• Guest
HabraHabr
  • Main
  • Users

  • Development
    • Programming
    • Information Security
    • Website development
    • JavaScript
    • Game development
    • Open source
    • Developed for Android
    • Machine learning
    • Abnormal programming
    • Java
    • Python
    • Development of mobile applications
    • Analysis and design of systems
    • .NET
    • Mathematics
    • Algorithms
    • C#
    • System Programming
    • C++
    • C
    • Go
    • PHP
    • Reverse engineering
    • Assembler
    • Development under Linux
    • Big Data
    • Rust
    • Cryptography
    • Entertaining problems
    • Testing of IT systems
    • Testing Web Services
    • HTML
    • Programming microcontrollers
    • API
    • High performance
    • Developed for iOS
    • CSS
    • Industrial Programming
    • Development under Windows
    • Image processing
    • Compilers
    • FPGA
    • Professional literature
    • OpenStreetMap
    • Google Chrome
    • Data Mining
    • PostgreSQL
    • Development of robotics
    • Visualization of data
    • Angular
    • ReactJS
    • Search technologies
    • Debugging
    • Test mobile applications
    • Browsers
    • Designing and refactoring
    • IT Standards
    • Solidity
    • Node.JS
    • Git
    • LaTeX
    • SQL
    • Haskell
    • Unreal Engine
    • Unity3D
    • Development for the Internet of things
    • Functional Programming
    • Amazon Web Services
    • Google Cloud Platform
    • Development under AR and VR
    • Assembly systems
    • Version control systems
    • Kotlin
    • R
    • CAD/CAM
    • Customer Optimization
    • Development of communication systems
    • Microsoft Azure
    • Perfect code
    • Atlassian
    • Visual Studio
    • NoSQL
    • Yii
    • Mono и Moonlight
    • Parallel Programming
    • Asterisk
    • Yandex API
    • WordPress
    • Sports programming
    • Lua
    • Microsoft SQL Server
    • Payment systems
    • TypeScript
    • Scala
    • Google API
    • Development of data transmission systems
    • XML
    • Regular expressions
    • Development under Tizen
    • Swift
    • MySQL
    • Geoinformation services
    • Global Positioning Systems
    • Qt
    • Dart
    • Django
    • Development for Office 365
    • Erlang/OTP
    • GPGPU
    • Eclipse
    • Maps API
    • Testing games
    • Browser Extensions
    • 1C-Bitrix
    • Development under e-commerce
    • Xamarin
    • Xcode
    • Development under Windows Phone
    • Semantics
    • CMS
    • VueJS
    • GitHub
    • Open data
    • Sphinx
    • Ruby on Rails
    • Ruby
    • Symfony
    • Drupal
    • Messaging Systems
    • CTF
    • SaaS / S+S
    • SharePoint
    • jQuery
    • Puppet
    • Firefox
    • Elm
    • MODX
    • Billing systems
    • Graphical shells
    • Kodobred
    • MongoDB
    • SCADA
    • Hadoop
    • Gradle
    • Clojure
    • F#
    • CoffeeScript
    • Matlab
    • Phalcon
    • Development under Sailfish OS
    • Magento
    • Elixir/Phoenix
    • Microsoft Edge
    • Layout of letters
    • Development for OS X
    • Forth
    • Smalltalk
    • Julia
    • Laravel
    • WebGL
    • Meteor.JS
    • Firebird/Interbase
    • SQLite
    • D
    • Mesh-networks
    • I2P
    • Derby.js
    • Emacs
    • Development under Bada
    • Mercurial
    • UML Design
    • Objective C
    • Fortran
    • Cocoa
    • Cobol
    • Apache Flex
    • Action Script
    • Joomla
    • IIS
    • Twitter API
    • Vkontakte API
    • Facebook API
    • Microsoft Access
    • PDF
    • Prolog
    • GTK+
    • LabVIEW
    • Brainfuck
    • Cubrid
    • Canvas
    • Doctrine ORM
    • Google App Engine
    • Twisted
    • XSLT
    • TDD
    • Small Basic
    • Kohana
    • Development for Java ME
    • LiveStreet
    • MooTools
    • Adobe Flash
    • GreaseMonkey
    • INFOLUST
    • Groovy & Grails
    • Lisp
    • Delphi
    • Zend Framework
    • ExtJS / Sencha Library
    • Internet Explorer
    • CodeIgniter
    • Silverlight
    • Google Web Toolkit
    • CakePHP
    • Safari
    • Opera
    • Microformats
    • Ajax
    • VIM
  • Administration
    • System administration
    • IT Infrastructure
    • *nix
    • Network technologies
    • DevOps
    • Server Administration
    • Cloud computing
    • Configuring Linux
    • Wireless technologies
    • Virtualization
    • Hosting
    • Data storage
    • Decentralized networks
    • Database Administration
    • Data Warehousing
    • Communication standards
    • PowerShell
    • Backup
    • Cisco
    • Nginx
    • Antivirus protection
    • DNS
    • Server Optimization
    • Data recovery
    • Apache
    • Spam and antispam
    • Data Compression
    • SAN
    • IPv6
    • Fidonet
    • IPTV
    • Shells
    • Administering domain names
  • Design
    • Interfaces
    • Web design
    • Working with sound
    • Usability
    • Graphic design
    • Design Games
    • Mobile App Design
    • Working with 3D-graphics
    • Typography
    • Working with video
    • Work with vector graphics
    • Accessibility
    • Prototyping
    • CGI (graphics)
    • Computer Animation
    • Working with icons
  • Control
    • Careers in the IT industry
    • Project management
    • Development Management
    • Personnel Management
    • Product Management
    • Start-up development
    • Managing the community
    • Service Desk
    • GTD
    • IT Terminology
    • Agile
    • Business Models
    • Legislation and IT-business
    • Sales management
    • CRM-systems
    • Product localization
    • ECM / EDS
    • Freelance
    • Venture investments
    • ERP-systems
    • Help Desk Software
    • Media management
    • Patenting
    • E-commerce management
    • Creative Commons
  • Marketing
    • Conferences
    • Promotion of games
    • Internet Marketing
    • Search Engine Optimization
    • Web Analytics
    • Monetize Web services
    • Content marketing
    • Monetization of IT systems
    • Monetize mobile apps
    • Mobile App Analytics
    • Growth Hacking
    • Branding
    • Monetize Games
    • Display ads
    • Contextual advertising
    • Increase Conversion Rate
  • Sundry
    • Reading room
    • Educational process in IT
    • Research and forecasts in IT
    • Finance in IT
    • Hakatonas
    • IT emigration
    • Education abroad
    • Lumber room
    • I'm on my way

