Interet of Things D...
 

MegaSack DRAW - This year's winner is user - rgwb
We will be in touch

[Closed] Interet of Things DoS attack....

61 Posts
23 Users
0 Reactions
102 Views
Posts: 13594
Free Member
Topic starter
 

Reading about the recent massive DoS attack on Friday using cheapo webcams / DVCs etc as slaves...

Why doesn't someone just write a script to find them all and brick them (eg corrupt their flash drives). Yes it will piss off a few owners, but taking insecure computers offline would be a good thing and might encourage vendors to secure them better......


 
Posted : 24/10/2016 9:41 am
Posts: 0
Free Member
 

I'd be a real PIA for the innocent folks who have paid for them.

And it didn't cause any planes to fall from the sky, so who cares? Paypal didn't get paid for a few hours?

I can live with that.


 
Posted : 24/10/2016 9:55 am
Posts: 0
Free Member
 

[quote=ScottChegg ]I'd be a real PIA for the innocent folks who have paid for them.

I dispute the idea that anybody buying a wifi kettle is truly innocent


 
Posted : 24/10/2016 9:56 am
Posts: 31206
Full Member
 

taking insecure computers offline would be a good thing and might encourage vendors to secure them better......

You'd be happy for me to brick your PC or your entire company network if it is insecure?


 
Posted : 24/10/2016 10:10 am
Posts: 97
Full Member
 

Is there somewhere we can log on to these web cams...just to check they are working like...


 
Posted : 24/10/2016 10:13 am
Posts: 13594
Free Member
Topic starter
 

Is there somewhere we can log on to these web cams...just to check they are working like...

yep..

http://www.insecam.org/

and a load of PCs with VNC left unsecured

http://www.zdnet.com/article/hacker-exposes-thousands-of-insecure-desktops-that-anyone-can-remotely-view/


 
Posted : 24/10/2016 10:27 am
Posts: 17
Free Member
 

yes, shodan


 
Posted : 24/10/2016 10:27 am
Posts: 13594
Free Member
Topic starter
 

You'd be happy for me to brick your PC or your entire company network if it is insecure?

They're not...

However, if it's for the greater good then yes.

Eventually manufactures will start shipping secure products and the problem will go away. By 'tolerating' insecure devices, we're opening up the whole internet to DoS attacks.


 
Posted : 24/10/2016 10:30 am
Posts: 0
Free Member
 

There is an internet of things specific search engine https://www.shodan.io/

The bloke who runs it found nuclear power plants never designed to be networked were networked. Article at BBC? or New scientist?


 
Posted : 24/10/2016 10:30 am
Posts: 0
Free Member
 

At some point people will realise that networking all these items is a terrible idea, the only winners being the manufacturers collecting all your data for free and the hackers watching you get undressed or doing your online banking.


 
Posted : 24/10/2016 10:43 am
Posts: 13594
Free Member
Topic starter
 

At some point people will realise that [b]insecurely[/b] networking all these items is a terrible idea,

Nothing wrong with networks per-se, just ones with no security....


 
Posted : 24/10/2016 10:48 am
Posts: 0
Free Member
 

for the greater good

Whose greater good? Yours? Paypals?

The huddled masses in the third world that don't have electricty?

And who decides?


 
Posted : 24/10/2016 10:51 am
 MSP
Posts: 15535
Free Member
 

the hackers watching you get undressed

Those poor poor hackers, but that'l learn em.


 
Posted : 24/10/2016 10:54 am
Posts: 8937
Full Member
 

Eventually manufactures will start shipping secure products and the problem will go away. By 'tolerating' insecure devices, we're opening up the whole internet to DoS attacks.

We tolerate them because we want them cheap. People moan about Apple products being expensive, but they are frequently the only phones that have regular security updates. Sure, you can buy a generic Android handset for 100 quid, but how many security updates will it get in two/three years? Did it even get patched for Heartbleed?

I doubt that even legislation would help. Trying to force companies to support software woudl just make them go out of business quickly. Support costs a lot of money in both Dev and Test.


