Large botnet of CCTV devices knock the snot out of jewelry website


Researchers have encountered a denial-of-service botnet that's made up of more than 25,000 Internet-connected closed circuit TV devices.

The researchers with Security firm Sucuri came across the malicious network while defending a small brick-and-mortar jewelry shop against a distributed denial-of-service attack. The unnamed site was choking on an assault that delivered almost 35,000 HTTP requests per second, making it unreachable to legitimate users. When Sucuri used a network addressing and routing system known as Anycast to neutralize the attack, the assailants increased the number of HTTP requests to 50,000 per second.

The DDoS attack continued for days, causing the Sucuri researchers to become curious about the origins of the attack. They soon discovered the individual devices carrying out the attack were CCTV boxes that were connected to more than 25,500 different IP addresses. The IP addresses were located in no fewer than 105 countries around the world.

"It is not new that attackers have been using IoT devices to start their DDoS campaigns," Sucuri CTO and founder Daniel Cid wrote in a blog post,  using the abbreviation for Internet of things. "However, we have not analyzed one that leveraged only CCTV devices and was still able to generate this quantity of requests for so long."

Sucuri researchers queried a sampling of the boxes and found that all of them showed they were running what was called the "Cross Web Server" that had a default Web page titled "DVR Components." The researchers later found the malicious IPs contained the company logos of resellers of CCTV services and that all the devices were running Busy Box, a collection of Unix-based utility tools that run on embedded devices. To make it harder to block the attack, the malicious devices had been programmed to emulate normal browser behavior by displaying a variety of common user agents, such as those associated with the Chrome, Internet Explorer, and Safari browsers. The hacked devices also displayed "referrers" falsely showing they had most recently visited sites including Engadget, Google, and USA Today.

It's still not clear how the attackers enslaved such a large number of devices. Cid speculated they were hacked by exploiting a recently disclosed vulnerability that allows remote code exucation on digital video recorders * from 70 different manufacturers, but so far this theory hasn't been confirmed

for more details :-    http://arstechnica.com/security/2016/06/large-botnet-of-cctv-devices-knock-the-snot-out-of-jewelry-website/

                                 * http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html

Style Switcher

Predefined Colors

Layout Style

Header Color

Footer Top Color

Footer Bottom Color