Security Week 36: Telnet should be closed

Security Week 36: Telnet should be closed Telnet is a very old protocol. Wikipedia reports that it was developed in 196? for many years it was actively used for remote access to computers and servers, both under Unix /Linux and for systems under Windows (telnet could be included in Windows NT and in Windows 2000). The same Wikipedia reports that the use of Telnet has gradually disappeared in favor of a more secure SSH protocol. And it happened, not counting millions of autonomous network devices - basically routers and IP cameras, which "answer" for this protocol, often without the owner's knowledge.
 
 
Two weeks ago we discussed vulnerabilities in routers. Mikrotik . But that vulnerability - there is still something to crack. Published last week study Kaspersky Lab shows that the majority (three quarters) of all attacks on IoT devices are attacks on the Telnet protocol. If your device is responsible for this protocol, especially if it is available from the Internet - think about whether it's time to stop it. The exception is only one: if you are broadcasting via Telnet " Star Wars ".
 
caught , but its source code was placed in open access, so that the capture of those responsible for the outbreak of the epidemic in 2016 could not prevent further attacks. More information about Mirai can be read here , but the picture below clearly shows which sets of login-password the botnet is trying to expand.
 
 


 
For these pairs it is possible to identify a vulnerable device: IP camera, set-top box, digital video recorder, network printer and so on. There is a certain competition between the creators of botnets: hence the large number of requests to any devices that accept them via Telnet or SSH protocols, and the tendency to change the password after a successful attack - otherwise the next will try to install its monitoring software on the device.
 