 
Posted : 24/10/2016 11:02 am
Posts: 5807
Free Member
 

Why doesn't someone just write a script to find them all and brick them (eg corrupt their flash drives).

I've seen quite a few suggestions like this over the past few days, many calling for the NSA to get on the case. I'm surprised some script kiddie hasn't already done it, you know, just for the lulz.


 
Posted : 24/10/2016 11:08 am
Posts: 13594
Free Member
Topic starter
 

The main problem is shipping kit with a default password the same for every device. Adding a unique password to each device and putting a sticker on the box, will only add a few cents to the BoM...

I'm surprised some script kiddie hasn't already done it, you know, just for the lulz.

I'm quite tempted myself to be honest....


 
Posted : 24/10/2016 11:08 am
Posts: 5807
Free Member
 

I'm quite tempted myself to be honest...

Well, hang fire a mo while I change the password on my electric blanket.


 
Posted : 24/10/2016 11:29 am
Posts: 0
Free Member
 

Nothing wrong with networks per-se, just ones with no security....

Nothing is totally secure though. Fine some things need to be on a network, but we seem to be putting a lot of crap on networks for no purpose, e.g. my Blueray player can be networked, but there really is no need for it to be.


 
Posted : 24/10/2016 11:36 am
Posts: 34078
Full Member
 


 
Posted : 24/10/2016 11:36 am
Posts: 0
Free Member
 

The main problem is shipping kit with a default password the same for every device.

It's actually quite hard to do this well as it means once you've lost the password, the device is useless. What they should do is make the device inoperable until the password has been changed. So you plug your IP device in and it just sits there flashing lights until you set the new password via the admin device/app. THAT wouldn't be too hard to do.


 
Posted : 24/10/2016 11:38 am
Posts: 0
Free Member
 

[quote="dragon"]e.g. my Blueray player can be networked, but there really is no need for it to be.I quite like mine being networked, means i can pop the disc in and watch the film in another room. Without having to move the bluray player. Very convenient.

Other than that, you've got a point. It's quite amazing what passwords people do (or don't) set. Neighbours WiFi password was 1234, matched with the first bit of his address as the SSID. So not only could i steal his WiFi (except it's far slower than mine) but i could also see (and access) his phone, laptop, desktop, wifes phone, printer and so on. Only thing i couldn't access was his work laptop and his kids phones, as they'd done all the proper password things. I could even access (and log on) via the IP address without a huge amount of effort.

It's all changed and secure now, and he brought me some beers. So we're all good.


 
Posted : 24/10/2016 11:48 am
Posts: 6208
Full Member
 

Some IoT devices, particularly those that you'd not log in to as such, even go as far as having hardcoded passwords.
Been quite a few good talks at recent hacker/security conferences. 20 devices hacked in 40 minutes (or something like that), the wifi enabled dildo (not a joke).
Security seems to be the assumption that 4 pins on the circuit board for a UART connection won't be a problem, since any hacker would need physical access to your device. Totally overlooks the fact that in reality a hacker only needs access to 1 device, whereby they can then find the vulns.
By hacker, I refer to security researcher.

edit: and in reality, numerous devices are simply rebadged OEM stuff, so get root console access to one, and you find the vulns for an entire family of devices.


 
Posted : 24/10/2016 11:52 am
Posts: 77705
Free Member
 

Nothing is totally secure though.

You'd better get onto the NSA with that insider knowledge, they'd love to hear from you.

Fact is, with the right conditions we have encryption security that's as close to uncrackable for all practical purposes. The problem comes with poor implementation of it, or people generally being people. A nice easy way to get malicious code inside a network (say a virus or a keylogger) is have an autorunning virus on a USB pendrive and then "lose" it in the car park, for instance.

Fine some things need to be on a network, but we seem to be putting a lot of crap on networks for no purpose, e.g. my Blueray player can be networked, but there really is no need for it to be.

It doesn't [i]need[/i] to be, no. But you might need a firmware update to play the latest discs; you might want to use it as a media header, streaming content from elsewhere to your TV; and then there's BD-Live of course.

