Members
  • Total Members: 14197
  • Latest: Levine
Stats
  • Total Posts: 43441
  • Total Topics: 16533
  • Online today: 3143
  • Online ever: 51419
  • (01. January 2010., 10:27:49)
Users Online
Users: 1
Guests: 3131
Total: 3132









Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.codekids.ba:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: Samker
« on: 04. April 2014., 20:32:46 »

This was a good one but I suppose it was dated 1 Apr. :D

Unfortunately, it's not. :-\

Information source is "The SANS Technology Institute": https://www.sans.edu/


Posted by: Pez
« on: 03. April 2014., 22:43:05 »

This was a good one but I suppose it was dated 1 Apr. :D
Posted by: Samker
« on: 02. April 2014., 20:36:56 »



Miscreants are using hacked digital video recorders in a somewhat misguided attempt to mine cryptocurrency BitCoins.

Hackers have created custom code to infect devices normally used for recording footage from security cameras. After getting in, likely to taking advantage of weak default passwords, a common security mistake with embedded devices, the ne'er-do-wells plant malicious code. This malware scans for vulnerable Synology Disk Stations as well as attempting to mine BitCoins.

Security researchers at the SANS Institute's Internet Storm Center spotted the attacks after investigating devices scanning its honeypot, discovering to their surprise that they were actually infected DVRs (digital video recorders). The malware is compiled for ARM CPUs, so it's a specialist nasty.

"The malware is an ARM binary, indicating that it is targeting devices, not your typical x86 Linux server," explains SANS Institute researcher Johannes Ullrich in a write-up: https://isc.sans.edu/forums/diary/More+Device+Malware+This+is+why+your+DVR+attacked+my+Synology+Disk+Station+and+now+with+Bitcoin+Miner+/17879
The malicious code is only scanning for vulnerable Synology Disk Stations and not doing anything on these insecure networks attached storage devices, at least for now.

Security researchers at the SANS Institute have since discovered that the Synology scanner is also running on routers: https://isc.sans.edu/forums/diary/cmd+so+Synology+Scanner+Also+Found+on+Routers/17883

Mining BitCoins these days requires a specialist rig featuring graphic cards so using low-powered embedded systems is not terribly practical.

"Kudos to camera DVRs hackers for finding something worse (ie, very ineffective cryptocurrency mining) to use them for than surveillance," said Martijn Grooten, Virus Bulletin's anti-spam test director: https://twitter.com/martijn_grooten/status/451124079689744384

Chris Wysopal, co-founder and chief technology officer at code review firm Veracode, was even more dismissive: "Seriously, this is just wasting electricity," he said: https://twitter.com/WeldPond/status/451117725273038849

(ElReg)

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Kursevi programiranja za ucenike u Sarajevu

Terms of Use | Privacy Policy | Advertising
TinyPortal 2.3.1 © 2005-2023