Cyber attack yesterday, was possibly powered by IoT devices

Page 2 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.

Billb2

Diamond Member
Mar 25, 2005
3,035
70
86
Still waiting for the first pacemaker hack..............
If that happens things will move along quickly when CNN goes ballistic.
 

VirtualLarry

No Lifer
Aug 25, 2001
56,571
10,206
126
Hmm, my internet went out the other day, and my FIOS router's power light was flashing green, for a short bit. Seemed like a soft-reset? Maybe due to a firmware flash?

Initially, I thought that Verizon was updating the firmware to block out this botnet, but now I think it might be 0wn3d by the botnet.

I know that Verizon FIOS routers are open to the "outside", at least to the extent that the manageability ports are open from the outside. They're supposedly protected, but who knows how well.
 

Ichinisan

Lifer
Oct 9, 2002
28,298
1,235
136
I have wifi but I have it on a separate vlan, I do not like making stuff wireless unless it is specifically a mobile device. I wire everything that is stationary.

My biggest fear though is that Intel backdoor that was discovered a while back. It's essentially a separate cpu running on the same die. Very little is known about it, but essentially there is a backdoor where it can either use your NIC to communicate out, or it's built in 3G radio. There is very to little info about this or how to protect yourself. I was toying with a faraday cage for whole server room but it would require a pretty serious overhaul as I have a lot of stuff attached to the ceiling, not to mention the floor. And even if I succeed in blocking all RF, it can still use the NIC, and probably does so at a very low level so any amount of software firewall won't be enough. All the cpus/nics will just talk to each other at it's own layer 1, perhaps at a slightly different voltage or something. At least in theory. Little is known about how this actually works.

I would not be surprised if AMD does the same. This is probably mandated by the government.
https://www.youtube.com/watch?v=EjbQ-BDh4PU#t=1m19s

Watch from 1m19s to 2m12s.
 

Ichinisan

Lifer
Oct 9, 2002
28,298
1,235
136
Yeah but it's also good idea to not actually connect stuff directly to the internet. even a basic NAT firewall will protect you. That's what I'm wondering about all these IoT devices being hacked... are people actually connecting these stuff DIRECTLY, like without a router? Or are they actually port forwarding... telnet, of all things? It just seems strange to me.
Devices can open up ports using UPnP. Also, with IPv6, there's no such thing as NAT.
 

Eug

Lifer
Mar 11, 2000
24,046
1,675
126
What devices are we talking about? I can't any reference anywhere as to specific models hacked. I'm curious because not only do they need to be compromised, they also have to be directed to attack somehow. Are they writing scripts for all of these?

And yeah, whoever coined the phrase "Internet of Things" should be shot. The name is insanely stupid.
 

Ken g6

Programming Moderator, Elite Member
Moderator
Dec 11, 1999
16,618
4,533
75
What devices are we talking about? I can't any reference anywhere as to specific models hacked. I'm curious because not only do they need to be compromised, they also have to be directed to attack somehow. Are they writing scripts for all of these?
Mirai supposedly hacks devices running BusyBox. Beyond that I suppose it's either a case of finding exploits or having a list of default passwords.
 

Red Squirrel

No Lifer
May 24, 2003
70,148
13,565
126
www.anyf.ca
Devices can open up ports using UPnP. Also, with IPv6, there's no such thing as NAT.

Oh yikes do these actually open up ports with UPnP? Definitely a stupid implementation if that's the case. UPnP in general is a bad idea and should be turned off, but often is not. Lack of NAT in IPv6 is an issue too, I knew it would be from the get go when I heard about it but it seems to hurt lot of IPv6 people's feelings when you mention NAT. :p With a proper firewall like pfsense you don't necessarily need NAT, but most people won't have that.


But yeah typically if something like this gets exploited the script is then loaded and then other devices are exploited from it.

I enabled SSH without fail2ban on an internet facing VM once for fun. It was hacked within 5-10 minutes. By the time I noticed (my internet was essentially part of a DDoS at this point so it took no more than a few minutes to narrow it down) my hacked VM had already hacked 3 different SSH servers. One was a university somewhere in the states and another was some kind of federal server of sorts. IP was owned by DoD. I can't recall what the other was, just something less high profile like another home user or something. The script was nice enough to leave logs of what it did. Just comes to show how fast it can happen without proper security in place.
 

