in 2015 as an academic project that aimed to scan the internet and provide data to the research community. In 2017 the project formed a company that now provides a comprehensive map of the internet that it says can help cyber-defenders to find threats and respond before they create a problem. Universities are being used to proxy offensive government operations, turning research access decisions political The company continues to provide data to researchers, but in a paper [PDF] it will present at the SIGCOMM conference next week, admits “Equitably operating a research program is more challenging than we anticipated.” “While it is easy to verify the identity of well-established researchers with a Google Scholar profile or presentations at conferences like Blackhat or BSides, these constitute only a small fraction of requests,” the paper states. Most requests come from “independent researchers and students who have no public reputation,” the paper states. Censys has therefore established evaluation criteria that include submission of a clear research plan, researchers’ intention to publicly disseminate results, and receiving confirmation that work is conducted independently or as part of a non-profit or academic institution. An internal team reviews applications from researchers and applies those criteria. But the work isn’t easy. “Many students lack coherent research plans and without significant back-and-forth, it is difficult to discern between poorly written requests, requests from first-time researchers exploring, and fabricated plans,” the paper states. “We struggle to process many international requests because of language barriers and mounting evidence that universities are being used to proxy offensive government operations in some countries, turning research access decisions political,” it continues, before observing that Censys staff have recently seen “malicious actors use the research program to identify vulnerable systems.” The company has responded by establishing “multiple access tiers that provide delayed access or access to a subset of data.” Sometimes the process turns nasty. “Much to our surprise, it is not uncommon for researchers to send vitriolic messages, accusations, and, in rare cases, threats,” the paper reveals, noting that such abuse “can quickly turn program administration into a thankless job, similar to the experiences expressed by open source maintainers.” The purpose of the paper is to inform the networking and security communities about the evolution of Censys, because the company feels it hasn’t documented its history in research literature. The paper therefore reveals that Censys can now see 794 million IPv4 services, up from 275 million in 2015, and has improved its ability to scan for IPv6 systems and name-addressed HTTP(S) services. The document also explains how Censys scans the internet, and asserts its data is more accurate than rivals like Shodan, Fofa, ZoomEye, and Netlas.

Daily Brief Summary

NATION STATE ACTIVITY // Censys Faces Challenges as State Actors Exploit Research Access

Censys Inc. reports state-based actors are misusing its internet-mapping tool by posing as academic researchers to conduct offensive operations.

The company, initially an academic project, now aids cyber-defenders by mapping internet threats, but faces issues verifying researcher identities.

Many requests for data access come from independent researchers and students, complicating verification due to lack of public reputations and coherent research plans.

Censys has implemented evaluation criteria and multiple access tiers to mitigate misuse, including delayed access or limited data availability.

The organization encounters challenges from language barriers and the political nature of access decisions when universities act as proxies for government operations.

Instances of abuse and threats from researchers have been reported, complicating the administration of their research program.

Censys aims to inform the security community of these challenges and its evolution, noting improvements in scanning capabilities and data accuracy over competitors.