Compromised CCTV and NAS Devices Found Participating In DDoS Attacks (incapsula.com) 64
chicksdaddy writes: The parade of horribles continues on the Internet of Things, with a report from the security firm Incapsula that its researchers discovered compromised closed circuit cameras as well as home network attached storage (NAS) devices participating in denial of service attacks. The compromised machines included a CCTV at a local mall, just a couple minutes from the Incapsula headquarters.
According to the report, Incapsula discovered the infections as part of an investigation into a distributed denial of service attack on what it described as a "rarely-used asset" at a "large cloud service." The attack used a network of 900 compromised cameras to create a flood of HTTP GET requests, at a rate of around 20,000 requests per second, to try to disable the cloud-based server. The cameras were running the same operating system: embedded Linux with BusyBox, which is a collection of Unix utilities designed for resource-constrained endpoints.
The malware in question was a variant of a self-replicating program known as Lightaidra, which targets systems running BusyBox and exploits vulnerable Telnet/SSH services using so-called "brute force dictionary attacks" (aka "password guessing"). Given that many Internet connected devices simply use the default administrator credentials when deployed, calling it a "brute force" attack is probably a stretch.
According to the report, Incapsula discovered the infections as part of an investigation into a distributed denial of service attack on what it described as a "rarely-used asset" at a "large cloud service." The attack used a network of 900 compromised cameras to create a flood of HTTP GET requests, at a rate of around 20,000 requests per second, to try to disable the cloud-based server. The cameras were running the same operating system: embedded Linux with BusyBox, which is a collection of Unix utilities designed for resource-constrained endpoints.
The malware in question was a variant of a self-replicating program known as Lightaidra, which targets systems running BusyBox and exploits vulnerable Telnet/SSH services using so-called "brute force dictionary attacks" (aka "password guessing"). Given that many Internet connected devices simply use the default administrator credentials when deployed, calling it a "brute force" attack is probably a stretch.
You can burn out the motor coils in the cameras (Score:2)
You can burn out the motor coils in the cameras by hacking the software and over driving them?
Re: (Score:3)
You can burn out the motor coils in the cameras by hacking the software and over driving them?
Maybe the cameras burned themselves out because they were tired of being our slaves?
Re: (Score:2)
You can have the software forget about the limit switches / run the motor 24/7 at full power / speed.
Brute force (Score:2)
admin admin
I said admin you dumb camera!
admin admin
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
It would be strange for there to be a software limit on the operation of the motors.
Thank goodness a software exploit couldn't interfere with a software limit! Oh, wait....
Re: (Score:2)
Wouldn't surprise me in the least, and seems very probable. You used to be able to destroy CRT monitors by telling a program to run the refresh, or horizontal or vertical alignments out of spec or sync too, for the longest time you could do it with ansi codes. Kinda like how you could destroy the old HDD's that needed a parking utility by telling the heads to slam into the spindle while the drive was still running.
Re:You can burn out the motor coils in the cameras (Score:4, Funny)
Man, I just can't wait until everything fucking I own is vulnerable and requires daily/weekly patching.
Upgrade toilet? CHECK....DONE.
Upgrade refrigerator? CHECK....DONE.
Upgrade toaster? CHECK....DONE.
Upgrade alarm clock? CHECK....DONE.
Upgrade gas stove? CHECK....DONE.
Upgrade TV? CHECK....DONE.
Upgrade ink pen? CHECK....DONE.
Upgrade couch? CHECK....DONE.
Upgrade desk lamp? CHECK....DONE.
Upgrade front door? CHECK....DONE.
Upgrade coffee table? CHECK....DONE.
Upgrade soap dispenser? CHECK....DONE.
Upgrade wife's vibrator? CHECK....DONE.
Upgrade the upgrade manager? CHECK....DONE.
Upgrade kitchen light? CHECK....DONE.
Upgrade lawnmower? CHECK....DONE.
Upgrade sink? CHECK....DONE.
Re: (Score:1)
You know you want to let your toilet become part of a zombie bot network so it can DDoS someone.
Re: (Score:2)
You forgot to upgrade the cats pacemaker, it got hit by a worm made by cat hating hacker and died.
