Tuesday, May 12, 2015

Smart Guys - Created a Botnet that exploits default username /passwords


Are there drivers that do not know how to adjust their car mirrors or the seats ?
If there are (almost) none, how come we still have users that do not change the default passwords

The vendors could  force us  change the default password when we configure the system the first time but, they are not responsible for our security so, they don't care. (after all, even we don't seem to care)




From the article:

Incapsula discovered a botnet, still largely active, that primarily consists of routers manufactured by the California-based networking company Ubiquiti Networks. While the firm initially assumed the routers suffered from a shared firmware flaw, researchers were able to determine that all units are remotely accessible via HTTP and SSH on their default ports, and could also be accessed via vendor-provided default login credentials. 


The botnet scans for other routers that may have been misconfigured and executes shell scripts to access their SSH ports via default credentials.

“For perpetrators, this is like shooting fish in a barrel, which makes each of the scans that much more effective,” the firm said in a report released Tuesday,

Follow the link below for more details

No comments:

Post a Comment