Vulnerabilities / Threats
11/14/2013
04:59 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

What The Carna Botnet Also Found

Researcher at Black Hat Brazil to present new data and analysis of the controversial Internet Census project

The researcher who rocked the security world earlier this year by revealing he had built a botnet to conduct a census of the Internet remains anonymous, but has passed to a white-hat researcher more security findings from the controversial project.

Parth Shukla, an information security analyst with Australia's Computer Emergency Response Team (AusCERT), says he was interested in how Australian consumers had fared in the so-called Carna Botnet experiment, so earlier this year he decided to email the researcher via the PGP key included in the Internet Census 2012 report that was posted online in March. Shukla admits he was surprised when the researcher responded and ultimately handed over to him all of the data on the more than 1.2 million vulnerable consumer devices found around the globe by the botnet.

"No one else had been in touch with him," says Shukla, who was the only one the researcher decided should have the data once he began analyzing it. "Who he is, I have no idea. We used PGP keys to communicate, and I kept using some questions to be sure he was the guy and not giving fake data."

For months Shukla has been analyzing the data to gain a better understanding of the security implications of the findings, and he plans to share more of his analysis and data at the Black Hat Regional Summit in Sao Paolo, Brazil, taking place Nov. 26 to 27. He has presented data in Australia and, most recently, China that focuses on how each region fares with these vulnerable devices.

Among the findings he culled from the botnet data: More than 2,000 different manufacturers' products were wide open to access via a Telnet connection over the public Internet, and 28 percent of them were Chinese vendor ZTE's products. China also made up the largest percentage of infected and prone devices, with 56 percent of the vulnerable devices (720,141), while Hong Kong was home to 7 percent of infections (91,453), and Brazil had 2 percent, (30,242 devices). The U.S., meanwhile, also accounted for some 2 percent of the prone devices, with 24,243.

By region, Asia accounted for 78 percent of the vulnerable equipment; Europe, 13 percent; South America, 5 percent; North America, 3 percent; and Africa, 1 percent.

"I was shocked he didn't mention in [his] paper the wealth of information in the data ... it was only the census data" in his paper, Shukla says.

Modems, home routers, Web cameras, and other consumer devices were found wide open to the Internet with default usernames and passwords via the Telnet protocol, he says. "It's pretty concerning," he says. "Manufacturers are creating the devices this way -- the user is unaware of it and plugging it straight into the Internet."

[Created by an anonymous researcher, the Carna botnet found that 1.2 million Internet-connected devices are trivially exploitable, but the illegality of the methods raises doubts. See Carna Compromise Delivers Data, But Casts Suspicions.]

Shukla says it would take an average of 60 seconds to find a vulnerable device in China via a scan of the Internet.

Legitimate scanning of the Internet for vulnerable devices -- not infecting them with bot code like the Carna Botnet did -- is all the rage these days. Renowned researcher HD Moore has pioneered legal scanning of the Net, most recently illuminating exposure of some 35,000 enterprise servers via a flawed firmware interface that could leave a data center open to outside attack. Moore also helped spearhead the new community Internet-scanning Project Sonar initiative. The goal of Project Sonar, which also includes the University of Michigan, is for researchers to share their data, help educate vendors whose products are discovered via the scans, and, ultimately, to raise public awareness of the vulnerability of this Internet-facing equipment.

AusCERT's Shukla says awareness is crucial to remedying the practice of leaving Internet-connected devices exposed. Even so, it's a long road: "I've only heard back from one vendor in the top 25" found from the Carna Botnet project, he says. "And I haven't heard back from them in months."

Shukla's research paper on his exclusive analysis of the Carna Botnet findings is here.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.