Cyber attack yesterday, was possibly powered by IoT devices

May 11, 2008
22,149
1,401
126
I was seriously worried about a year ago when windows 10 would support IoT out of the box because i worried about the security o IoT devices. :cry:

https://www.theguardian.com/technology/2016/oct/21/ddos-attack-dyn-internet-denial-service

US officials are investigating multiple attacks that caused widespread online disruption on both sides of the Atlantic on Friday.

The Department of Homeland Security has begun an investigation into the DDoS (distributed denial-of-service) attack, the Guardian confirmed.

The incident took offline some of the most popular sites on the web, including Netflix, Twitter, Spotify, Reddit, CNN, PayPal, Pinterest and Fox News – as well as newspapers including the Guardian, the New York Times and the Wall Street Journal.

The attacks seemed to have been focused on Dyn, one of the companies that run the internet’s domain name system (DNS).

Amazon’s web services division, the world’s biggest cloud computing company, also reported an outage that lasted several hours on Friday morning.

2083.jpg

Sign up to the new-look Media Briefing: bigger, better, brighter
Read more
Doug Madory, director of internet analysis at Dyn, said he was not sure if the outages at Dyn and Amazon were connected.

“We provide service to Amazon, but theirs is a complex network so it is hard to be definitive about causality,” he said.

Amazon was not available for comment.

Dyn said it first became aware of the attack shortly after 7am ET on Friday. “We began monitoring and mitigating a DDoS [distributed denial-of-service] attack against our Dyn Managed DNS infrastructure,” the company said on its website.

The company sent out updates throughout the day, confirming a second attack at about noon and a third just after 4pm.

DDoS attacks are also becoming more common. Brian Krebs, an independent security researcher, observed earlier this month that the “source code” to the Mirai botnet had been released by a hacker group, “virtually guaranteeing that the internet will soon be flooded with attacks from many new botnets powered by insecure routers, IP cameras, digital video recorders and other easily hackable devices”.

The Mirai botnet is a network of devices infected with self-propagating malware; Krebs himself was attacked by the malware’s creators.

Cybersecurity firm Flashpoint attributed the attack to malware based on the Mirai source code. Krebs added his own investigation late Friday: “Separately, I have heard from a trusted source who’s been tracking this activity and saw chatter in the cybercrime underground yesterday discussing a plan to attack Dyn.”

Dyn was investigating another attack on Friday afternoon that caused similar problems to the outages experienced in the morning.

The firm said it was still trying to determine how the attack led to the outage. “Our first priority over the last couple of hours has been our customers and restoring their performance,” said executive vice-president Scott Hilton.

The tech website Gizmodo wrote: “This new wave of attacks seems to be affecting the West Coast of the United States and Europe. It’s so far unclear how the two attacks are related, but the outages are very similar.”

No one has yet claimed responsibility for the attacks, according to researchers.

Robert Page, lead penetration tester at security firm Redscan, said: “It’s interesting that nobody has yet claimed credit for the attack. The relative ease at which DDoS attacks are to execute, however, suggests that the perpetrators are most likely teenagers looking to cause mischief rather than malicious state-sponsored attackers.”

The attacks underline a serious vulnerability in the way the internet functions. David Gibson, of commercial security software firm Varonis, said: “DNS is one of the ageing technologies the industry is struggling to update, along with one-factor authentication (password-only security), unencrypted web connections – the list is very long, and the stakes have never been higher.”

In a widely shared essay, Someone Is Learning How to Take Down the Internet, respected security expert Bruce Schneier said recently that major internet infrastructure companies had been the subject of a series of significant DDoS attacks that looked like someone was trying to test their systems for weaknesses.

Schneier said he could not provide details because the companies provided him the information confidentially, but that he felt the need to warn the public of the potential threat.

“Someone is extensively testing the core defensive capabilities of the companies that provide critical Internet services,” he said.
 
