Forum menu
Interet of Things D...
 

[Closed] Interet of Things DoS attack....

Posts: 78441
Full Member
 

This makes for some interesting reading.

https://en.wikipedia.org/wiki/Bullrun_(decryption_program)


 
Posted : 24/10/2016 3:53 pm
Posts: 13594
Free Member
Topic starter
 

What the NSA that have a history of paying companies to have a back door.

Worse than that, they infiltrate standards bodies to try and weaken the encryption methods eg the dual elliptic curve method..

http://www.reuters.com/article/us-usa-security-nsa-rsa-idUSBREA2U0TY20140331


 
Posted : 24/10/2016 3:58 pm
Posts: 6254
Full Member
 

most of what is being discussed here is people going in via the internet. My router is secure to external attacks from that perspective, as by default there is no port forwarding and you can't log on to it from outside, hence it effectively protects any IoT devices on my WiFi network

It would protect IoT devices from direct access, ie attempting to connect to a specific port via the IP address that your ISP has given you today.
Sure an IoT device could break out (I'd think that relatively unlikely for most)

Breaking out is exactly what I expect many of these devices to do. Baby monitors, webcams, NAS devices, home heating/lighting etc. that you expect to be able to access from outside.
With portforwarding totally disabled from the outside, those devices will establish a connection from the inside to "a server somewhere on the net". Your app/phone/whatever connects via that external server, so any requests from outside go via that connection that's already established from inside.

I'm not surprised by the story. IoT devices often have naff all security. For many of these devices, security is not something that those designers and developers have had to worry about until now. And now they are using stock Linux based embedded distros, and hardcoding things for convenience.


 
Posted : 24/10/2016 4:01 pm
Posts: 0
Free Member
 

The NSA did it to a Swiss company selling encryption for banking decades ago, so they have form. TBF the NSA and GCHQ effectively invented computers to crack codes, so it'd be a surprise if they weren't on top of things.


 
Posted : 24/10/2016 4:09 pm
Posts: 78441
Full Member
 

I think everyone assumes that the NSA goes to Microsoft and says "Here, install this backdoor in return for 1 bazillion dollars". In reality there is probably a situation where they say "Here, install this in your datacenter in return for nothing and if you tell anyone we did this, you go to jail"

I think it's perhaps closer to say "this is the standard, you have you use it if you want to be FIPS-compliant." Which is both less surprising and arguably more concerning.


 
Posted : 24/10/2016 4:16 pm
Posts: 13349
Free Member
 

@Cougar, I recall that one of the TLA agencies paid a large chunk of change to a company developing encryption in USA. My Google powers are failing me currently so no reference yet. Needless to say once the news got out the product was tainted as was the company.

This weekend some of the comentards on The Register were suggesting that a router running DD-WRT was the only way of properly securing your home network device from being recruited into a botnet. Firmware updates seem to be forgotten once the next device arrives on the market and DD-WRT (if your device will run it) is the only way to maybe keep a jump ahead.


 
Posted : 24/10/2016 6:49 pm
Posts: 13349
Free Member
 

Juniper Systems were the compromised company using Dual E_C.


 
Posted : 24/10/2016 7:08 pm
Posts: 33961
Full Member
 

ninfan - Member
It's somehow reflective of the society we live in that that a communication system designed in large part to survive the destructive impact of nuclear war is now itself being held hostage by toasters.

INCOMING!

[b]


 
Posted : 24/10/2016 7:17 pm
Posts: 78441
Full Member
 

This weekend some of the comentards on The Register were suggesting that a router running DD-WRT was the only way of properly securing your home network device from being recruited into a botnet.

I'm not necessarily disagreeing but I'd love to see the logic behind it being the [i]only[/i] way.

Can you give me the link to that please?


 
Posted : 24/10/2016 7:53 pm
Posts: 9238
Free Member
 

I think it's perhaps closer to say "this is the standard, you have you use it if you want to be FIPS-compliant." Which is both less surprising and arguably more concerning.

Oh, absolutely. The thing is, the above, plus what I wrote are both absolutely the case ๐Ÿ™‚


 
Posted : 24/10/2016 8:15 pm
Posts: 13349
Free Member
 

Hi Cougar [url= http://www.theregister.co.uk/2016/10/19/home_router_insecurity/ ]El Reg link[/url] The comment by Dwarf is what I based my comment above on.


 
Posted : 24/10/2016 9:27 pm
Posts: 78441
Full Member
 

Cheers for that, will read in the morning.


 
Posted : 24/10/2016 11:35 pm
Posts: 13594
Free Member
Topic starter
 

Apparently the main culprit is being recalled...

http://computerworld.com/article/3134548/security/chinese-firm-recalls-camera-products-linked-to-massive-ddos-attack.html


 
Posted : 25/10/2016 3:36 pm
Posts: 10336
Full Member
 

I'd love to know where the pressure came from for that recall. I can't imagine it was voluntary given that it is all of the webcams that they sold (pre 2016 I think)


 
Posted : 25/10/2016 3:56 pm
Posts: 13594
Free Member
Topic starter
 

Yep, I'm amazed. But given it's a cheap toy which still works fine as a camera, I suspect no one will actually return them.

I still think bricking them all is a good idea, that way they will get returned or binned...


 
Posted : 25/10/2016 4:03 pm
Posts: 6254
Full Member
 

I was wondering if those webcams were even products of a single company, or if they were an OEM thing rebadged under a whole host of brand names?
Good luck recalling that.
Remote bricking might be an option, but if there's a way for the manufacturer to brick them, whether thats the brand name mfr, or the mfr of the OEM reference design and firmware, then one thing you can guarantee is that there is a way for hackers to brick them remotely too.


 
Posted : 25/10/2016 4:10 pm
Posts: 0
Free Member
 

DD-WRT has had and will have its share of vulnerabilities. The security of it comes more from those who would make the effort to use it being concerned about security. If manufacturers and ISPs were to ship it as standard the same problems would exist.

[img] [/img]
https://twitter.com/jjarmoc/status/789637654711267328


 
Posted : 25/10/2016 5:13 pm
Page 2 / 2