Archive for January, 2017


IoT – the popular attack vector

Author: Martin Voelk
January 23, 2017

Evolving technologies such a IoT (Internet of Things) enable IP based Internetworking with devices previously not part of the network. Fitness machines, Home Protection Systems, Automation systems, Industrial processing systems, medical equipment, Burglary systems, temperature controls etc.

The downside to IoT is that it opens up a whole new attack vector. Not only can poorly protection IoT machines be compromised, they also can serve as a jump host to further penetrate the customer network.

Shodan is the tool of choice these days. A lot of the underground community is actively exchanging scripts with the best IoT dorks. Only because there is a treadmill on the web doesn’t mean that you can leave the default username and password!

https://www.shodan.io

Share

January 9, 2017

 

Groups of attackers have adopted a new tactic that involves deleting publicly exposed MongoDB databases and asking for money to restore them. In a matter of days, the number of affected databases has risen from hundreds to more than 10,000.

 

The issue of misconfigured MongoDB installations, allowing anyone on the internet to access sensitive data, is not new. Researchers have been finding such open databases for years, and the latest estimate puts their number at more than 99,000.

 

On Monday, security researcher Victor Gevers from the GDI Foundation reported that he found almost 200 instances of publicly exposed MongoDB databases that had been wiped and held to ransom by an attacker or a group of attackers named Harak1r1.

 

The attackers left a message behind for the database administrators asking for 0.2 bitcoins (around US $180) to return the data.

 

A day later, the number of databases wiped by Harak1r1 had reached 2,500 and by Friday, more than 8,600 had been affected and contained the ransom message.

 

In addition, other attackers have joined the scheme, researchers counting at least five groups with different ransom messages so far. Together, the groups deleted 10,500 databases, and in some cases, they’ve replaced each other’s ransom messages.

 

The bad news is that most of them don’t even bother copying the data before deleting it, so even if the victims decide to pay, there’s a high chance they won’t get their information back.

 

Gevers said he has helped some victims and there was no evidence in the logs that the data had been exfiltrated. He advises affected database owners not to pay and to get help from security professionals.

 

MongoDB administrators are advised to follow the steps on the security checklist from the MongoDB documentation in order to lock down their deployments and prevent unauthorized access.

Share

January 4, 2017

Happy New Year to everyone.
We have a first come – first serve free offer for our readers in January 2017.

10 x Free Cyber Intel Reports

FREE-CYBER-INTEL-REPORT

Share