Buy American may be solution to cyber warfare attacks on embedded computing with Chinese spy chips
|
|
Bot-herding software called Persirai, which incorporates pieces of the Mirai botnet code, can commandeer significant chunks of a known 150,000 IP cameras that are vulnerable to Mirai and use them to fire off distributed denial-of-service attacks.
The Persirai botnet has attacked at least four targets, starting in a predictable pattern, according to researchers at Trend Micro.
Persirai takes advantage of a known vulnerability in the cameras to infect them, has them download malware from a command and control server, and then puts them to work either infecting other vulnerable cameras or launching DDoS attacks. “Based on the researchers’ observation, once the victim’s IP Camera received C&C commands, which occurs every 24 hours at 12:00 p.m. UTC, the DDoS attacks start,” the researchers say.
To read this article in full or to leave a comment, please click here
An analysis of hundreds of publicly available firmware images for routers, DSL modems, VoIP phones, IP cameras and other embedded devices uncovered high-risk vulnerabilities in a significant number of them, pointing to poor security testing by manufactuers.
The study was performed by researchers from the Eurecom research center in France and Ruhr-University Bochum in Germany, who built an automated platform capable of unpacking firmware images, running them in an emulated environment and starting the embedded Web servers that host their management interfaces.
The researchers started out with a collection of 1,925 Linux-based firmware images for embedded devices from 54 manufacturers, but they only managed to start the Web server on 246 of them. They believe that with additional work and tweaks to their platform that number could increase.
To read this article in full or to leave a comment, please click here
Digital Trends |
Samsung amps up Android security with embedded tracking, recovery and more
Digital Trends Samsung Knox marks the first time a device maker has moved to substantially enhance Android's security profile — it's calling it SE Android, for “Security Enhanced”. (Knox is named for Fort Knox, get it?) It's also the first time a mobile device will … |