You don't need it networked. But there's plenty of reasons why you might want to.


 
Posted : 24/10/2016 11:55 am
Posts: 13594
Free Member
Topic starter
 

It's actually quite hard to do this well as it means once you've lost the password, the device is useless. What they should do is make the device inoperable until the password has been changed. So you plug your IP device in and it just sits there flashing lights until you set the new password via the admin device/app. THAT wouldn't be too hard to do.

Some Wifi boxes force you to change the default password when you first configure it, so you can't leave it as 'admin'.


 
Posted : 24/10/2016 11:56 am
Posts: 0
Free Member
 

It's somehow reflective of the society we live in that that a communication system designed in large part to survive the destructive impact of nuclear war is now itself being held hostage by toasters.


 
Posted : 24/10/2016 11:58 am
Posts: 13594
Free Member
Topic starter
 

As for the network thing, I have an insecure network thermostat in the house, just it's hidden behind a firewall, so not open to attack (unless the Firewall fails). If I really want to access it I can just VPN in to the LAN and then play with it...


 
Posted : 24/10/2016 12:00 pm
Posts: 34078
Full Member
 

imagine if one of these was hacked, it could be the last thing you see

[img] [/img]


 
Posted : 24/10/2016 12:02 pm
Posts: 17773
Full Member
 

Part of the problem has to be that people aren't aware that this stuff needs doing, or if they are aware it needs doing they don't know how to do it.

I recently bought an IP webcam to put in my daughter's nursery on my Wife's request so we can see if she'd actually woken up or is just snuffling around.

Anyway - the manual that came with it was simple at best. You pretty much downloaded an app to your phone, turned on the device & pressed a button on the app which played a high pitched old-style modem type noise that set-up the camera.

That was it. No explanation on passwords or securing the device from being hacked into.
And to be honest, while I have changed the default password I am not 100% confident that it can't be looked at outside our Wi-Fi network or how I would go about checking this.

I am not even sure how the camera works to be honest in terms of the data path from the camera, via the router to my phone/tablet for viewing.......

Same kinda thing with our router. I have changed the defaults, but am not sure whether that is enough....?

Probably need to dig a bit deeper.....


 
Posted : 24/10/2016 12:18 pm
Posts: 0
Free Member
 

Oh, you mean like this:

[url= https://www.theguardian.com/technology/2016/sep/20/tesla-model-s-chinese-hack-remote-control-brakes ]Team of hackers take remote control of Tesla Model S from 12 miles away[/url]


 
Posted : 24/10/2016 12:19 pm
Posts: 8937
Full Member
 

Stumpy, good question. The big thing with people finding the cameras and being abe to eavesdrop was all around putting them directly onto the internet. Putting a NAT firewall in front of them and closing off the ports associated with the camera should stop/reduce that threat as the camera will not be searchable.

I can't say how secure the app or the back-end for it is, so if they gets hacked, then you will have the same problem.

The solution I came up with was to use a Pi as a VPN server, open up that port only on the router inbound and then use the camera from the LAN. That pushes the security to the router, which I have marginally more faith in, given that I changed the passwords and locked it down.

It's still less than 100% faith though.


 
Posted : 24/10/2016 12:26 pm
Posts: 6208
Full Member
 

That router is also just another internet device where the consumer assumes it is secure. Security by obscurity maybe, hidden behind the changing of the default password and maybe (at a stretch) changing of the WiFi SSID (not that that really achieves much), and ensuring port forwarding is disabled by default (although any IoT things inside the network can easily break out and make themselves vulnerable).

The baby monitor could do anything from having a totally open WiFi, to making itself easily identifiable online, to sending everything via some server somewhere (probably not even secure, since ssh is too much faff). Or it could be quite secure, but not 100%.


 
Posted : 24/10/2016 12:36 pm
Posts: 17773
Full Member
 

willard - I ended up uninstalling the default app. It felt it took too much 'control' away from me, so I wasn't really sure what it was doing or how to configure it.
I downloaded an app called something like IP cam viewer, and you have to set it up to point it to the webcam you want to view.

