Hidden backdoor discovered in Chinese IoT devices

SOURCE: Information Security Newspaper http://www.securitynewspaper.com/2017/03/02/hidden-backdoor-discovered-chinese-iot-devices/ TAGS: backdoor Researchers at Trustwave have uncovered a backdoor in IoT devices from a Chinese manufacturer that could leave them open to exploitation. The backdoor is present in almost all devices produced by VoIP specialist DBLTek, and appears to have been purposely built in for use by the vendor. It uses a simple challenge and response mechanism to allow remote access. However, Trustwave’s investigation has shown this scheme to be fundamentally flawed in that it is not necessary for a remote user to possess knowledge of any secret or password, besides the challenge itself and knowledge of the protocol/computation used. The issue permits a remote attacker to gain a shell with root privileges on the affected device. It was first identified in an 8 port DBLTek VoIP GSM Gateway, however a number of other devices are also believed to be vulnerable. When Trustwave researchers disclosed the discovery, DBLTek responded by trying to make the backdoor more hidden — using a slightly more complex challenge-response system — rather than closing it, before cutting off contact with Trustwave. The researchers have since been able to write exploits that open both the old and new backdoors. Source:https://betanews.com/ Information Security Newspaper http://www.securitynewspaper.com/2017/03/02/hidden-backdoor-discovered-chinese-iot-devices/

Ransomware for Dummies: Anyone Can Do It — Krebs on Security

Among today’s fastest-growing cybercrime epidemics is « ransomware, » malicious software that encrypts all of your computer files, photos, music and documents and then demands payment in Bitcoin to recover access to the files. A big reason for the steep increase in ransomware attacks in recent years comes from the proliferation of point-and-click tools sold in the cybercrime underground that make it stupid simple for anyone to begin extorting others for money.

Sourced through Scoop.it from: krebsonsecurity.com

Essai – Post Scoop.IT