And the toilet update failed, the toilet is now in an endless reboot-crash loop.
Re: (Score:2)
Oh and don't even think of trying to re-flash the toilet yourself, that's illegal under both health and safety and DMCA laws and your hair dryer will report you to the police if you try.
Thanks, but no thanks Linux (Score:1)
That's why when it comes to my Internet of Things, I only trust the Genuine® Advantage©® of Certified® Microsoft©® Windows®© Internet© of© Things©® Soft®ware®.
©
Re: (Score:2)
Slashdot submission style (Score:1)
Is anyone else getting annoyed at the writing style of recent Slashdot submissions ?
They are being written in a dumbed down folksy style with idiotic mannerisms designed to explain things to idiots, not the geek readership around here.
Re: (Score:2)
What geek readership? The true geeks all left a long time ago. The dumbed-down folksy style is a perfect fit for the wannabe geeks and Teatards who still largely inhabit this place.
Re:Slashdot submission style (Score:4, Informative)
Hmmmm ... if not A, then (B|C) ... so which of 'wannabe geeks' or Teatards are you including yourself in?
Or are you just saying small values of A?
Re: (Score:2)
It's a false dichotomy, anyway. There's also blowhards, diehards, refugees when 4chan or reddit is down, motorheads, geeks, sluts, bloods, wastoids, dweebies, dickheads...
Re: (Score:2)
LOL .. crap. So, it's high school all over again?
Re: (Score:2)
Is anyone else getting annoyed at the writing style of recent Slashdot submissions ?
They are being written in a dumbed down folksy style with idiotic mannerisms designed to explain things to idiots, not the geek readership around here.
Remember that Slashdot is up for sale, so "broadening" the audience is going to help Dice recoup what it paid for Slashdot.
Doesn't surprise me (Score:3)
My Webcam came with an open root telnet port. Just connect to port XXXX (whatever it was, I forget) and you were automatically logged in to a root shell.
There's a reason I kept it completely firewalled from the Internet.
Distance matters now? (Score:3)
>> compromised machines included a CCTV at a local mall, just a couple minutes from the Incapsula headquarters
Clearly, the correct thing to do is move the HQ further away from the mall, right?
Re: (Score:2)
Minutes are a measure of time. They'll have to move the HQ into the past or future.
Re: (Score:2)
Re: (Score:2)
The alternative is to preemptively take over the mall's CCTV.
Interesting (Score:3)
A few years ago I got curious and started scanning the local subnets on my ISP for open telnet ports. Found one DVR type of device with four cameras and four hard drives running with disks 100% filled. The default logins worked and found myself at a busybox prompt. What was interesting was there was always a few others logged in from countries over seas. I managed to tftp a fragment of a video file but couldn't recognize the area. There is no reason for multiple telnet logins to a DVR box.
Re: (Score:3)
I'm not admitting to anything but there's someone who will answer to my name, if called, who may have a hobby of finding online printers and sending them a (single) printed piece of paper telling them of the fault. Why they've got them online or with forwarded ports is beyond me. But, you know... Sometimes there are easily accessed routers and whatnot. I don't know anything about anything, of course, but they all *probably* have the default passwords still. If I were to do something like that then I'd obvio
Funny (Score:1)
Re: (Score:3)
It's funny reading this today, because yesterday my smtp server was getting attacked by a Samsung DVR.
I'm fairly certain my Xbox is bullying my PS3.
Re: (Score:2)
That's because your PS3 is racist and deserves it.
Re: (Score:2)
The Wikipedia of Things, where any (Score:1)
The Wikipedia of Things, where any dipshit on the internet can edit your refrigerator.
Is this really news?! (Score:2)
I have no idea why people allow outside access to their NAS device or webcams. At a minimum, require VPN access, but ideally put them in a VLAN "jail".
Someone is going to need to get much more savvy when it comes to securing this "IoT" monster.
Re: (Score:2)
Is CCTV the right term? (Score:2)
The malware in question .. (Score:2)
'Incapsula is a cloud-based security and acceleration service that makes websites safer, faster, and more reliable'
chaussure nike tn requin 2015 (Score:1)