Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Botnet of Aethra Routers Used for Brute-Forcing WordPress Sites
softpedia® ^ | 23 Dec 2015, 12:30 GMT | Catalin Cimpanu

Posted on 12/26/2015 7:58:53 PM PST by Utilizer

Italian security researchers from VoidSec have come across a botnet structure that was using vulnerable Aethra Internet routers and modems to launch brute-force attacks on WordPress websites.

This particular incident was uncovered after one of the VoidSec researchers was sifting through his WordPress log file and found a brute-force attack coming from the same IP range.

After further investigation, all the IPs came from six Internet Service Providers (ISP): Fastweb, Albacom (BT-Italia), Clouditalia, Qcom, WIND, and BSI Assurance UK, four of which are from Italy.

What all these networks had in common were Aethra routers. VoidSec researchers narrowed down most of the attacks to these devices.

(Excerpt) Read more at news.softpedia.com ...


TOPICS: Business/Economy; Computers/Internet
KEYWORDS: aethra; botnet; europeanunion; italy; malware; routers; security; voidsec
More router security concerns.
1 posted on 12/26/2015 7:58:53 PM PST by Utilizer
[ Post Reply | Private Reply | View Replies]

To: Salamander
Aethra Routers!


(Quick! Somebody warn Plato.)

2 posted on 12/26/2015 8:19:46 PM PST by shibumi (Vampire Outlaw of the Milky Way)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Utilizer
Aethra Routers

Could be worse...

"EXTERMINATE!"

3 posted on 12/26/2015 9:32:35 PM PST by montag813
[ Post Reply | Private Reply | To 1 | View Replies]

To: Utilizer

Bump for more routing...


4 posted on 12/27/2015 6:44:18 PM PST by Utilizer (Bacon A'kbar! - In world today are only peaceful people, and the muzrims trying to kill them)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Utilizer
Further inquiry into these routers showed that all were still using their default credentials. This made them very easy to take over by attackers, since both the default admin username and passwords were non-existent (blank spaces).

Additional investigation also revealed that some of the routers were also susceptible to various reflected XSS and CSRF attacks that would also allow attackers to take control of the device, even if using different login credentials.

Using Shodan, a search engine for locating Internet-connected devices, researchers found over 12,000 of Aethra routers around the world, 10,866 in Italy alone, and over 8,000 of these devices were of the model detected in the initial brute-force attack (Aethra Telecommunications PBX series). At that time, 70% of these Aethra routers were still using their default login credentials

According to a rough estimate, based on the average bandwidth associated with each router's ISPs, each infected router would be able to send out traffic between 1 and 10 Gbps during a DDoS attack.

BUMP

5 posted on 12/27/2015 8:07:28 PM PST by FourPeas (Chocolate, sugar and lots of caffeine. Hard to beat that.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Utilizer
Further inquiry into these routers showed that all were still using their default credentials. This made them very easy to take over by attackers, since both the default admin username and passwords were non-existent (blank spaces).

Additional investigation also revealed that some of the routers were also susceptible to various reflected XSS and CSRF attacks that would also allow attackers to take control of the device, even if using different login credentials.

Using Shodan, a search engine for locating Internet-connected devices, researchers found over 12,000 of Aethra routers around the world, 10,866 in Italy alone, and over 8,000 of these devices were of the model detected in the initial brute-force attack (Aethra Telecommunications PBX series). At that time, 70% of these Aethra routers were still using their default login credentials

According to a rough estimate, based on the average bandwidth associated with each router's ISPs, each infected router would be able to send out traffic between 1 and 10 Gbps during a DDoS attack.

BUMP

6 posted on 12/27/2015 8:08:12 PM PST by FourPeas (Chocolate, sugar and lots of caffeine. Hard to beat that.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Utilizer
Further inquiry into these routers showed that all were still using their default credentials. This made them very easy to take over by attackers, since both the default admin username and passwords were non-existent (blank spaces).

Additional investigation also revealed that some of the routers were also susceptible to various reflected XSS and CSRF attacks that would also allow attackers to take control of the device, even if using different login credentials.

Using Shodan, a search engine for locating Internet-connected devices, researchers found over 12,000 of Aethra routers around the world, 10,866 in Italy alone, and over 8,000 of these devices were of the model detected in the initial brute-force attack (Aethra Telecommunications PBX series). At that time, 70% of these Aethra routers were still using their default login credentials

According to a rough estimate, based on the average bandwidth associated with each router's ISPs, each infected router would be able to send out traffic between 1 and 10 Gbps during a DDoS attack.

BUMP

7 posted on 12/27/2015 8:09:03 PM PST by FourPeas (Chocolate, sugar and lots of caffeine. Hard to beat that.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: FourPeas

Ugh.

My apologies. Over subscribed microwave-connected ISP in a rainstorm makes for a really funky connection.


8 posted on 12/27/2015 8:19:05 PM PST by FourPeas (Chocolate, sugar and lots of caffeine. Hard to beat that.)
[ Post Reply | Private Reply | To 7 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson