DVRs Used To Attack Synology Disk Stations and Mine Bitcoin 75
UnderAttack (311872) writes "The SANS Internet Storm Center got an interesting story about how some of the devices scanning its honeypot turned out to be infected DVRs. These DVRs are commonly used to record footage from security cameras, and likely got infected themselves due to weak default passwords (12345). Now they are being turned into bots (but weren't they bots before that?) and are used to scan for Synology Disk Stations who are vulnerable. In addition, these DVRs now also run a copy of a bitcoin miner. Interestingly, all of this malware is compiled for ARM CPUs, so this is not a case of standard x86 exploits that happen to hit an embedded system/device."
Why is anyone surprised... (Score:5, Insightful)
I'm more surprised that we haven't seen reports of infected DVD and Blu-ray players whose only purpose is to seek out more powerful devices (PCs, smartphones) on peoples' networks to compromise and turn into bitcoin zombies. After all, it only takes a few people to come up with the exploits in the first place, and then 5kr1p7 k1dd13s can use the tools others have created.
Re: (Score:1)
Obviously, you didn't learn much there yourself? 25MHz * ??? = 2.5GHz and that would be one core of a modern CPU. (the answer is 100 by the way.) [Security DVRs are some of the least powerful hardware around. We aren't talking about a current gen Tivo Romio -- which is still a bad choice for mining.]
Re:Why is anyone surprised... (Score:5, Insightful)
For reference, a 1.6GHz 'Kirkwood' Marvell core is good for slightly under
Re: (Score:3, Informative)
For even more perspective: The current hash rate on the Bitcoin network is about 40,000,000 gigahashes per second. With 0.2 megahashes per second, you can expect to earn 3600*0.2/40,000,000,000 Bitcoins per day. That's 0.000000018 Bitcoins (or about two Satoshis) per day. At that rate, it would take 380 years to earn a dollar.
"Bitcoin": Error in reporting? (Score:4, Informative)
That might also be an error in reporting: TFA's Author might have written "bitcoin mining" (for lack of understanding the whole alt-coin ecosystem) when it would be best described as "cryptocurrency miner". /. mentioning mining malware, all said "bitcoin mining" when careful reading showed up that in fact the malware didn't mine bitcoins but another cryptocurrency better suited for CPU (one of the latest I remember was PTShares).
The last few article on
Reporter just say "bitcoin mining" because that's the only thing they know and they vaguely remember that creating bitcoins was something CPU intensive.
The black-hats creating sophisticated malware (a worm, infecting vulnerable connected DVR, so they in turn can attack Synology NAS and launch mining software) aren't probably stupid enough to mine bitcoin, they probably know better, and the miner is for whatever is the current most CPU-worthy (i.e.: non SHA-256^2 baesd) cryptocurrency-coin.
Re: (Score:3)
and Synology devices run ... LINUX.
Hello folks, I think the 'virus free' honeymoon is over.
Maybe I'm just pessimistic; but I thought it had been a truism for some years that embedded linux, especially in the cheap seats, was a total clusterfuck: firmware never getting released at all, firmware getting released with exploits that were known before it was even built, loads of shoddy little hacks to get the product out the door, and so on.
Re: (Score:2)
And pretty much every single process running as root. On a lot of dedicated security DVRs, especially the cheap ones, root is the only user too. If you wanted to see a true clusterfuck of Linux programming just needed take one of the GE brand security DVRs out of the box. Now that they've sold their security products to United Technologies the situation has supposedly improved, but I have my doubts.
Re:Why is anyone surprised... (Score:5, Informative)
Synology's firmware is updated p. regularly in my few month's experience of owning a DiskStation.
Re: (Score:2)
As an alternative to Synology, how about FreeNAS running on an ITX platform:
http://www.ixsystems.com/stora... [ixsystems.com]
Because the software is better supported via the FreeNAS community?
Re: (Score:3)
Re: (Score:2)
Re:Why is anyone surprised... (Score:4, Insightful)
...by this? I'm more surprised that we haven't seen reports of infected DVD and Blu-ray players whose only purpose is to seek out more powerful devices (PCs, smartphones) on peoples' networks to compromise and turn into bitcoin zombies. After all, it only takes a few people to come up with the exploits in the first place, and then 5kr1p7 k1dd13s can use the tools others have created.
The main surprise is just that it's worth the trouble. Synology's high end has a few systems built around notably undistinguished Xeons(more for ECC support than anything else, they don't use very speedy ones); but if this attack is built for ARM, you are talking the relative cheap seats. Probably kilohashes to low megahashes per second, depending on how much capacity you reserve for the intended function of the device.
Even free-as-in-stolen, you're telling me that the best use somebody can think of for a botnet of network attached storage devices is generating maybe as many hashes as one of those cheapo USB-stick ASICs, rather than, say, basking in juicy private data and massive stolen storage space?
Re: (Score:3)
Maybe they also installed a bitcoin botnet to cover up their real "work".
Re: (Score:1)
This is logical, I can completely see this —why not throw a bitcoin miner in there for fun? At worst, you earn nothing on top of what you're really up to.
Re: (Score:2)
Completely agree, the bitcoin miner is just the headline. The rest of it is to scan the contents of the NAS, I wonder which government owns them?
Re: (Score:2)
If criminals were bright enough to think of those other applications they would probably be able to think of the consequences if they get caught.
Unless you are already doing it how many people would have a clue where to fence stolen credit card numbers let alone any other "juicy private data".
With bittorrent etc I don't know it "massive stolen storage space" has any value.