This was a bit of a palaver, but I got there in the end & have managed to stop the dynamic IP address thing from changing the address of the camera whenever it felt like it. I think I have assigned an IP address to it via the router & have told the router to miss out a chunk of numbers when doling out IP addresses, leaving a range for me to assign if I need to. Something like that.

Most of your post though I can't fathom out. I probably could do if I had the time and/or inclination but I really don't understand a lot of the terms....

NAT firewall......not a clue
port - guessing this is an access point for a device & you can close/open these are required. I think you need port forwarding via a specific port to set-up the camera so it can be viewed over the internet away from the home network; but I wouldn't know how to do that - could probably find out if I had to...
VPN server - again......erm, I have heard of work computers connecting to the work servers 'over VPN' but quite what it means, whether it is relevant, whether I should be doing VPN stuff - no idea.....

That's just a general point really about this kind of stuff. I love technology & consider myself quite geeky, but a lot of this is just stuff that I don't really have the time to learn about thoroughly enough to understand. I am more 'nuts & bolts' geek than 0s & 1s......

And there's probably several various levels of 'couldn't give a shit....' above me towards the don't have a clue end of the scale who are happily out there connecting 'internet' stuff to their networks without really understanding the ramifications....


 
Posted : 24/10/2016 12:38 pm
Posts: 0
Free Member
 

You'd better get onto the NSA with that insider knowledge, they'd love to hear from you.

What the NSA that have a history of paying companies to have a back door.


 
Posted : 24/10/2016 12:41 pm
Posts: 0
Free Member
 

[quote=andytherocketeer ]That router is also just another internet device where the consumer assumes it is secure. Security by obscurity maybe, hidden behind the changing of the default password and maybe (at a stretch) changing of the WiFi SSID (not that that really achieves much), and ensuring port forwarding is disabled by default (although any IoT things inside the network can easily break out and make themselves vulnerable).

The WiFi SSID is only really relevant if you've got somebody outside your house sniffing, though that's never supposed to be important for security. My router came with a randomised default password, though again that's only important if you've managed to hack the WiFi network - most of what is being discussed here is people going in via the internet. My router is secure to external attacks from that perspective, as by default there is no port forwarding and you can't log on to it from outside, hence it effectively protects any IoT devices on my WiFi network. I've not used huge numbers of different routers, but never come across one which enables port forwarding by default.

Which is why I'm kind of surprised by this whole story - I thought my network setup was fairly typical, are there really lots of people directly connecting IoT devices to the internet. Am I missing something in terms of security here? Sure an IoT device could break out (I'd think that relatively unlikely for most) - or more likely you could get a virus/worm on a computer which exposes access to your network. But that isn't what is being talked about here - it seems to be basic port scanning against which I'm secure.


 
Posted : 24/10/2016 1:48 pm
Posts: 77705
Free Member
 

What the NSA that have a history of paying companies to have a back door.

Examples please.


 
Posted : 24/10/2016 1:57 pm
Posts: 0
Free Member
 

Examples please.

[url= https://www.theguardian.com/us-news/2015/feb/23/nsa-director-defends-backdoors-into-technology-companies ]NSA director defends plan to maintain 'backdoors' into technology companies[/url]


 
Posted : 24/10/2016 1:59 pm
Posts: 23152
Full Member
 

^ Mike Rogers looks like a man you can trust ^ 😯


 
Posted : 24/10/2016 2:03 pm
Posts: 0
Free Member
 

[img] ?w=620&q=20&auto=format&usm=12&fit=max&dpr=2&s=1afc73ebe46a27116eb803d84d660068[/img]


 
Posted : 24/10/2016 2:04 pm
Posts: 23152
Full Member
 

Oh god he heard me


 
Posted : 24/10/2016 2:06 pm
Posts: 0
Free Member
 

Oh, I think it's quite likely he heard you. When people from Quark pop up on threads about their products, I'd imagine the head of the NSA probably keeps an eye out for people taking his name in vain. I believe the word we're looking for now is "incoming"

[img] [/img]


 
Posted : 24/10/2016 2:08 pm
Posts: 77705
Free Member
 

NSA director defends plan to maintain 'backdoors' into technology companies

Yeah, I read that. "Maintain" in this context means "create" I believe, the article is him saying 'we need these' and the tech companies saying 'no chance.'


