Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 15 submissions in the queue.
posted by martyb on Friday October 14 2016, @06:22AM   Printer-friendly
from the fast-forwarding? dept.

Millions of IoT devices have already been compromised and abused for distributed denial-of-service (DDoS) attacks and millions more are affected by critical vulnerabilities that make them an easy target for malicious actors.

While in many cases attackers hack IoT devices and leverage them to conduct attacks directly, researchers at Akamai have come across a different type of mass attack in which the compromised systems are used as proxies that route malicious traffic.

These attacks, dubbed by Akamai SSHowDowN Proxy attacks, have abused vulnerable CCTV, NVR, DVR, networking, storage and satellite antenna equipment to conduct HTTP-based credential stuffing campaigns. The breached devices are also used as an entry point to the internal networks that house them.

Read more at SecurityWeek.com


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 4, Informative) by stormwyrm on Friday October 14 2016, @08:04AM

    by stormwyrm (717) on Friday October 14 2016, @08:04AM (#414194) Journal

    The attack references CVE-2004-1653 [mitre.org], which states: "The default configuration for OpenSSH enables AllowTcpForwarding, which could allow remote authenticated users to perform a port bounce, when configured with an anonymous access program such as AnonCVS." (emphasis added) The man page sshd_config(5) says the following about AllowTcpForwarding:

    Specifies whether TCP forwarding is permitted. The available options are “yes” or “all” to allow TCP forwarding, “no” to prevent all TCP forwarding, “local” to allow local (from the perspective of ssh(1)) forwarding only or “remote” to allow remote forwarding only. The default is “yes”. Note that disabling TCP forwarding does not improve security unless users are also denied shell access, as they can always install their own forwarders.

    So, to begin with, you already have to have authenticated access on the compromised host to use this attack. CVE-2004-1653 was first observed with anonymous CVS systems where an anonymous account normally used to access CVS code repositories could be exploited to do port forwarding. You get access, but since the anonymous account doesn't have a usable shell, you can't log in, but if port forwarding is enabled, you could use the anonymous connection to make connections to other systems as though you were the CVS server. It isn't exactly clear from TFA (Akamai [akamai.com] [PDF] has more detail) but are they trying to say that you can access these default administrator accounts via SSH but they won't give you a shell, same as with an AnonCVS server, but one can abuse the account to do port forwarding. The main problem then, is that no one ever bothered to change the default administrator password. If you don't do that, then well, you're just asking to be exploited in one way or another.

    --
    Numquam ponenda est pluralitas sine necessitate.
    Starting Score:    1  point
    Moderation   +2  
       Informative=2, Total=2
    Extra 'Informative' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   4  
  • (Score: 4, Informative) by Fnord666 on Friday October 14 2016, @02:58PM

    by Fnord666 (652) on Friday October 14 2016, @02:58PM (#414315) Homepage

    The main problem then, is that no one ever bothered to change the default administrator password. If you don't do that, then well, you're just asking to be exploited in one way or another.

    The real issue is that these devices are shipped with default username and password combinations that the end user cannot change!

    The problem is that many vendors ship their products with insecure default settings and users often don’t have the possibility to make configuration changes that would prevent attacks.

    • (Score: 2) by DannyB on Friday October 14 2016, @08:33PM

      by DannyB (5839) Subscriber Badge on Friday October 14 2016, @08:33PM (#414442) Journal

      It seems to me that the real issue is the very existence of a default administrator.

      If there has to be a default, make it unique, with a printed sticker on the device. Yeah, I know, that has to be integrated into the assembly process.

      --
      To transfer files: right-click on file, pick Copy. Unplug mouse, plug mouse into other computer. Right-click, paste.