Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:20 PM
Connect Directly

Deutsche Telekom Attacks Suggest Mirai Threat Poised To Become Much Larger

With attack, Mirai has added an exploit targeting Web service vulnerability.

A cyberattack that crippled Internet services for nearly one million customers of Deutsche Telekom earlier this week suggests that the threat posed by the Mirai IoT botnet malware is about to get a lot larger.

The attack is the first since Mirai surfaced in October that does not rely on weak and default passwords in routers, webcams, digital video recorders, and other so-called Internet of Things devices.

Instead it targeted a specific vulnerability in a management interface present in routers used by many customers of Deutsche Telekom with the goal of infecting the devices and making them part of a Mirai botnet. The infection attempts failed but nevertheless caused the routers to crash.

“Until now, Mirai just used weak passwords to exploit devices like routers. But with this version, it adds an exploit for a vulnerability in a web service,” says Johannes Ullrich, dean of research at the SANS Institute.

The kind of vulnerability that was exploited in the attack is very common, he says. “What we see right now is more or less just a tip of the iceberg. By adding this exploit, Mirai gained access to many more devices then it already had,” he said.

The disruptions for Deutsche Telekom customers started Sunday and continued through parts of early Monday. In all, about 900,000 customers, representing about 4% of the company’s 20 million fixed-line customers, were impacted in the attack, Deutsche Telekom said in a FAQ and alert on the incident.

By early Monday, the company had begun rolling out patches for the problem to affected customers. It advised customers to unplug their router for 30 seconds and then power the device back on for the update to take hold. It also offered a location where users could go to download the update manually and install it on their routers.

The fact that threat actors are attempting to distribute Mirai by exploiting software vulnerabilities in IoT devices is troubling, says Craig Young, security researcher at Tripwire.

“The most defining attribute is that this Mirai variant is propagating through a specific vulnerability rather than relying on poorly configured devices,” Young says. “The last wave of attacks would seek out devices with exposed Telnet or SSH management and attempt to guess passwords.”

Device owners could easily thwart such attacks by using a strong password or not directly exposing the management service to the Internet, Young says.

In contrast “this attack could not be blocked through any configuration change made by the end user,” Young says. “The management protocol being attacked is exposed in the device configuration required by various ISPs and is not one that consumers could disable,” on their own without a vendor-supplied patch, Young says.

In a SANS Internet Storm Center advisory, Ullrich identified the Deutsche Telekom routers that were attacked as originating from Acadyn, a Taiwanese modem manufacturer. But the vulnerable interface is present in other routers as well, including those from Zyxel, a maker of modems used by Irish ISP Eir, Ullrich said in the alert.

A count performed using the Shodan Internet scanning tool shows the total number of devices listening in on the port used by the management interface is as large as 40 million. But not all of them are likely to run the vulnerable implementations that were present in the Deutsche Telekom routers. “My personal "best guess" is that this vulnerability may have added 1-2 Million new bots to the Mirai botnet,” Ullrich wrote in the alert.

Related stories:


Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/1/2020
Stay-at-Home Orders Coincide With Massive DNS Surge
Robert Lemos, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-06-01
ZTE's PON terminal product is impacted by the access control vulnerability. Due to the system not performing correct access control on some program interfaces, an attacker could use this vulnerability to tamper with the program interface parameters to perform unauthenticated operations. This affects...
PUBLISHED: 2020-06-01
reel through 0.6.1 allows Request Smuggling attacks due to incorrect Content-Length and Transfer encoding header parsing. It is possible to conduct HTTP request smuggling attacks by sending the Content-Length header twice. Furthermore, invalid Transfer Encoding headers were found to be parsed as val...
PUBLISHED: 2020-06-01
The file editing functionality in the Atlassian Companion App before version 1.0.0 allows local attackers to have the app run a different executable in place of the app's cmd.exe via a untrusted search path vulnerability.
PUBLISHED: 2020-06-01
The file downloading functionality in the Atlassian Companion App before version 1.0.0 allows remote attackers, who control a Confluence Server instance that the Companion App is connected to, execute arbitrary .exe files via a Protection Mechanism Failure.
PUBLISHED: 2020-06-01
Affected versions are: Before 8.5.5, and from 8.6.0 before 8.8.1 of Atlassian Jira Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the XML export view.