Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:20 PM
Connect Directly

Deutsche Telekom Attacks Suggest Mirai Threat Poised To Become Much Larger

With attack, Mirai has added an exploit targeting Web service vulnerability.

A cyberattack that crippled Internet services for nearly one million customers of Deutsche Telekom earlier this week suggests that the threat posed by the Mirai IoT botnet malware is about to get a lot larger.

The attack is the first since Mirai surfaced in October that does not rely on weak and default passwords in routers, webcams, digital video recorders, and other so-called Internet of Things devices.

Instead it targeted a specific vulnerability in a management interface present in routers used by many customers of Deutsche Telekom with the goal of infecting the devices and making them part of a Mirai botnet. The infection attempts failed but nevertheless caused the routers to crash.

“Until now, Mirai just used weak passwords to exploit devices like routers. But with this version, it adds an exploit for a vulnerability in a web service,” says Johannes Ullrich, dean of research at the SANS Institute.

The kind of vulnerability that was exploited in the attack is very common, he says. “What we see right now is more or less just a tip of the iceberg. By adding this exploit, Mirai gained access to many more devices then it already had,” he said.

The disruptions for Deutsche Telekom customers started Sunday and continued through parts of early Monday. In all, about 900,000 customers, representing about 4% of the company’s 20 million fixed-line customers, were impacted in the attack, Deutsche Telekom said in a FAQ and alert on the incident.

By early Monday, the company had begun rolling out patches for the problem to affected customers. It advised customers to unplug their router for 30 seconds and then power the device back on for the update to take hold. It also offered a location where users could go to download the update manually and install it on their routers.

The fact that threat actors are attempting to distribute Mirai by exploiting software vulnerabilities in IoT devices is troubling, says Craig Young, security researcher at Tripwire.

“The most defining attribute is that this Mirai variant is propagating through a specific vulnerability rather than relying on poorly configured devices,” Young says. “The last wave of attacks would seek out devices with exposed Telnet or SSH management and attempt to guess passwords.”

Device owners could easily thwart such attacks by using a strong password or not directly exposing the management service to the Internet, Young says.

In contrast “this attack could not be blocked through any configuration change made by the end user,” Young says. “The management protocol being attacked is exposed in the device configuration required by various ISPs and is not one that consumers could disable,” on their own without a vendor-supplied patch, Young says.

In a SANS Internet Storm Center advisory, Ullrich identified the Deutsche Telekom routers that were attacked as originating from Acadyn, a Taiwanese modem manufacturer. But the vulnerable interface is present in other routers as well, including those from Zyxel, a maker of modems used by Irish ISP Eir, Ullrich said in the alert.

A count performed using the Shodan Internet scanning tool shows the total number of devices listening in on the port used by the management interface is as large as 40 million. But not all of them are likely to run the vulnerable implementations that were present in the Deutsche Telekom routers. “My personal "best guess" is that this vulnerability may have added 1-2 Million new bots to the Mirai botnet,” Ullrich wrote in the alert.

Related stories:


Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
US Turning Up the Heat on North Korea's Cyber Threat Operations
Jai Vijayan, Contributing Writer,  9/16/2019
MITRE Releases 2019 List of Top 25 Software Weaknesses
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "He's too shy to invite me out face to face!"
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-09-21
An issue was discovered in GNOME file-roller before 3.29.91. It allows a single ./../ path traversal via a filename contained in a TAR archive, possibly overwriting a file during extraction.
PUBLISHED: 2019-09-21
The Traveloka application 3.14.0 for Android exports com.traveloka.android.activity.common.WebViewActivity, leading to file disclosure and XSS.
PUBLISHED: 2019-09-21
An issue was discovered in idreamsoft iCMS V7.0. admincp.php?app=members&do=del allows CSRF.
PUBLISHED: 2019-09-21
admin/urlrule/add.html in YzmCMS 5.3 allows CSRF with a resultant denial of service by adding a superseding route.
PUBLISHED: 2019-09-21
Gila CMS before 1.11.1 allows admin/fm/?f=../ directory traversal, leading to Local File Inclusion.