 

 
By country, "attackers" are distributed like this. In the first place, Brazil, a country that has already been mentioned in the news about IoT-botnets. In total, "hanipot" recorded 12 million attacks with 8?560 unique IP-addresses, another 27 thousand IP participated in the distribution of malicious software. Interestingly, the number of attacking IPs was much less than the total number of infected devices. Explanations here can be several: finding infected devices for NAT, use for attacks only a small part of the botnet or something else. As it usually happens, monitoring the actions of cybercriminals gives only part of the overall picture.
 
 
You can evaluate the power of the botnet when it is used for its intended purpose. In 201? the attack power on the DNS provider Dyn has exceeded 1 terabit per second, it was produced with more than 10?000 botnets controlled by the Mirai botnet. However, Kaspersky Lab experts rightly point out that "paradise life" with millions of devices that are closed only with the default password will eventually end. The next step is still the exploitation of vulnerabilities in IoT-devices, which does not require the presence of a default password. Such more complex attacks can be carried out by the Reaper botnet.
 
 
Here are some examples of vulnerabilities given: obtaining full control above the routers D-Link 850L; IP-cameras with features " direct access "From the outside by serial number with a further password brute force; a video surveillance system with access to the simplest and an easily forged cookie.
 
 

 
But this is all in the future, but for now the tablet above makes it clear that more than 90% of attacks on IoT is a banal brute force. Vulnerabilities are still not required . I will not even talk about specialized administration interfaces, but in the report and about them a lot is written .
 
 
This is some kind of complete lack of basic remedies. Twenty years ago it was in the order of things to connect to the mail server via an unprotected POP3 protocol, pass the passwords to the messenger server in clear. The Internet was young and naive. Now to produce devices with such an attitude to safety - well, if you put it very gently, short-sighted. What to do? First of all, do not make IoT-devices accessible from the network. VPN all to help. Of course, this advice is useless for those with an IP camera, and there is no idea of ​​what Telnet and VPN are.
 
 
Is it worth it to hope that manufacturers will gradually improve the safety of IoT devices? This will not cancel the availability of millions of known vulnerable products in the network, which, unlike smartphones and laptops, are not updated for years. And everything is so bad that the well-known cryptographer Bruce Schneier called for state regulation of the industry - well, what is perceived with hostility against the actual cryptography. Are there any other ways? Not very clear.
 
 
Here to you at last the latest news is . Vulnerability was detected in WD My Cloud routers. I quote: "Since the implementation of the CGI interface of Western Digital network drives allows for the use of cookies for authentication, the attacker can submit an HTTP request during the session to execute any command by including the Cookie line: username = admin".
 
 

 
Disclaimer: The opinions expressed in this digest may not always coincide with the official position of Kaspersky Lab. Dear editorial staff generally recommends that you treat any opinions with healthy skepticism.

It may be interesting

  • Comments
  • About article
  • Similar news
This publication has no comments.

weber

Author

24-09-2018, 19:35

Publication Date

Development / Information Security

Category
  • Comments: 0
  • Views: 314
In addition to IoT: the Mirai botnet
Guide to Mikrotik RoMON
How SSH appeared on port 22
The game of hide-and-seek, or the first
Vulnerability Mikrotik allows you to
Why put on the Internet a management
Write a comment
Name:*
E-Mail:


Comments
At homeschooling 101, our goal is to empowering parents to develop and provide the ideal school set-up for their children right at the comforts of their home. Check Out: Online Education for Kids


We take being #1 in Commercial Odor Remover Products & Systems very seriously.  Here are some of the reasons you can trust Cupridyne Clean to bring you a solution to your Commercial Odor Control problem.
Yesterday, 19:00

noorseo

Major Thanks for the post.p2p4u

Yesterday, 17:02

ss

I genuinely believed you would probably have something useful to say. All I hear is a bunch of whining about something that you can fix if you were not too busy looking for attention. After all, I know it was my choice to read .. [url = https: //gamebnat.net] 먹튀 [/ url]

Yesterday, 15:56

raymond weber

Lots of interesting comments, but it feels like users are really experts in their field, and it's very cool!
Yesterday, 15:49

claudedufont

This is a good idea, thank you very much to the author!
Yesterday, 15:47

claudedufont

Adv
Website for web developers. New scripts, best ideas, programming tips. How to write a script for you here, we have a lot of information about various programming languages. You are a webmaster or a beginner programmer, it does not matter, useful articles will help to make your favorite business faster.

Login

Registration Forgot password