- Jun 9, 2013
- 6,720
Almost a year after the emergence of the Mirai botnet, smart devices are still facing a barrage of credential attacks, and a device left connected to the Internet with default credentials will be hijacked in about two minutes.
This is the result of a recent experiment carried out by Johannes B. Ullrich, a member of the SANS Technology Institute. Ullrich bought an Anran DVR system and left it connected to the Internet for two days. Ullrich left the device in its default state, with the Telnet port open to external connections, and with its default credentials intact (root/xc3511).
The researcher logged everything that happened on the device and connected the DVR to a remote-controlled power outlet that reset it every five minutes. Resetting the device was necessary because this action removed any malware from previous infections.
Experiment results: DVR hijacked every two minutes
Results showed that 10,143 "users" connected to the device from 1,254 different IPs during the two-day experiment.
The device was left online for 45 hrs and 42 min, which meant that around every two minutes, someone connected to the device using the default credentials.
Full Article. It Still Takes 2 Minutes to Have Vulnerable IoT Devices Compromised Online
This is the result of a recent experiment carried out by Johannes B. Ullrich, a member of the SANS Technology Institute. Ullrich bought an Anran DVR system and left it connected to the Internet for two days. Ullrich left the device in its default state, with the Telnet port open to external connections, and with its default credentials intact (root/xc3511).
The researcher logged everything that happened on the device and connected the DVR to a remote-controlled power outlet that reset it every five minutes. Resetting the device was necessary because this action removed any malware from previous infections.
Experiment results: DVR hijacked every two minutes
Results showed that 10,143 "users" connected to the device from 1,254 different IPs during the two-day experiment.
The device was left online for 45 hrs and 42 min, which meant that around every two minutes, someone connected to the device using the default credentials.
Full Article. It Still Takes 2 Minutes to Have Vulnerable IoT Devices Compromised Online