Last word - what the fuck are
Re: (Score:2)
Re: (Score:2)
Ah - that's the truly special level of stupidity I had not considered.
Re: (Score:2)
the cheap and nasty nas drive isn't visible to internet but has access to internet.. that's a quite common setup. but the dvr's themselves are connected to the internet(so that their owners can see the video feeds on their ipads...).
Re: (Score:3)
This suggests that this malware has been around for a long time, dating from back when it was worth mining Bitcoins with a low end CPU. Three or four years maybe.
We can hope that Bitcoin mining was just a module someone added to it, or was in there from way-back-when and the malware has slowly evolved and added new infection vectors that were only recently discovered. Otherwise it must have been floating around undetected for years, and in the early days might have actually generated some cash.
Re: (Score:2)
Uh, why is CPU mining pointless today? Because the returns are so low?
Yes, the returns are very low. However, they're non-zero. So if you can find a pile of computing devices that you can use for FREE, even if you only earn 0.001 BTC a day, that's still a positive ROI for you.
Now couple that with millions of PCs, routers, DVRs, etc., and suddenly 0
Probably *NOT* bitcoins (Score:2)
As I've mentionned above, it's probably NOT bitcoins being mined. /. mentioning mining malware, all said "bitcoin mining" when careful reading showed up that in fact the malware didn't mine bitcoins but another cryptocurrency better suited for CPU (one of the latest I remember was PTShares).
The last few article on
Reporter just say "bitcoin mining" because that's the only thing they know and they vaguely remember that creating bitcoins was something CPU intensive.
If the black-hats are smart enough to think t
Re: (Score:2)
Because only complete and utter morons put their DVD player directly on the internet. While a security DVR is required to be in the internet or accessible via the internet for remote viewing.
It's why I simply point and laugh at the fools that all herald ipv6 where they can have a public IP for every device. Only idiots want that, those of us that are sane only want public facing IP for the devices that need it.
Re: (Score:1)
>> Because only complete and utter morons put their DVD player directly on the internet
Welcome to DVD player.
Choose WIFI network. [click]
Input WIFI password [click]
Thank you, enjoy.
Re: (Score:2)
I work in the security industry, and you would be absolutely shocked at some of the work being done out there. The residential and retail markets are absolutely the worst, since there's no money to be made there unless you're pumping out dozens of slipshod installations per week per installer. For most of those guys their level of technical expertise is that they can find porn and Facebook on the Internet.
a security DVR is required to be in the internet or accessible
Huh? Not just 'NO' but 'NO FUCKING WA
Re:I hate April fools on the internet. (Score:4, Informative)
Re: (Score:2)
I hate April fools on the internet... April fools only works in person, it is just dumb and possibly dangerous on the internet.
Posted by Unknown Lamer on Monday March 31, 2014 @11:58PM
management fools (Score:2)
But when you've actually been asked by management whether you've implemented RFC 3514 (the "Evil Bit"), how can the Internet NOT be better?
Re: (Score:2)
The date/time you see on the story depends on your timezone. Yet it doesn't put everyone else into a time-warp where it's not April 1st for them...
This story absolutely was posted on April 1st, /. local time, as evidenced by the date embedded in the link to it:
http://it.slashdot.org/story/1... [slashdot.org]
I'm confused (Score:3)
Interestingly, all of this malware is compiled for ARM CPUs
How else does malware running on ARM based systems work?
Re: (Score:2)
Much better this year (Score:5, Funny)
This april fools is believable.
Re: (Score:2)
It's doubly weird because NASes probably have some ne
Counterfeit (Score:2, Interesting)
Re: (Score:1)
There is not, unless 51% of the network refuses to continue work on any chain containing a transaction that spent these balances.
Bitcoin was designed this way with no central control because many in the community see the ability for others to arbitrarily decide someone's money is worthless to be a bug, not a feature.
Re: (Score:3)
Sure, I'd cry approximately -6 tears if the person behind this were to be caught and hauled off, and if he actually managed to mine anything(which would surprise me) I'd have no problem with the notion of his being forced to disburse the minings to his victims; but attempting to determine, from th
Re: (Score:3)
Of course we all know of a security agency that just positively loves video feeds for it's extortion program anything else just a cover. The interesting part of the story, how honeypots are much better at establishing internet security than engaging in global criminal activity, of course one is about law and order and the other is about criminal extortion with a political basis.
Yes and no (Score:2)
Is there a mechanism built into the bitcoin structure that allows for this and voids the coins?
Is there a mechanism built into hard cash that allows to void the silvercoins/bank bills to be remotely voided? No.
And basically any cryptocurrency works the same. There's by definition NO SINGLE ENTITY in control of the bitcoin protocol (that's the whole point of it).
so nobody could remotely void any coin. (but at least that means that legally earned crypto-mony won't suddenly vanish neither... no fraudulous chargebacks on the bitcoin network)
On the other hand, cryptocurrencies aren't anonymous. At all. In
Re: (Score:2)
I hate slashdot on April fools day (Score:1)
Please bring back the ponies instead of making us guess.
Well the laundry thought (Score:2)
Synology vulnerability? (Score:4, Informative)
TFA has very little info on the supposed Synology management interface vulnerability.
I believe this article covers some some of the general info on the vulnerabilities: http://www.symantec.com/connec... [symantec.com]
Pointless? (Score:2)
At the current bit coin difficulty, I would have thought even a large botnet of conventional CPUs would be pretty pointless.
probably mining an alt coin (Score:2)
I hear tell... (Score:2)
that if you DVR fishing shows, you spread worms, too