 
Posted : 24/10/2016 2:09 pm
Posts: 77705
Free Member
 

That photo of the nice NSA man looks like he's being portrayed by Alan Tudyk.

[img] [/img]


 
Posted : 24/10/2016 2:13 pm
Posts: 0
Free Member
 

Well we do know that Cisco said that an NSA backed group had released malware that targeted their devices; they even issued a press release about it. Juniper also seemed to indicate an intentionally compromised algorithm for generating random numbers was created by the NSA enabling a backdoor.


 
Posted : 24/10/2016 2:17 pm
Posts: 77705
Free Member
 

Well we do know that Cisco said that an NSA backed group had released malware that targeted their devices; they even issued a press release about it.

But that, again, isn't Cisco being "paid off."

Just so we're clear, I'm not defending the NSA or saying that they're saints. I don't doubt for a fraction of a picosecond that they'd love a back door into high encryption techniques. What I'm contesting is the suggestion that the tech companies are complicit.

Juniper also seemed to indicate an intentionally compromised algorithm for generating random numbers was created by the NSA enabling a backdoor.

I don't know about Juniper specifically, but I do know a bit about this, it came to light a couple of years ago with the Snowdon files (it was part of Bullrun). The NSA did indeed publish a poisoned RNG which was for a time widely used in encryption. RSA in particular, there were hotly denied allegations that they'd been paid off to use it (which is one reason I asked for examples, I wondered if the poster was referring to this or just being randomly tinfoil).


 
Posted : 24/10/2016 2:36 pm
Posts: 0
Free Member
 

I think everyone assumes that the NSA goes to Microsoft and says "Here, install this backdoor in return for 1 bazillion dollars". In reality there is probably a situation where they say "Here, install this in your datacenter in return for nothing and if you tell anyone we did this, you go to jail"


 
Posted : 24/10/2016 2:48 pm
Posts: 77705
Free Member
 

This makes for some interesting reading.

https://en.wikipedia.org/wiki/Bullrun_(decryption_program)


 
Posted : 24/10/2016 2:53 pm
Posts: 13594
Free Member
Topic starter
 

What the NSA that have a history of paying companies to have a back door.

Worse than that, they infiltrate standards bodies to try and weaken the encryption methods eg the dual elliptic curve method..

http://www.reuters.com/article/us-usa-security-nsa-rsa-idUSBREA2U0TY20140331


 
Posted : 24/10/2016 2:58 pm
Posts: 6208
Full Member
 

most of what is being discussed here is people going in via the internet. My router is secure to external attacks from that perspective, as by default there is no port forwarding and you can't log on to it from outside, hence it effectively protects any IoT devices on my WiFi network

It would protect IoT devices from direct access, ie attempting to connect to a specific port via the IP address that your ISP has given you today.
Sure an IoT device could break out (I'd think that relatively unlikely for most)

Breaking out is exactly what I expect many of these devices to do. Baby monitors, webcams, NAS devices, home heating/lighting etc. that you expect to be able to access from outside.
With portforwarding totally disabled from the outside, those devices will establish a connection from the inside to "a server somewhere on the net". Your app/phone/whatever connects via that external server, so any requests from outside go via that connection that's already established from inside.

I'm not surprised by the story. IoT devices often have naff all security. For many of these devices, security is not something that those designers and developers have had to worry about until now. And now they are using stock Linux based embedded distros, and hardcoding things for convenience.


 
Posted : 24/10/2016 3:01 pm
Posts: 0
Free Member
 

The NSA did it to a Swiss company selling encryption for banking decades ago, so they have form. TBF the NSA and GCHQ effectively invented computers to crack codes, so it'd be a surprise if they weren't on top of things.