Imp

Lifer
Feb 8, 2000
18,828
184
106
Hmm, my internet went out the other day, and my FIOS router's power light was flashing green, for a short bit. Seemed like a soft-reset? Maybe due to a firmware flash?

Initially, I thought that Verizon was updating the firmware to block out this botnet, but now I think it might be 0wn3d by the botnet.

I know that Verizon FIOS routers are open to the "outside", at least to the extent that the manageability ports are open from the outside. They're supposedly protected, but who knows how well.

A router/modem that auto-updates? I'm surprised... but I shouldn't considering that my cable box does it every freaking night at 2am.
 

ultimatebob

Lifer
Jul 1, 2001
25,134
2,450
126
I would not even bother sending the password to them. They'd be locked out until they smarten up and don't expose that shit to the internet in first place.

Yeah, but I'd bet that a lot of people would probably think that the "device went screwy" and do a factory reset on it. Now they're back to the insecure factory password settings.
 

zinfamous

No Lifer
Jul 12, 2006
111,695
31,043
146
Robert Page, lead penetration tester at security firm Redscan, said: “It’s interesting that nobody has yet claimed credit for the attack. The relative ease at which DDoS attacks are to execute, however, suggests that the perpetrators are most likely teenagers looking to cause mischief rather than malicious state-sponsored attackers.”

Lead Penetration Tester.

How do I get that job?
 

Ruptga

Lifer
Aug 3, 2006
10,246
207
106
Lead Penetration Tester.

How do I get that job?
So you're looking to test some penetrators?
scheming.gif
 

PliotronX

Diamond Member
Oct 17, 1999
8,883
107
106
I have also none, but i do worry about my TV which is a smart tv. It gets regular updates, so i assume and hope that any discovered security flaws get fixed too.
The raspberry pies i have are my own responsibility.

I also do not like the term. It is as if the person who invented it has a restricted vocabulary.

How about ICDs ? Internet Connected Device.
I prefer to think of it as IoDP: Internet of Default Passwords
 

[DHT]Osiris

Lifer
Dec 15, 2015
17,143
16,302
146
A camera with ipv6? Sure! 1Gb/full duplex connection? why not! What other shit can we throw on there? How about a telnet server? Can we squeeze a few backdoor usernames, you know, for 'patching'? Let's make it do dns queries and phone home to stuff we'll take offline! Moar cloud! Moar ipv6 addresses!
 

Red Squirrel

No Lifer
May 24, 2003
70,148
13,565
126
www.anyf.ca
Here's an IoT self scanner

http://iotscanner.bullguard.com/

(It doesn't actually scan - it just checks if your IP is already listed)

I have port 80 opened for something but if you go to it it just goes to a place holder page, so it seems to think that it's an IoT device. I'm guessing this is nothing more than just a port scanner. Still useful though if you want to double check if you have anything accessible from the outside.

Which got me thinking, would be neat to setup a site where it does a full nmap of your IP and emails you the results. (it can take a while to do a full scan). Wonder if there's any legal repercussions to setting something like this up.
 

KillerBee

Golden Member
Jul 2, 2010
1,750
82
91
I have port 80 opened for something but if you go to it it just goes to a place holder page, so it seems to think that it's an IoT device. I'm guessing this is nothing more than just a port scanner. Still useful though if you want to double check if you have anything accessible from the outside.

Which got me thinking, would be neat to setup a site where it does a full nmap of your IP and emails you the results. (it can take a while to do a full scan). Wonder if there's any legal repercussions to setting something like this up.

they also have the deep scanner
http://iotscanner.bullguard.com/deep-scan/
 

Eug

Lifer
Mar 11, 2000
24,046
1,675
126
Here's an IoT self scanner

http://iotscanner.bullguard.com/

(It doesn't actually scan - it just checks if your IP is already listed)
B2170C9D-D896-42AD-8D7B-37BBA70AD9B8_zpsodtaxfe6.png


That message in orange is concerning though. How does the Shodan indexing work?

