Following on the heels of Mirai, a family of malware exploiting Internet of Things devices, [Sam Edwards] and [Ioannis Profetis] of Rapidity Networks have discovered a malicious Internet worm dubbed Hajime which targets Internet of Things devices.
Around the beginning of October, news of an IoT botnet came forward, turning IP webcams around the world into a DDoS machine. Rapidity Networks took an interest in this worm, and set out a few honeypots in the hopes of discovering what makes it tick.
Looking closely at the data, there was evidence of a second botnet that was significantly more sophisticated. Right now, they’re calling this worm Hajime.
The Hajime worm affects Internet of Things devices running BusyBox, a Unix-ey thing popular in embedded and Internet of Things systems. The Hajime worm propagates itself through port 23 – Telnet – via usernames and password combinations hardcoded into a list of credentials.
Right now, the extent of the Hajime worm is small. It appears the author is still in the propagation phase of his botnet. According to Rapidity Networks, the author is building out the botnet before deploying more advanced payloads. Like the previous IoT worm, Hajime could easily be used for a DDoS attack, or by selling ‘deployment services’ to future botnets.
Millions of Internet of Things devices have been sold with Telnet open and hardcoded credentials. The fact that devices like this exist makes IoT botnets inevitable. This isn’t the first botnet or worm directed at IoT devices capable of deploying payloads or killing servers. Until IoT device manufacturers get their act together, it won’t be the last, either.
Jeebus, are they using a 2 decade old text on internet security that says something like “It’s okay to use a hardcoded password with at least 6 letters because a hacker with an apple ][ will only be able to brute force it over a modem link in upwards of 500 days.”
The usual method is get it working and add security later on. But once it is in any way half working the product is shipped. Get the faulty version out the door and the money in. And if it is broken badly enough it will force people to buy version 2.0, which is great news for marketing. Version 2.0 will have the same hardcoded username and password but will use ssh instead of telnet. Time for version 3.0, ssh, same hard coded username, but the password was changed. ……
Nice description on how the market works :-)
It’s all a big game really.
I make something useful and you try and make use of it for something else.
I just wonder what they will do with my internet connected toilet seat.
They’ll patent it and call it the iPood.
No?
Did you mean iPoop?
Hajime was just a gorilla
that was Harambe, you fool.
Harambe is not just a gorilla, you fool.
Harambe *was* not just a gorilla, you fool.
Here’s hoping it’s actually a good guy that’s about to brick millions of unsecured devices. :/
Exactly my thought.
At first, like Aaa, I thought along regulatory lines. But slowly I realize that most IoT companies are high-risk things which probably don’t exist at the moment the “thing” is unleashed upon us.
By now I only see a chance in “vigilante” botnets. Whenever a vulnerability is known, make a bot which *puts the device out right away* (well, may be after it has propagated four or five times).
This way, the stupid devices will stop working shortly after they’ve been bought: they get a bad rap and nobody buys them.
That is always an option, for a state actor, they have the legal right to act offensively if it serves their mission to protect local infrastructure.
So does this worm leave the door open or slam it shut after taking control?
giggling that the Hajime worm used ECCHI as a parameter…
so they finally weaponized moe?
figures it had to be a weapon with the energy spent on it…
I thought ECCHI is some security/cryptography-related thing and asked wikipedia – uh, not what i expected…
Lets all have a moment of silence for some guy’s browser history. It once was a regular respectable history, now it is ecchi.
browser history is cleared everytime i close firefox :-) and i am the only person using this computer, so anyway… at work it might be another thing…
There should be requirement (enforced by CE certification rules or something like that) that firmware upgrade protocols and firmware images (not necessarily source code) should be publicly available and user-patchable. If some part of device is part of botnet – there should be a chance for patching it. If you can’t patch a certified device – producer AND DISTRIBUTOR are both responsible for losses and damages. And after some warnings – also the user.
+1
Swann Security in Australia should be indicted for how many vulnerable IoT security camera systems they have knowingly sold to their customers.
They took chinese crap, translated it to english and sold it at at least 400% markup to gullible average Australians.
So who owns them (or the actual company that is really liable in a legal sense), probably a Chinese company that links back to the Chinese government who would claim sovereign immunity even if you did win a legal case against them. If you want the option to be able to hold a vendor legally liable for their products then don’t deal with Chinese companies, or any other state owned companies for that matter, from any country.
Looks like maybe we have our answer http://www.cnbc.com/2016/10/21/major-websites-across-east-coast-knocked-out-in-apparent-ddos-attack.html
Netflix, Twitter, Paypal and others down. Although Paypal was only down for a little bit.
Just a question.
Why is the port 23 open on so many internet connections.
I mean if i got a camera i will only open port 80 or better another higer one so nobody would find is on the normal search, but why port 23.
Jusrt currios
it’s for telnet
Yes i know but why should somebody open the telnet port in portforwarding if you only want to stream the camera to your smartphone.
I would only open port 80 or so for the http picture transfer
So i dont get it ^^
I believe routers with UPnP enabled will acknowledge requests from devices to open the required ports, thus an IP camera could request port 23 to be opened.
because they were TRICKED into doing so by the product manual when they should have returned it because it told them to go get hacked by opening up port 23…
if it’s open for the camera then it’s open for all other computers, unless you set up a special “zone” for your camera but if you know how to do that then you would probably not trust the device anyway.
port23 is used for telnet, if you dont know what telnet is and if your user manual is specifying to open it in your router but NOT asking you to install and run telnet (and type stuff into it), then suspect the intentions of anyone and everyone that had access to the user manual before printing.
although it is technically possible to use telnet protocol for a GUI app, it is highly inefficient (and highly unsecure). telnet is from before internet, the full meaning of TelNet is TelephoneNetwork ie dial-up. im sure modern telnet is slightly more secure but seriously computers dont like to converse in HUMAN-language, it’s just extra data to convert and push that results is a smile on the face of anyone wishing to do harm. it just doesnt get any easier then spying on an internet datastream that litterally screams human things like PASSWORD=161021cherry instead of some binary+hash. telnet is not for people that dont know how to use it safely.
in case anyone did not get what i was trying to explain; if a remote-control app requires port23 then you got ripped off. according to the patent rules of earth, this device is not patentable because it does not include anything unique that did not exist before in all the competitors and any mention of patents are pure lies and they should not be trusted or funded, get a refund while you still can.
“THERE IS ANOTHER SYSTEM”
I disabled upnp long ago because I was afraid of this very thing, and had cameras that kept opening a bunch of ports to the world.
Yes it causes a few minor annoyances setting up things like voip but my cameras are secure behind the firewall and arent contributing to this hilarity.