OpenBCM V1.07b11 (WIN32)

Packet Radio Mailbox

DBO595

[LAU JN59RM]

 Login: GAST





  

HB1PMS > TECH     21.01.20 15:03l 75 Lines 3383 Bytes #999 (0) @ WW
BID : 5645HB1PMS
Read: GAST
Subj: Hacker Exposes Credentials for over 500,000 Intern
Path: DBO595<DBX320<FRB024<NL3TD<NL3PRC<GY1BBS<HB1BBS
Sent: 200121/1226Z 5380@HB1BBS.ZL.NLD.EU BPQ6.0.19

Message from: HB1PMS@HB1BBS

Hacker Exposes Credentials for over 500,000 Internet-connected Devices

January 20, 2020 | Breaches and Incidents 
exploit, hacker, bash, shell, server, code, linux, engineer, python, 
network, program, loop, lan, internet, prompt, c, ping, computer, minix, 
source, core, soap, ip, shock, local, web, programming, kernel, html, 
programer, command, script, language, cracker, unix, host, plus, software
The devices on the published Telnet list were from all over the world.
It is not known how many of these credentials are still valid.
A hacker reportedly published a massive list of Telnet credentials for more 
than 515,000 servers, home routers, and IoT devices on an online forum. 
These types of lists—called ‘bot lists’—are a common component of an IoT 
botnet operation.

What is Telnet?

Telnet is a communication service protocol that helps a user in controlling 
a remotely connected device over the TCP/IP network.

Findings by experts

The list was compiled by scanning the entire internet for connected devices 
with exposed Telnet ports.

To prepare the list, the hacker likely used two methods; using factory-set 
default usernames and passwords; and attempting easy-to-guess password 
combinations.
The devices on the Telnet list were from all over the world, which included 
each device's IP address and username/ password for the Telnet service.
While a few of them were based on home networks, most of them were based on 
reputed cloud service providers.
Experts, who also spoke to the hacker, revealed that he was previously a 
maintainer of a DDoS-for-hire service. After being questioned on why he 
published the list, the hacker said he upgraded his DDoS service from 
working on top of IoT botnets to a new model that relies on renting high-
output servers from cloud service providers.

The ongoing dialogue

As per various reports, the leaked list has data from October-November 2019. 
It is not known how many of these credentials are still valid. Some of these 
devices are expected to be now running on a different IP address, or using 
different login credentials. Despite that, experts believe the lists remain 
incredibly useful for a skilled attacker.

Final analysis

Misconfigured devices are often clustered on the network of one single ISP. 
It happens due to misconfiguration of the devices by the ISP staff while 
deploying them to their respective customer bases. An attacker can use the 
IP addresses included in the leaked lists to determine the service provider 
and then re-scan the ISP's network to update the list with the latest IP 
addresses.

73 Henk. HB1PMS

=====================================================================
  _    _ ____  __ ____  ____   _____ 
 | |  | |  _ \/_ |  _ \|  _ \ / ____|  SYS: Henk (hb1nos@hb1bbs.com)  
 | |__| | |_) || | |_) | |_) | (___    QTH: Ouwerkerk - JO11XO
 |  __  |  _ < | |  _ <|  _ < \___ \   BBS: HB1BBS.ZL.NLD.EU
 | |  | | |_) || | |_) | |_) |____) |  QRV: 27.235 MHz (FM 1200bps)
 |_|  |_|____/ |_|____/|____/|_____/   WEB: www.hb1bbs.com

=====================================================================
(Message sent with Sally 7.2.035)
---------------------------------------------------------------------
Timed Tuesday 11 January 2005  16:26 gmt
BBS       HB1PMS@HB1BBS
---------------------------------------------------------------------




Lese vorherige Mail | Lese naechste Mail


 14.11.2024 23:55:19lZurueck Nach oben