Too much cheapness
This is just reinforcing my refusal to use kit supplied by an ISP. "Free" kit seems to be worth exactly what you pay for it.
Thousands of broadband customers in the Hull area have been left without reliable internet access following a cyber attack. Local telco KCOM blamed difficulties for its customers which began over the weekend and remains ongoing on an attack it said was targeted at models of routers it supplies to some of its customers. Since …
"We have now identified that the root cause of the problem was a cyber attack..."
No. The root cause lies somewhere between the stupid vulns that are present in so many routers, and the fact that the telco didn't see that coming.
I don't know whether this is the same exploit that brought down large numbers of Deutsche Telekom customers four days earlier, but it doesn't really matter. Checking the routers you sell or lease to your customers against recently reported security problems is something I'd expect from _any_ telco these days.
But you can, of course, adopt that old "Hey, everything's going fine so far - why worry" mentality, whether you're a telco or a person just passing the third level while falling down from a 20-story building. The outlook is about the same.
We're all doomed.
I don't know whether this is the same exploit that brought down large numbers of Deutsche Telekom customers four days earlier, but it doesn't really matter.
Up to a point, Lord Copper.
This wasn't a DoS attack on random domestic broadband customers. The DoS was a side effect of the latest round of scans looking for vulnerable InternetOfShit devices to recruit for the Mirai botnet. It would be naive to imagine that all the attackers managed to do was crash or brick a few million routers; they've obviously been adding to their list of trivially pwned devices (either via exploits, common default admin passwords or unauthenticated management interfaces left open to 0/0.) My educated guess is that we'll find out how big the botnet is now at some point in the next few weeks / couple of months. Do we have any big events coming up? Let's see... there's the massive Christmas Day spike in gaming traffic as all the newly unwrapped consoles are fired up, I suppose. And something's happening in Washington in late January, IIRC. Any other obvious candidates for a spectacular DDoS?
Well, there is prior form for LulzSec and LizardSquad and the like to DDoS the XBL and Sony servers out of existence. Maybe they'll go for Steam and some of the other nice things that people would want to be enjoying over the Christmas break too... And then get back to holding infrastructures hostage.
Beer in anticipation of the inevitable "Mistakes were made".
I'm sure I read a recent story on here about certain models of ZyXel being wide open to attacks due to an internet facing open management port which was meant to be locked down to certain IPs, but was left open to everyone and his dog.
I thought it was Talk-Talk, but apparently not, I can't find the story now.
Could well be the same problem though.
... Deutsche Telekom, in the library, with a lead pipe Germany, with a Mirai botnet.
http://www.theregister.co.uk/2016/11/28/router_flaw_exploited_in_massive_attack/
I'm sure I read a recent story on here about certain models of ZyXel being wide open to attacks due to an internet facing open management port which was meant to be locked down to certain IPs, but was left open to everyone and his dog.
TalkTalk and the Post Office apparently. Hard to believe a company as diligent as TT got hit though... they'll have to deploy Dido to allay fears!
Actually, the linked BBC article mentions that the Post Office have/are deploying router updates and requesting customers to reboot their routers to install the update. So that's something.
“ZyXel has developed a software update for the affected routers that will address the vulnerability. In most cases this will be applied remotely and customers will not need [to] do anything”
So ZyXel have a backdoor into the routers they have sold? What happens when (not if) the bad guys get a hold of that?
No, not ZyXel, but your ISP has a way to "remotely manage" the router they gave you.
There are valid reasons for this, e.g. installing the firmware update that fixes this bug, or trying to troubleshoot a connection issue, either by getting logs from the router or by changing router settings for you.
Details of the remote management protocol are here: https://en.wikipedia.org/wiki/TR-069
However, this is a security trade-off, of course, and the remote management feature can be a source of security vulnerabilities.
In my opinion, ideally ISPs should document exactly what TR-069 features they've enabled on the router, and how it's secured, so customers could make informed decisions on whether to use the "free" router or not. (99.999% of customers wouldn't be able to understand the technical details, but security experts could read the ISP's documentation and provide advice). However, most companies try to avoid providing documentation like that, instead saying basically "trust us".
"We have now identified that the root cause of the problem was a cyber attack that targets a vulnerability in certain broadband routers, causing them to crash and disconnect from the network......"
"....If we'd bothered to update the firmware for this known and fully document problem prior to this, you wouldn't have suffered this issue....but we couldn't be arsed."
And ISPs that leave the management ports open to the internet
Why would one need the management interface enabled at all in a TR69 environment beggars belief. The management system(s) used in a SP DO NOT use normal config ports for management. At all. The connection is originated from the router to the control system and should (if the SP had any clue) be secured with X509 one way or even both ways (router and ACS). While the TR69 spec is considered by all people who have had to develop for it an Abomination Onto Nuggan, it is, if deployed as per its standard design, reasonably secure.
This is criminal stupidity and incompetence. Actually what can I expect from a SP which used to advertise for a senior engineer position with laptop specified as a "benefit" in the job spec. I still keep that advert as a reminder "do not ever apply here" (from around 2007-ish). I guess they did not change. At all.
The same Telecoms provider had an air-con unit above the main email server.
So when the air-con leaked, it took down most of the client base email, consequently the P45 printer went into operation.
Kit was replaced / repaired, but put back in the same location.
Cue second leak.....taking it all down again.
Cloudflare said it this month staved off another record-breaking HTTPS-based distributed denial-of-service attack, this one significantly larger than the previous largest DDoS attack that occurred only two months ago.
