It was running on a proxy, routing remote access traffic that bypassed the usual port 443, hiding in plain sight. Engineers love port 443 for HTTPS, but 8443 sits alongside it, often doubling as an alternate or admin endpoint. It becomes the quiet door for APIs, load balancers, SSL-secured dashboards, and sometimes, the attack surface no one paid attention to until it was too late.
When a remote access proxy listens on 8443, it can serve load during SSL offloading, wrap non-HTTP protocols with TLS, or carry WebSocket streams to backend services. It’s a favorite for admin panels, Kubernetes dashboards, or internal proxies made public for performance tests. Many reverse proxy setups, from NGINX to HAProxy, are pre-configured to make it easy. That ease can be dangerous.
Outbound and inbound rules around port 8443 need the same level of care as 443. Verifying the proxy’s configuration is more than checking an SSL certificate. It means inspecting cipher suites, hardening headers, enforcing client authentication, and stripping unnecessary response data. On the network layer, it’s about filtering who can even touch the service. On the application layer, it’s about minimizing what runs behind it.