Subscriber Discussion

New IOT Botnet Iotreaper

MM
Michael Miller
Oct 21, 2017
U
Undisclosed
Oct 31, 2017

This link http://seclists.org/fulldisclosure/2017/Mar/23 (which I am >not< claiming is a good source) lists 2 old Axis cameras, a HIKvision camera, a 3xLogic camera.  Mostly it's low end stuff.  Weird list, verify if you need to take action.

This link https://pierrekim.github.io/blog/2017-03-08-camera-goahead-0day.html#rsa-lulz has descriptions of issues.  At least one (the bypass where you can retrieve parameter files with no password) is a basic "you screwed up your web server interface" issue.  Reproducing the compromise requires accurately typing in the URL in the notice - no programming required.

So... no obvious physical security "camerageddon" unless your camera vendor has shoddy web server software and you were crazy enough to hang your cameras on the public internet.

U
Undisclosed #2
Oct 31, 2017
IPVMU Certified

So... no obvious physical security "camerageddon" unless your camera vendor has shoddy web server software and you were crazy enough to hang your cameras on the public internet.

Sounds like we’re in for a rough ride :)

UI
Undisclosed Integrator #1
Oct 31, 2017

It seems like Reaper may have been way over estimated. The only thing unique about this Botnet is it's flexibility and use of leaked tools to spread.

(Pretty good summation of the issue from ArsTechnia)

https://arstechnica.com/information-technology/2017/10/assessing-the-threat-the-reaper-botnet-poses-to-the-internet-what-we-know-now/

New discussion

Ask questions and get answers to your physical security questions from IPVM team members and fellow subscribers.

Newest discussions