In April, the biz said it mitigated an HTTPS DDoS attack that reached a peak of 15.3 million requests-per-second (rps). The flood last week hit a peak of 26 million rps, with the target being the website of a company using Cloudflare's free plan, according to Omer Yoachimik, product manager at Cloudflare.
Like the attack in April, the most recent one not only was unusual because of its size, but also because it involved using junk HTTPS requests to overwhelm a website, preventing it from servicing legit visitors and thus effectively falling off the 'net.
A 33-year-old Illinois man has been sentenced to two years in prison for running websites that paying customers used to launch more than 200,000 distributed denial-of-services (DDoS) attacks.
A US California Central District jury found the Prairie State's Matthew Gatrel guilty of one count each of conspiracy to commit wire fraud, unauthorized impairment of a protected computer and conspiracy to commit unauthorized impairment of a protected computer. He was initially charged in 2018 after the Feds shut down 15 websites offering DDoS for hire.
Gatrel, was convicted of owning and operating two websites – DownThem.org and AmpNode.com – that sold DDoS attacks. The FBI said that DownThem sold subscriptions that allowed the more than 2,000 customers to run the attacks while AmpNode provided customers with the server hosting. AmpNode spoofed servers that could be pre-configured with DDoS attack scripts and attack amplifiers to launch simultaneous attacks on victims.
A Malaysia-linked hacktivist group has attacked targets in India, seemingly in reprisal for a representative of the ruling Bharatiya Janata Party (BJP) making remarks felt to be insulting to the prophet Muhammad.
The BJP has ties to the Hindu Nationalist movement that promotes the idea India should be an exclusively Hindu nation. During a late May debate about the status of a mosque in the Indian city of Varanasi – a holy city and pilgrimage site – BJP rep Nupur Sharma made inflammatory remarks about Islam that sparked controversy and violence in India.
Akamai has spoken of a distributed denial of service (DDoS) assault against one of its customers during which the attackers astonishingly claimed to be associated with REvil, the notorious ransomware-as-a-service gang.
REvil was behind the JBS and Kaseya malware infections last year. In January, Russia reportedly dismantled REvil's networks and arrested 14 of its alleged members, theoretically putting an end to the criminal operation.
Beginning in late April, however, the same group of miscreants — or some copycats — appeared to resume their regularly scheduled ransomware activities with a new website for leaking data stolen from victims, and fresh malicious code.
The cybersecurity landscape continues to expand and evolve rapidly, fueled in large part by the cat-and-mouse game between miscreants trying to get into corporate IT environments and those hired by enterprises and security vendors to keep them out.
Despite all that, Verizon's annual security breach report is again showing that there are constants in the field, including that ransomware continues to be a fast-growing threat and that the "human element" still plays a central role in most security breaches, whether it's through social engineering, bad decisions, or similar.
According to the US carrier's 2022 Data Breach Investigations Report (DBIR) released this week [PDF], ransomware accounted for 25 percent of the observed security incidents that occurred between November 1, 2020, and October 31, 2021, and was present in 70 percent of all malware infections. Ransomware outbreaks increased 13 percent year-over-year, a larger increase than the previous five years combined.
Cloudflare this month halted a massive distributed denial-of-service (DDoS) attack on a cryptocurrency platform that not only was unusual in its sheer size but also because it was launched over HTTPS and primarily originated from cloud datacenters rather than residential internet service providers (ISPs).
At 15.3 million requests-per-second (rps), the DDoS bombardment was one of the largest that the internet infrastructure company has seen, and the largest HTTPS attack on record.
It lasted less than 15 seconds and targeted a crypto launchpad, which Cloudflare analysts in a blog post said are "used to surface Decentralized Finance projects to potential investors."
A Tor-hidden website dubbed the Eternity Project is offering a toolkit of malware, including ransomware, worms, and – coming soon – distributed denial-of-service programs, at low prices.
According to researchers at cyber-intelligence outfit Cyble, the Eternity site's operators also have a channel on Telegram, where they provide videos detailing features and functions of the Windows malware. Once bought, it's up to the buyer how victims' computers are infected; we'll leave that to your imagination.
The Telegram channel has about 500 subscribers, Team Cyble documented this week. Once someone decides to purchase of one or more of Eternity's malware components, they have the option to customize the final binary executable for whatever crimes they want to commit.
California Attorney General Rob Bonta on Wednesday welcomed the decision by a group of telecom and cable industry associations to abandon their legal challenge of the US state's net neutrality law SB822.
"My office has fought for years to ensure that internet service providers can't interfere with or limit what Californians do online," said Bonta in a statement. "Now the case is finally over.
"Following multiple defeats in court, internet service providers have abandoned this effort to block enforcement of California's net neutrality law. With this victory, we’ve secured a free and open internet for California's 40 million residents once and for all."
The FTC has settled a case in which Frontier Communications was accused of charging high prices for under-delivered internet connectivity.
The US telecommunications giant has promised to be clearer with subscribers on connection speeds, and will cough up more than $8.5 million, or less than a day in annual profit, to end the matter.
Frontier used to primarily pipe broadband over phone lines to people in rural areas, expanded to cities, and today supplies the usual fare to homes and businesses: fiber internet, TV, and phone services.
The Biden White House has put forward a plan that could see 40 percent of households in the United States getting subsidized high-speed internet, with some having service free of charge.
The Affordable Connectivity Program (ACP) was created as part of the recently passed infrastructure law, and will reimburse bills from internet service providers (ISPs).
Households covered by the ACP will have internet service costs reduced by up to $30 a month, or up to $75 a month if they live on tribal lands.
Biting the hand that feeds IT © 1998–2022