May 11, 2008
22,149
1,401
126
Another link about the details of the mira IoT bot :

https://krebsonsecurity.com/2016/10/source-code-for-iot-botnet-mirai-released/

The source code that powers the “Internet of Things” (IoT) botnet responsible for launching the historically large distributed denial-of-service (DDoS) attack against KrebsOnSecurity last month has been publicly released, virtually guaranteeing that the Internet will soon be flooded with attacks from many new botnets powered by insecure routers, IP cameras, digital video recorders and other easily hackable devices. The leak of the source code was announced Friday on the English-language hacking community Hackforums. The malware, dubbed “Mirai,” spreads to vulnerable devices by continuously scanning the Internet for IoT systems protected by factory default or hard-coded usernames and passwords.
Vulnerable devices are then seeded with malicious software that turns them into “bots,” forcing them to report to a central control server that can be used as a staging ground for launching powerful DDoS attacks designed to knock Web sites offline.

Sources tell KrebsOnSecurity that Mirai is one of at least two malware families that are currently being used to quickly assemble very large IoT-based DDoS armies. The other dominant strain of IoT malware, dubbed “Bashlight,” functions similarly to Mirai in that it also infects systems via default usernames and passwords on IoT devices.

The security issue seems to be a combination of user error and weak design.
 
May 11, 2008
22,149
1,401
126
i have no IOT devices

go me


also i hate that term

I have also none, but i do worry about my TV which is a smart tv. It gets regular updates, so i assume and hope that any discovered security flaws get fixed too.
The raspberry pies i have are my own responsibility.

I also do not like the term. It is as if the person who invented it has a restricted vocabulary.

How about ICDs ? Internet Connected Device.
 
  • Like
Reactions: PliotronX

renz20003

Platinum Member
Mar 14, 2011
2,714
634
136
I have also none, but i do worry about my TV which is a smart tv. It gets regular updates, so i assume and hope that any discovered security flaws get fixed too.
The raspberry pies i have are my own responsibility.

I also do not like the term. It is as if the person who invented it has a restricted vocabulary.

How about ICDs ? Internet Connected Device.

That's crazy how these cheap devices crippled the net.

BTW SID Simple Internet Device sounds better.
 

Red Squirrel

No Lifer
May 24, 2003
70,135
13,561
126
www.anyf.ca
Here's what I don't get about this IoT thing, sure a lot of them are cloud based so if the cloud service gets hacked then they can take control of all of them, but it seems a lot of these attacks are direct. Are people literally port forwarding directly to these devices and exposing them to the outside?! With default passwords? I feel that someone that knows how to port forward would at very least change the password. Idealy, this stuff should not even be setup to be accessible from outside. Use VPN to get inside remotely if needed.

What actually does kinda surprise me is how big of an impact someone attacking Dyndns actually did. Did not figure that many major sites would be using that service.
 

Ruptga

Lifer
Aug 3, 2006
10,246
207
106
looks like the real problem was too many people using default passwords.
Which should surprise literally no one on this forum. The biggest security risk to any system is always its users, everything else can be controlled to at least some extent.
 

ultimatebob

Lifer
Jul 1, 2001
25,134
2,450
126
Someone should make a gray hat version of the IoT attack script that also looks for the default passwords of these devices and changes them to a randomly generated 20 character alphanumeric value. Bonus points if it e-mails the owner of the device the new password if the e-mail address is available.

Sure, people will bitch that their device "got hacked" and they had to change their password, but then it's better than them being part of a giant botnet.
 

Ruptga

Lifer
Aug 3, 2006
10,246
207
106
Someone should make a gray hat version of the IoT attack script that also looks for the default passwords of these devices and changes them to a randomly generated 20 character alphanumeric value. Bonus points if it e-mails the owner of the device the new password if the e-mail address is available.

Sure, people will bitch that their device "got hacked" and they had to change their password, but then it's better than them being part of a giant botnet.
The source code has been released, knock yourself out.
 

