Eleven11bot infects video recorders, with the largest concentration of them in the US.
See full article...
See full article...
Did I miss it or does the article not say who the botnet is targeting?
"Eleven11bot has targeted diverse sectors, including communications service providers and gaming hosting infrastructure, leveraging a variety of attack vectors,"
Unless you're looking for more specificity, this leads the paragraph above the first image:Did I miss it or does the article not say who the botnet is targeting?
Remote administration from outside the Internet should be enabled only when needed
In any case, anyone running any sort of IoT devices should position them behind a router or other form of firewall so they're not visible from outside a local network.
Did I miss it or does the article not say who the botnet is targeting?
The Internet of CrimeBotsThis is why you don't use god-awful off-the-shelf NVRs, and you especially don't expose them to the internet. NVRs and IP Cams are notoriously insecure and always end up in these large botnets.
Our previous security company wanted to drop a whitebox workstation onto my network that ran the NVR. It was running Windows 7 as the OS. I told them to pound sand, and there was no way I was allowing an obsolete, unknown brand system onto my network. This was a large security firm, too. Might have started with A in the name.This is why you don't use god-awful off-the-shelf NVRs, and you especially don't expose them to the internet. NVRs and IP Cams are notoriously insecure and always end up in these large botnets.
We've only had a taste of what winning feels like. The main course is still coming, sadly.24.4% for US...I guess that means we win! U-S-A! U-S-A! So this is what winning feels like.
One of our org's ServiceNow instances was unavailable yesterday, with SN citing a DDoS attack as the cause. They haven't named the attacker or Botnet, but the timing sure is convenient.Did I miss it or does the article not say who the botnet is targeting?
Since this is a video device, I'm guessing that a moderate DOS participation would likely generate the same bandwidth as general cam use. Its power is more in how the "streams" converge, than the individual bot send.What sorts of amplification, if any, do the DDoS guys achieve these days?
Are we actually talking enough cameras on solid internet connections(that are not under the thumb either of residential ISPs who distrust bandwidth users or corporate and institutional network operators who distrust anomalous behavior) to deliver peak 6 Tb/s of traffic upstream; or are there cute amplification tricks that would suggest something more modest?
Never shut off the adblocker ... the internet is unviewable without one these days... it feels like not wearing laser safety glasses around a bunch of kids with green laser pointers.Whoa. Shut off my ad blocker for a while, watched some lady put on makeup on Vogue's Instagram. What the hell? Why does advertising have to mean annoyance? Please vet your ads, check them for stupidity.
Yup - it comes at the very end, and it's little: "Internet of Things(<-- it's right there!)"Just remember, the "S" in IoT stands for Security!
Spent some time a few years ago trying to source/install NVRs and cams. Tracking down trusted sources of hardware was extremely difficult. And even once deemed trusted were sus when you dig into the firmware and/or chips.This is why you don't use god-awful off-the-shelf NVRs, and you especially don't expose them to the internet. NVRs and IP Cams are notoriously insecure and always end up in these large botnets.
Any tracing of the command and control source(s) yet? With the recent US administration policy decision to roll over and let Russian cyberattacks slide, I have my guesses...
Could it be a security company that is a direct descendant of Tycho?Our previous security company wanted to drop a whitebox workstation onto my network that ran the NVR. It was running Windows 7 as the OS. I told them to pound sand, and there was no way I was allowing an obsolete, unknown brand system onto my network. This was a large security firm, too. Might have started with A in the name.
Yeah, I treat all IP cams as compromised. I assume they all have a backdoor, because it's honestly a safe assumption. On my network, they're completely segregated on their own subnet. I don't even trust them enough to put them on the IoT network that doesn't have network access. They can sit there and fuck with each other if they want, and that's it.Spent some time a few years ago trying to source/install NVRs and cams. Tracking down trusted sources of hardware was extremely difficult. And even once deemed trusted were sus when you dig into the firmware and/or chips.
I'm sure there are sources, but I finally threw my hands up and sold the customers accounts when I actually called for some support. I had disabled all visible pre-installed user/admin accounts on the devices. Once on the call with support, the CSR dialed right in to the device without any input from me other than serial number.
The CSR got in likely due to the device having cloud management. So basically you had an experience like a TeamViewer support session. However, your device should have been designed to at least have a local prompt confirmation before it allowed the remote support connection (not that they all do, sadly).Spent some time a few years ago trying to source/install NVRs and cams. Tracking down trusted sources of hardware was extremely difficult. And even once deemed trusted were sus when you dig into the firmware and/or chips.
I'm sure there are sources, but I finally threw my hands up and sold the customers accounts when I actually called for some support. I had disabled all visible pre-installed user/admin accounts on the devices. Once on the call with support, the CSR dialed right in to the device without any input from me other than serial number.
Good luck having the entire population configuring firewalls, routers, etc. when they order a random camera from Amazon from highly regarded seller TONGYUNKJ with 15673 5 star reviews!WTF, people? Why does this even need to be said? Hasn't anyone learned anything these past 15-20 years???
In this day and age, I cannot believe that net admins and/or security system installers are so ill-informed that they would even consider exposing an IoT device to the internet.
There should be a law... expose a device to the world and it gets hacked, you get prosecuted.
Sell any device that doesn't include a warning to lock it behind a firewall, you get prosecuted.
No "get out of jail free" card for pleading "I didn't know better!"
When are people going to wake up to reality???
Well this is why I only trust Synology for my IP Camera and Surveillance needs. I can turn off Surveillance Station access to the internet with a checkbox (and its DISABLED by default)Good luck having the entire population configuring firewalls, routers, etc. when they order a random camera from Amazon from highly regarded seller TONGYUNKJ with 15673 5 star reviews!
You're not alone, just yesterday I was reminiscing about listening to Peaches and Herb on 8-track lolI saw video recorder and for a moment wondered how it could be that so many VHS machines were connected to a network.
Damn, I'm old.
The vast majority of networks do NOT have anyone qualified as a network admin or security admin. Most networks are ran by folks who want Internet, call up the ISP, sign a contract, have the ISP person come out and setup the modem/ODN/Magic Box and Presto! An Internet connected Network. Bonus, most ISP routers have very limited firewalls and by default let all outbound traffic escape. So once that Ring/FuYang/Whatever IOT gizmo gets compromised, bogus traffic flows unimpeded to the targeted victim(s).WTF, people? Why does this even need to be said? Hasn't anyone learned anything these past 15-20 years???
In this day and age, I cannot believe that net admins and/or security system installers are so ill-informed that they would even consider exposing an IoT device to the internet.
There should be a law... expose a device to the world and it gets hacked, you get prosecuted.
Sell any device that doesn't include a warning to lock it behind a firewall, you get prosecuted.
No "get out of jail free" card for pleading "I didn't know better!"
When are people going to wake up to reality???