More router security concerns.
1 posted on
12/26/2015 7:58:53 PM PST by
Utilizer
To: Salamander
Aethra Routers!
(Quick! Somebody warn Plato.)
2 posted on
12/26/2015 8:19:46 PM PST by
shibumi
(Vampire Outlaw of the Milky Way)
To: Utilizer
Aethra Routers Could be worse...
"EXTERMINATE!"
3 posted on
12/26/2015 9:32:35 PM PST by
montag813
To: Utilizer
4 posted on
12/27/2015 6:44:18 PM PST by
Utilizer
(Bacon A'kbar! - In world today are only peaceful people, and the muzrims trying to kill them)
To: Utilizer
Further inquiry into these routers showed that all were still using their default credentials. This made them very easy to take over by attackers, since both the default admin username and passwords were non-existent (blank spaces).
Additional investigation also revealed that some of the routers were also susceptible to various reflected XSS and CSRF attacks that would also allow attackers to take control of the device, even if using different login credentials.
Using Shodan, a search engine for locating Internet-connected devices, researchers found over 12,000 of Aethra routers around the world, 10,866 in Italy alone, and over 8,000 of these devices were of the model detected in the initial brute-force attack (Aethra Telecommunications PBX series). At that time, 70% of these Aethra routers were still using their default login credentials
According to a rough estimate, based on the average bandwidth associated with each router's ISPs, each infected router would be able to send out traffic between 1 and 10 Gbps during a DDoS attack. BUMP
5 posted on
12/27/2015 8:07:28 PM PST by
FourPeas
(Chocolate, sugar and lots of caffeine. Hard to beat that.)
To: Utilizer
Further inquiry into these routers showed that all were still using their default credentials. This made them very easy to take over by attackers, since both the default admin username and passwords were non-existent (blank spaces).
Additional investigation also revealed that some of the routers were also susceptible to various reflected XSS and CSRF attacks that would also allow attackers to take control of the device, even if using different login credentials.
Using Shodan, a search engine for locating Internet-connected devices, researchers found over 12,000 of Aethra routers around the world, 10,866 in Italy alone, and over 8,000 of these devices were of the model detected in the initial brute-force attack (Aethra Telecommunications PBX series). At that time, 70% of these Aethra routers were still using their default login credentials
According to a rough estimate, based on the average bandwidth associated with each router's ISPs, each infected router would be able to send out traffic between 1 and 10 Gbps during a DDoS attack. BUMP
6 posted on
12/27/2015 8:08:12 PM PST by
FourPeas
(Chocolate, sugar and lots of caffeine. Hard to beat that.)
To: Utilizer
Further inquiry into these routers showed that all were still using their default credentials. This made them very easy to take over by attackers, since both the default admin username and passwords were non-existent (blank spaces).
Additional investigation also revealed that some of the routers were also susceptible to various reflected XSS and CSRF attacks that would also allow attackers to take control of the device, even if using different login credentials.
Using Shodan, a search engine for locating Internet-connected devices, researchers found over 12,000 of Aethra routers around the world, 10,866 in Italy alone, and over 8,000 of these devices were of the model detected in the initial brute-force attack (Aethra Telecommunications PBX series). At that time, 70% of these Aethra routers were still using their default login credentials
According to a rough estimate, based on the average bandwidth associated with each router's ISPs, each infected router would be able to send out traffic between 1 and 10 Gbps during a DDoS attack. BUMP
7 posted on
12/27/2015 8:09:03 PM PST by
FourPeas
(Chocolate, sugar and lots of caffeine. Hard to beat that.)
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson