{"id":1450,"date":"2016-10-24T09:54:08","date_gmt":"2016-10-24T12:54:08","guid":{"rendered":"https:\/\/www.nachodelatorre.com.ar\/mosconi\/?p=1450"},"modified":"2016-10-24T09:54:08","modified_gmt":"2016-10-24T12:54:08","slug":"mas-de-500-000-dispositivos-iot-pueden-ser-potencialmente-reclutados-por-el-botnet-mirai","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=1450","title":{"rendered":"M\u00e1s de 500.000 dispositivos IoT pueden ser potencialmente reclutados por el Botnet Mirai"},"content":{"rendered":"<p>Expertos en seguridad han descubierto m\u00e1s de 500.000 dispositivos de Internet de las Cosas (IoT) vulnerables que podr\u00edan ser potencialmente reclutados en la red de bots Mirai. En las \u00faltimas semanas, expertos en seguridad observaron dos de los m\u00e1s poderosos ataques DDoS vistos, que golpearon al proveedor de hosting OVH.<!--more--><\/p>\n<p><img loading=\"lazy\" class=\"attachment-st_normal_thumb  wp-post-image alignright\" src=\"http:\/\/www.cyberdefensemagazine.com\/wp-content\/uploads\/2016\/10\/mirai-642x336.png\" sizes=\"(max-width: 642px) 100vw, 642px\" srcset=\"http:\/\/www.cyberdefensemagazine.com\/wp-content\/uploads\/2016\/10\/mirai-642x336.png 642w, http:\/\/www.cyberdefensemagazine.com\/wp-content\/uploads\/2016\/10\/mirai-500x261.png 500w\" alt=\"mirai\" width=\"346\" height=\"181\" \/>Security experts have discovered more than 500,000 vulnerable Internet of Things (IoT) devices that could be potentially recruited in the Mirai botnet.<\/p>\n<p>In the last weeks, security experts observed two of the powerful DDoS attacks of ever that hit the\u00a0<a href=\"http:\/\/securityaffairs.co\/wordpress\/51726\/cyber-crime\/ovh-hit-botnet-iot.html\">hosting provider\u00a0OVH<\/a>\u00a0and the websites of the popular security expert Brian Krebs.<\/p>\n<p>Malware researchers believe that the attacks were launched by at least a couple of botnets, one of them is the dreaded\u00a0<a href=\"http:\/\/securityaffairs.co\/wordpress\/50929\/cyber-crime\/linux-mirai-elf.html\">Mirai<\/a>\u00a0botnet.<\/p>\n<p>The Mirai ELF trojan was first spotted by\u00a0experts from MalwareMustDie in August, the threat was targeting\u00a0<a href=\"http:\/\/securityaffairs.co\/wordpress\/47079\/breaking-news\/chaos-theory-standardization-iot.html\">IoT devices<\/a>\u00a0in the wild.<\/p>\n<p>Researchers believe that the attack against the\u00a0<a href=\"http:\/\/securityaffairs.co\/wordpress\/51726\/cyber-crime\/ovh-hit-botnet-iot.html\">OVH<\/a>\u00a0was\u00a0powered by a botnet composed of\u00a0a large number of compromised IoT devices, including\u00a0<a href=\"http:\/\/securityaffairs.co\/wordpress\/44599\/hacking\/dvrs-exposed-hardcoded-passwords.html\">DVRs<\/a>\u00a0and\u00a0<a href=\"http:\/\/securityaffairs.co\/wordpress\/41354\/cyber-crime\/cctv-cameras-to-ddos-attacks.html\">cameras<\/a>.<\/p>\n<p>Last week, the author of Mirai botnet\u00a0<a href=\"http:\/\/securityaffairs.co\/wordpress\/51868\/cyber-crime\/mirai-botnet-source-code.html\">released<\/a>\u00a0the source code of the malware that includes a list of 60 couples of usernames and passwords used by the malware to compromise the IoT devices.<\/p>\n<p>The list of login credentials\u00a0includes the default username\/password combination\u00a0root\/xc3511 that according to the experts at\u00a0Flashpoint\u00a0allowed the hack in the majority of devices composing the Mirai botnet.<\/p>\n<p>The botnet was mainly composed of video surveillance devices manufactured by Dahua Technology.<\/p>\n<p><em>\u201cWhile investigating the recent large-scale distributed denial-of-service (DDoS) attacks, Flashpoint identified the primary manufacturer of the devices that utilize the default username and password combination known as root and xc3511.\u201d reads a\u00a0<\/em><a href=\"https:\/\/www.flashpoint-intel.com\/when-vulnerabilities-travel-downstream\/\"><strong><em>report<\/em><\/strong><\/a><em>\u00a0published by\u00a0Flashpoint.