Red Squirrel

No Lifer
May 24, 2003
70,135
13,561
126
www.anyf.ca
Someone should make a gray hat version of the IoT attack script that also looks for the default passwords of these devices and changes them to a randomly generated 20 character alphanumeric value. Bonus points if it e-mails the owner of the device the new password if the e-mail address is available.

Sure, people will bitch that their device "got hacked" and they had to change their password, but then it's better than them being part of a giant botnet.

I would not even bother sending the password to them. They'd be locked out until they smarten up and don't expose that shit to the internet in first place.
 

John Connor

Lifer
Nov 30, 2012
22,757
618
121
Looks like Dyn is going to have to use some techniques to mitigate DDoS attacks in the future. I know CloudFlare and other companies use algorithms and what have you.
 

Imp

Lifer
Feb 8, 2000
18,828
184
106
I've been dumping devices and specifically not buying things with Wifi... Paranoid and old.

Seriously, I have a Wifi router with Wifi disabled and I got an RF meter to make sure it was actually off. Then I bought another router with an on/off button to be an AP that I leave off 99% of the time except when I need Wifi for my laptop a few times a year.

...Just realized my Ooma is plugged into my de-wireless'd router and it runs a wireless phone that's on 24/7. Damn.
 
  • Like
Reactions: lxskllr

lxskllr

No Lifer
Nov 30, 2004
59,381
9,912
126
I've been dumping devices and specifically not buying things with Wifi... Paranoid and old.

Seriously, I have a Wifi router with Wifi disabled and I got an RF meter to make sure it was actually off. Then I bought another router with an on/off button to be an AP that I leave off 99% of the time except when I need Wifi for my laptop a few times a year.

...Just realized my Ooma is plugged into my de-wireless'd router and it runs a wireless phone that's on 24/7. Damn.
It's just another needless security concern. Aside from the temporary amusement of remotely controlling things, I don't see how network connected gadgets would improve my life.
 

Red Squirrel

No Lifer
May 24, 2003
70,135
13,561
126
www.anyf.ca
I have wifi but I have it on a separate vlan, I do not like making stuff wireless unless it is specifically a mobile device. I wire everything that is stationary.

My biggest fear though is that Intel backdoor that was discovered a while back. It's essentially a separate cpu running on the same die. Very little is known about it, but essentially there is a backdoor where it can either use your NIC to communicate out, or it's built in 3G radio. There is very to little info about this or how to protect yourself. I was toying with a faraday cage for whole server room but it would require a pretty serious overhaul as I have a lot of stuff attached to the ceiling, not to mention the floor. And even if I succeed in blocking all RF, it can still use the NIC, and probably does so at a very low level so any amount of software firewall won't be enough. All the cpus/nics will just talk to each other at it's own layer 1, perhaps at a slightly different voltage or something. At least in theory. Little is known about how this actually works.

I would not be surprised if AMD does the same. This is probably mandated by the government.
 

Ruptga

Lifer
Aug 3, 2006
10,246
207
106
Disabling wireless protects you from wardrivers, and that's about it. Unsecured devices will pick up malware if they're connected to the internet in any way.
 

Red Squirrel

No Lifer
May 24, 2003
70,135
13,561
126
www.anyf.ca
Disabling wireless protects you from wardrivers, and that's about it. Unsecured devices will pick up malware if they're connected to the internet in any way.

Yeah but it's also good idea to not actually connect stuff directly to the internet. even a basic NAT firewall will protect you. That's what I'm wondering about all these IoT devices being hacked... are people actually connecting these stuff DIRECTLY, like without a router? Or are they actually port forwarding... telnet, of all things? It just seems strange to me.
 
  • Like
Reactions: Ken g6

Imp

Lifer
Feb 8, 2000
18,828
184
106
It's just another needless security concern. Aside from the temporary amusement of remotely controlling things, I don't see how network connected gadgets would improve my life.

You can masturbate in the shower without having to use your imagination now... or plugging your computer into a GFCI outlet.