Thanks guys. I have IP cameras but don't expose them to the net and have changed the default passwords. I also have a couple of NASes, but with the latest OS and security updates, and they are also not accessible over the net.

4AC5ACDC-E563-4FD0-83F6-4C85FE8F814F_zpswbvmhblb.png


Xiongmai recalls 4 million IP cameras after DDoS attack.

http://time.com/4543930/china-firm-webcam-recall-cyberattack-xiongmai/

Researchers at the New York-based cybersecurity firm Flashpoint said most of the junk traffic heaped on Dyn came from internet-connected cameras and video-recording devices that had components made by Xiongmai. Those components had little security protection, so devices they went into became easy to exploit.

In an acknowledgement of its products’ role in the hack, Xiongmai said Monday that it would recall products sold in the U.S. before April 2015 to demonstrate “social responsibility.” It said products sold after that date had been patched and no longer constitute a danger.

Liu Yuexin, Xiongmai’s marketing director, said in an interview on Tuesday that Xiongmai and other companies across the home surveillance equipment industry were made aware of the vulnerability in April 2015. Liu said Xiongmai moved quickly to plug the gaps and should not be singled out for criticism.

“We don’t know why there is a spear squarely pointed at our chest,” Liu said.
 
Last edited:

Kaido

Elite Member & Kitchen Overlord
Feb 14, 2004
50,711
6,748
136
“We don’t know why there is a spear squarely pointed at our chest,” Liu said.

I actually agree with them, to a point. The problem is the lesson I learned in programming class: don't allow your users to do stupid stuff. All they need to do on future models is require a password change the moment you connect to the device...like literally not let the user get into the settings without providing the webcam with a new password. People constantly have problems with hacks & stuff like this because they don't change their default Linksys password from admin/admin to something else. The problem is, most people are not technical enough to know that they should do that, therefore the company does have a social responsibility to tweak the software to stupid-proof it. Same with email...imo 2FA should be required on everything. Mandatory quarterly password changes should be required. Amazon, Gmail, Outlook, Hotmail, Yahoo, you name it. Force your customers to protect themselves.
 

Fritzo

Lifer
Jan 3, 2001
41,920
2,161
126
My SmartTV actually got infected by a "free movie" app on the Samsung store. I detected the traffic on my Juniper firewall a few weeks ago and ended up resetting the TV.

Wonder if something similar was the entry-point on other devices.
 

Ruptga

Lifer
Aug 3, 2006
10,246
207
106
I actually agree with them, to a point. The problem is the lesson I learned in programming class: don't allow your users to do stupid stuff. All they need to do on future models is require a password change the moment you connect to the device...like literally not let the user get into the settings without providing the webcam with a new password. People constantly have problems with hacks & stuff like this because they don't change their default Linksys password from admin/admin to something else. The problem is, most people are not technical enough to know that they should do that, therefore the company does have a social responsibility to tweak the software to stupid-proof it. Same with email...imo 2FA should be required on everything. Mandatory quarterly password changes should be required. Amazon, Gmail, Outlook, Hotmail, Yahoo, you name it. Force your customers to protect themselves.
Hah, spear, to a point.

And how about no on that two-factor thing. Also the quarterly reset thing, I already have to do that and you know what I (and pretty much everyone else) do every single time? XXXXXX1, then next time it's XXXXXX2, and so on until it lets me reuse XXXXXX1. All it does is annoy users while marginally increasing password complexity. Policies that work will help without getting in the way, like how routers these days come with a preset password that's unique and in big print on the side of the unit.
 

Kaido

Elite Member & Kitchen Overlord
Feb 14, 2004
50,711
6,748
136
My SmartTV actually got infected by a "free movie" app on the Samsung store. I detected the traffic on my Juniper firewall a few weeks ago and ended up resetting the TV.

Wonder if something similar was the entry-point on other devices.

That's one of the things that scares me about putting Android in everything...massive security risks. Viruses, malware, botnets, you name it. As much as everyone complains about iOS being a walled garden, at least you can't download a fake free version of Angry Birds from Russian & get charged in a scam attack.