<\/em><\/p>\n<p><em>\u201cThese types of credentials exist all across the Internet and are commonly used via Telnet to access numerous types of DVRs. In fact, countless DVR manufacturers buy parts preloaded with Linux and rudimentary management software from a company called XiongMai Technologies, located in Hangzhou, China.\u201d<\/em><\/p>\n<p>Many device manufacturers use\u00a0components of the Chinese company XiongMai Technologies. According to the experts, there are at least half a million devices worldwide\u00a0using these vulnerable components that could be accessed with\u00a0default credentials.<\/p>\n<p><em>\u201cDefault credentials pose little threat when a device is not accessible from the Internet. However, when combined with other defaults, such as web interfaces or remote login services like Telnet or SSH, default credentials may pose a great risk to a device.\u201d continues the report. \u201cIn this case, default credentials can be used to \u201cTelnet\u201d to vulnerable devices, turning them into \u201cbots\u201d in a botnet.\u201d<\/em><\/p>\n<p>The major risk related the firmware provided by the Chinese manufacturer is related to the combination of default hardcoded credentials and the availability of a Telnet service that is active by default and which allows remote access to the devices.<\/p>\n<p><em>\u201cThe Dahua devices were identified early because of their distinctive interface and recent use in other botnets. Utilizing the \u201c<\/em>botnets<em>. Utilizing the \u201c<\/em><a href=\"http:\/\/github.com\/trylinux\/lift\"><em>Low Impact Identification Tool<\/em><\/a><em>\u201d or LIFT, Flashpoint was able to identify a large number of these devices in the attack data provided.\u201d states the report.<\/em><\/p>\n<p><em>\u201cThe issue with these particular devices is that a user cannot feasibly change this password. The password is\u00a0<\/em>hardcoded<em>\u00a0into the firmware, and the tools necessary to disable it are not present. Even worse, the web interface is not aware that these credentials even exist. Further exacerbating the issue, the Telnet service is also\u00a0<\/em>hardcoded<em>\u00a0into \/etc\/<\/em>init.<em>d\/<\/em>rcS<em>\u00a0(the primary service startup script), which is not easy to edit. The combination of the default service and hard-coded credentials\u00a0<\/em>has led<em>\u00a0to the\u00a0<\/em>assignment of has<em>\u00a0led to the assignment of<strong>\u00a0CVE-2016-1000245<\/strong>\u00a0by the\u00a0<\/em><a href=\"https:\/\/github.com\/distributedweaknessfiling\"><em>Distributed Weakness Filing Project<\/em><\/a><em>.\u201d<\/em><\/p>\n<p>Flashpoint scanned the internet with the Shodan search engine for flawed IoT devices.<\/p>\n<p>FlashPoint spotted more than 500,000 vulnerable devices in the wild, the countries with the highest number of vulnerable devices are Vietnam (80,000), Brazil (62,000) and Turkey (40,000).<\/p>\n<p>Large-scale DDoS attacks continue\u00a0to represent a serious threat for web services across the world, and IoT devices represent a privileged attack vector due to the lack of security by design. IoT manufacturers are encouraged to seriously consider the approach at the security of their products.<\/p>\n<p><strong>Fuente:<\/strong> <a href=\"http:\/\/www.cyberdefensemagazine.com\/more-than-500000-iot-devices-potentially-recruitable-in-the-mirai-botnet\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>http:\/\/www.cyberdefensemagazine.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Expertos en seguridad han descubierto m\u00e1s de 500.000 dispositivos de Internet de las Cosas (IoT) vulnerables que podr\u00edan ser potencialmente reclutados en la red de&hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23,29],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/1450"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1450"}],"version-history":[{"count":0,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/1450\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1450"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1450"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1450"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}