 
Posted : 24/10/2016 3:09 pm
Posts: 77705
Free Member
 

I think everyone assumes that the NSA goes to Microsoft and says "Here, install this backdoor in return for 1 bazillion dollars". In reality there is probably a situation where they say "Here, install this in your datacenter in return for nothing and if you tell anyone we did this, you go to jail"

I think it's perhaps closer to say "this is the standard, you have you use it if you want to be FIPS-compliant." Which is both less surprising and arguably more concerning.


 
Posted : 24/10/2016 3:16 pm
Posts: 13249
Full Member
 

@Cougar, I recall that one of the TLA agencies paid a large chunk of change to a company developing encryption in USA. My Google powers are failing me currently so no reference yet. Needless to say once the news got out the product was tainted as was the company.

This weekend some of the comentards on The Register were suggesting that a router running DD-WRT was the only way of properly securing your home network device from being recruited into a botnet. Firmware updates seem to be forgotten once the next device arrives on the market and DD-WRT (if your device will run it) is the only way to maybe keep a jump ahead.


 
Posted : 24/10/2016 5:49 pm
Posts: 13249
Full Member
 

Juniper Systems were the compromised company using Dual E_C.


 
Posted : 24/10/2016 6:08 pm
Posts: 33572
Full Member
 

ninfan - Member
It's somehow reflective of the society we live in that that a communication system designed in large part to survive the destructive impact of nuclear war is now itself being held hostage by toasters.

INCOMING!

[b]


 
Posted : 24/10/2016 6:17 pm
Posts: 77705
Free Member
 

This weekend some of the comentards on The Register were suggesting that a router running DD-WRT was the only way of properly securing your home network device from being recruited into a botnet.

I'm not necessarily disagreeing but I'd love to see the logic behind it being the [i]only[/i] way.

Can you give me the link to that please?


 
Posted : 24/10/2016 6:53 pm
Posts: 0
Free Member
 

I think it's perhaps closer to say "this is the standard, you have you use it if you want to be FIPS-compliant." Which is both less surprising and arguably more concerning.

Oh, absolutely. The thing is, the above, plus what I wrote are both absolutely the case 🙂


 
Posted : 24/10/2016 7:15 pm
Posts: 13249
Full Member
 

Hi Cougar [url= http://www.theregister.co.uk/2016/10/19/home_router_insecurity/ ]El Reg link[/url] The comment by Dwarf is what I based my comment above on.


 
Posted : 24/10/2016 8:27 pm
Posts: 77705
Free Member
 

Cheers for that, will read in the morning.


 
Posted : 24/10/2016 10:35 pm
Posts: 13594
Free Member
Topic starter
 

Apparently the main culprit is being recalled...

http://computerworld.com/article/3134548/security/chinese-firm-recalls-camera-products-linked-to-massive-ddos-attack.html


 
Posted : 25/10/2016 2:36 pm
Posts: 10330
Full Member
 

I'd love to know where the pressure came from for that recall. I can't imagine it was voluntary given that it is all of the webcams that they sold (pre 2016 I think)


 
Posted : 25/10/2016 2:56 pm
Posts: 13594
Free Member
Topic starter
 

Yep, I'm amazed. But given it's a cheap toy which still works fine as a camera, I suspect no one will actually return them.

I still think bricking them all is a good idea, that way they will get returned or binned...


 
Posted : 25/10/2016 3:03 pm
Posts: 6208
Full Member
 

I was wondering if those webcams were even products of a single company, or if they were an OEM thing rebadged under a whole host of brand names?
Good luck recalling that.
Remote bricking might be an option, but if there's a way for the manufacturer to brick them, whether thats the brand name mfr, or the mfr of the OEM reference design and firmware, then one thing you can guarantee is that there is a way for hackers to brick them remotely too.


 
Posted : 25/10/2016 3:10 pm
Posts: 0
Free Member
 

DD-WRT has had and will have its share of vulnerabilities. The security of it comes more from those who would make the effort to use it being concerned about security. If manufacturers and ISPs were to ship it as standard the same problems would exist.

[img] [/img]
https://twitter.com/jjarmoc/status/789637654711267328


 
Posted : 25/10/2016 4:13 pm