Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
New Linux Worm Attacks IoT Devices
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
6/30/2019 | 9:02:42 AM
Re: Defaults
That's depressing.
tdsan
50%
50%
tdsan,
User Rank: Ninja
6/29/2019 | 8:34:21 PM
Re: Defaults
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
6/29/2019 | 8:16:53 PM
Re: Defaults
Definitely concur here. But obviously there are still those out there who are foolish enough for this to still be effective. :( Its quite sad.
tdsan
50%
50%
tdsan,
User Rank: Ninja
6/28/2019 | 8:46:28 PM
Re: For fun
"the software is purely destructive; it captures no data and asks for no ransom. Researcher Ankit Anubhav traced the malware back to its origins and found the developer, who uses the online name "Light Leafon." " Obviously this was for fun. Distraction is huge.

I am not so sure it was all for fun, I think it was also being used to test its capability for another purpose. Think about this, if the actor could access systems with default passwords, then what about writing a hash algorithm to run a for loop to check for possible password combinations.
  1. Check to see if they can get to the device and apply a default username and password
  2. Create a payload or add a function statement that goes through a list of passwords

I think this is a logical step in their next attempt but again we are theorizing, only time will tell.
import getpass
import sys
import telnetlib
import time

#Getting the user information
user=input("Enter User name: ")
password=getpass.getpass()

#open file
iplist=open("ipfile.txt")

#Loop through IP address and execute commands
for line in  iplist:

 Host=line.strip("\n")    
 print ("Configuring Switch",Host)
 tn = telnetlib.Telnet(Host)    
 tn.read_until(b"Username: ")   
 tn.write(user.encode('ascii') + b"\n")
 tn.read_until(b"Password: ")
 tn.write(password.encode('ascii')+b"\n")
 time.sleep(2)     
 tn.write(b"enable\n")  
 time.sleep(2)
 tn.write(b"admin\n")  
 time.sleep(2)
 tn.write(b"config t\n")
 time.sleep(2)
 tn.write(b"snmp-server community Secured ro\n") 
 print ("Switch ",Host,"Configured")
 line=tn.read_some()
 tn.close()                           
 print (line)                      

#closing file 
ipfile.close()

 Todd
tdsan
50%
50%
tdsan,
User Rank: Ninja
6/28/2019 | 7:40:48 PM
Re: Linux Worm Exploits and Defenses
Yes, I agree, that is why I had mentioned in my excert that the vendor should disable telnet altogether or block it.

In addition, companies like Cisco and Juniper ask the user to change the default password. If the user does not change the password then the system should be halted until they change it based on recommended security guidelines (listed below).

NIST password guidelines - "NIST guidance recommends the following for passwords: An eight character minimum and 64 character maximum length. The ability to use all special characters but no special requirement to use them."
  • An eight character minimum and 64 character maximum length
  • The ability to use all special characters but no special requirement to use them
  • Restrict sequential and repetitive characters (e.g. 12345 or aaaaaa)
  • Restrict context specific passwords (e.g. the name of the site, etc.)
  • Restrict commonly used passwords (e.g. [email protected], etc.)
  • Restrict passwords obtained from previous breach corpuses
NIST Security Password Guidelines

Todd

 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
6/28/2019 | 6:47:51 PM
Defaults
It could attack any Linux system deployed on the Internet with open telnet ports and default admin credentials. So it is not supposed to be an attack at all. Who would leave defaults as they are today?
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
6/28/2019 | 6:46:12 PM
Re: Linux Worm Exploits and Defenses
The IoT devices related to the internet. That is why they become vulnerable too.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
6/28/2019 | 6:44:13 PM
Re: Linux Worm Exploits and Defenses
A number of companies are doing this but after reading the report, it seems this practice is not performed across the board. Most SME would not pay enough attention to it so they mostly miss it.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
6/28/2019 | 6:42:14 PM
Re: Linux Worm Exploits and Defenses
I do agree the responsibility should rest with the consumer where the system asks or provides insight on how to change the admin password Anting left to consumers will be at high risk. Better to avoid expecting anything from consumers.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
6/28/2019 | 6:40:46 PM
For fun
the software is purely destructive; it captures no data and asks for no ransom. Researcher Ankit Anubhav traced the malware back to its origins and found the developer, who uses the online name "Light Leafon." Obviously this was for fun. Distraction is huge.
Page 1 / 2   >   >>


Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
SOC 2s & Third-Party Assessments: How to Prevent Them from Being Used in a Data Breach Lawsuit
Beth Burgin Waller, Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLC,  12/5/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "This is the last time we hire Game of Thrones Security"
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17185
PUBLISHED: 2019-12-09
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVE-2019-12424
PUBLISHED: 2019-12-09
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVE-2019-18380
PUBLISHED: 2019-12-09
Symantec Industrial Control System Protection (ICSP), versions 6.x.x, may be susceptible to an unauthorized access issue that could potentially allow a threat actor to create or modify application user accounts without proper authentication.
CVE-2019-19687
PUBLISHED: 2019-12-09
OpenStack Keystone 15.0.0 and 16.0.0 is affected by Data Leakage in the list credentials API. Any user with a role on a project is able to list any credentials with the /v3/credentials API when enforce_scope is false. Users with a role on a project are able to view any other users' credentials, whic...
CVE-2019-19682
PUBLISHED: 2019-12-09
nopCommerce through 4.20 allows XSS in the SaveStoreMappings of the components \Presentation\Nop.Web\Areas\Admin\Controllers\NewsController.cs and \Presentation\Nop.Web\Areas\Admin\Controllers\BlogController.cs via Body or Full to Admin/News/NewsItemEdit/[id] Admin/Blog/BlogPostEdit/[id]. NOTE: the ...