Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

11/14/2013
04:59 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

What The Carna Botnet Also Found

Researcher at Black Hat Brazil to present new data and analysis of the controversial Internet Census project

The researcher who rocked the security world earlier this year by revealing he had built a botnet to conduct a census of the Internet remains anonymous, but has passed to a white-hat researcher more security findings from the controversial project.

Parth Shukla, an information security analyst with Australia's Computer Emergency Response Team (AusCERT), says he was interested in how Australian consumers had fared in the so-called Carna Botnet experiment, so earlier this year he decided to email the researcher via the PGP key included in the Internet Census 2012 report that was posted online in March. Shukla admits he was surprised when the researcher responded and ultimately handed over to him all of the data on the more than 1.2 million vulnerable consumer devices found around the globe by the botnet.

"No one else had been in touch with him," says Shukla, who was the only one the researcher decided should have the data once he began analyzing it. "Who he is, I have no idea. We used PGP keys to communicate, and I kept using some questions to be sure he was the guy and not giving fake data."

For months Shukla has been analyzing the data to gain a better understanding of the security implications of the findings, and he plans to share more of his analysis and data at the Black Hat Regional Summit in Sao Paolo, Brazil, taking place Nov. 26 to 27. He has presented data in Australia and, most recently, China that focuses on how each region fares with these vulnerable devices.

Among the findings he culled from the botnet data: More than 2,000 different manufacturers' products were wide open to access via a Telnet connection over the public Internet, and 28 percent of them were Chinese vendor ZTE's products. China also made up the largest percentage of infected and prone devices, with 56 percent of the vulnerable devices (720,141), while Hong Kong was home to 7 percent of infections (91,453), and Brazil had 2 percent, (30,242 devices). The U.S., meanwhile, also accounted for some 2 percent of the prone devices, with 24,243.

By region, Asia accounted for 78 percent of the vulnerable equipment; Europe, 13 percent; South America, 5 percent; North America, 3 percent; and Africa, 1 percent.

"I was shocked he didn't mention in [his] paper the wealth of information in the data ... it was only the census data" in his paper, Shukla says.

Modems, home routers, Web cameras, and other consumer devices were found wide open to the Internet with default usernames and passwords via the Telnet protocol, he says. "It's pretty concerning," he says. "Manufacturers are creating the devices this way -- the user is unaware of it and plugging it straight into the Internet."

[Created by an anonymous researcher, the Carna botnet found that 1.2 million Internet-connected devices are trivially exploitable, but the illegality of the methods raises doubts. See Carna Compromise Delivers Data, But Casts Suspicions.]

Shukla says it would take an average of 60 seconds to find a vulnerable device in China via a scan of the Internet.

Legitimate scanning of the Internet for vulnerable devices -- not infecting them with bot code like the Carna Botnet did -- is all the rage these days. Renowned researcher HD Moore has pioneered legal scanning of the Net, most recently illuminating exposure of some 35,000 enterprise servers via a flawed firmware interface that could leave a data center open to outside attack. Moore also helped spearhead the new community Internet-scanning Project Sonar initiative. The goal of Project Sonar, which also includes the University of Michigan, is for researchers to share their data, help educate vendors whose products are discovered via the scans, and, ultimately, to raise public awareness of the vulnerability of this Internet-facing equipment.

AusCERT's Shukla says awareness is crucial to remedying the practice of leaving Internet-connected devices exposed. Even so, it's a long road: "I've only heard back from one vendor in the top 25" found from the Carna Botnet project, he says. "And I haven't heard back from them in months."

Shukla's research paper on his exclusive analysis of the Carna Botnet findings is here.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
SOC 2s & Third-Party Assessments: How to Prevent Them from Being Used in a Data Breach Lawsuit
Beth Burgin Waller, Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLC,  12/5/2019
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19604
PUBLISHED: 2019-12-11
Arbitrary command execution is possible in Git before 2.20.2, 2.21.x before 2.21.1, 2.22.x before 2.22.2, 2.23.x before 2.23.1, and 2.24.x before 2.24.1 because a "git submodule update" operation can run commands found in the .gitmodules file of a malicious repository.
CVE-2019-14861
PUBLISHED: 2019-12-10
All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the (poorly named) dnsserver RPC pipe provides administrative facilities to modify DNS records and zones. Samba, when acting as an AD DC, stores DNS records in LDAP. In AD, the default permiss...
CVE-2019-14870
PUBLISHED: 2019-12-10
All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the S4U (MS-SFU) Kerberos delegation model includes a feature allowing for a subset of clients to be opted out of constrained delegation in any way, either S4U2Self or regular Kerberos authent...
CVE-2019-14889
PUBLISHED: 2019-12-10
A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence...
CVE-2019-1484
PUBLISHED: 2019-12-10
A remote code execution vulnerability exists when Microsoft Windows OLE fails to properly validate user input, aka 'Windows OLE Remote Code Execution Vulnerability'.