Overclock.net › Forums › Software, Programming and Coding › Operating Systems › Linux, Unix › New Linux worm targets routers, cameras, “Internet of things” devices
New Posts  All Forums:Forum Nav:

New Linux worm targets routers, cameras, “Internet of things” devices - Page 2

post #11 of 15
Quote:
Originally Posted by Rookie1337 View Post


I don't think it does. But I saw a Netgear and stupidly figured it was probably the most vulnerable. I shouldn't be that bad off if my setup is only a year old right? I guess I should start looking into firmware flashing and such for network stuff.

 

One year without updates? What's the model?

post #12 of 15
Quote:
Originally Posted by TFL Replica View Post

One year without updates? What's the model?

Many routers go without firmware updates for more than a year man.
Ol' Sandy
(28 items)
 
"Zeus"
(12 items)
 
Elite Preview
(6 items)
 
CPUMotherboardGraphicsRAM
Intel Xeon E3-1230v3 Gigabyte GA-Z97X-UD5H-BK MSI Gaming GTX 980 Kingston 32GB (4x8) 
Hard DriveHard DriveHard DriveHard Drive
Plextor PX-256M5S 256GB Samsung EVO 1TB Hitachi HDS721010CLA332 Hitachi HDS723020BLA642 
Hard DriveHard DriveHard DriveOptical Drive
Hitachi HDS723020BLA642 Hitachi HUA722010CLA330 WDC WD10EARS-00Z5B1 TSSTcorp CDDVDW SH-S223B 
CoolingCoolingOSMonitor
Phanteks PH-TC14PE with TY-140's Lamptron FCv5 (x2) Windows 8 Pro 64-bit Dell U2412M 
MonitorMonitorMonitorKeyboard
Dell U2412M Dell U2212HM Dell U2713HM Topre Realforce 87UB | Ducky DK9087 G2 Pro 
PowerCaseMouseMouse Pad
Corsair AX-750 Corsair Obsidian 650D Logitech G700 XTRAC Ripper XXL 
AudioAudioAudioAudio
Beyerdynamic DT-770 Pro 250ohm Schiit Bifrost DAC Schiit Asgard 2 HiVi Swan M50W 2.1 
CPUMotherboardRAMHard Drive
Intel Xeon E5-2620 Super Micro X9SRL-F-B 128GB 1333MHz LSI 9271-8i 
OSPowerCase
VMware ESXi 5.5 SeaSonic SS-400FL2 Fractal Define R3 
CPUMotherboardGraphicsRAM
Intel Core i5-3437U HP EliteBook Folio 9470m  Intel HD Graphics 4000  16GB DDR3 SDRAM 
Hard DriveOS
256GB SSD Windows 10 Insider Preview 
  hide details  
Reply
Ol' Sandy
(28 items)
 
"Zeus"
(12 items)
 
Elite Preview
(6 items)
 
CPUMotherboardGraphicsRAM
Intel Xeon E3-1230v3 Gigabyte GA-Z97X-UD5H-BK MSI Gaming GTX 980 Kingston 32GB (4x8) 
Hard DriveHard DriveHard DriveHard Drive
Plextor PX-256M5S 256GB Samsung EVO 1TB Hitachi HDS721010CLA332 Hitachi HDS723020BLA642 
Hard DriveHard DriveHard DriveOptical Drive
Hitachi HDS723020BLA642 Hitachi HUA722010CLA330 WDC WD10EARS-00Z5B1 TSSTcorp CDDVDW SH-S223B 
CoolingCoolingOSMonitor
Phanteks PH-TC14PE with TY-140's Lamptron FCv5 (x2) Windows 8 Pro 64-bit Dell U2412M 
MonitorMonitorMonitorKeyboard
Dell U2412M Dell U2212HM Dell U2713HM Topre Realforce 87UB | Ducky DK9087 G2 Pro 
PowerCaseMouseMouse Pad
Corsair AX-750 Corsair Obsidian 650D Logitech G700 XTRAC Ripper XXL 
AudioAudioAudioAudio
Beyerdynamic DT-770 Pro 250ohm Schiit Bifrost DAC Schiit Asgard 2 HiVi Swan M50W 2.1 
CPUMotherboardRAMHard Drive
Intel Xeon E5-2620 Super Micro X9SRL-F-B 128GB 1333MHz LSI 9271-8i 
OSPowerCase
VMware ESXi 5.5 SeaSonic SS-400FL2 Fractal Define R3 
CPUMotherboardGraphicsRAM
Intel Core i5-3437U HP EliteBook Folio 9470m  Intel HD Graphics 4000  16GB DDR3 SDRAM 
Hard DriveOS
256GB SSD Windows 10 Insider Preview 
  hide details  
Reply
post #13 of 15
Low threat seems like a bit of an understatement. "No threat" is more like it. And yes - I did read the article. The number of potential targets for this worm is remarkably low; and since it uses known malicious servers the probability of infection on basically any modern network is next to zero. For one, it targets specifically x86 processors running on an unpatched code base that suffers from the vulnerability. Well, interestingly, almost all x86 based distributions move rather quickly - and almost zero infrastructure devices (those that go without updates for months on end) run an x86 processor. Not to mention the "vulnerability" relies on easy to guess passwords, stored in common locations. Another article blowing things way out of proportion.
    
CPUMotherboardGraphicsRAM
Core i7 920 D0 4.2ghz HT (1.3625v) Asus R3E 2xGTX 460 (non SLi, no overclock) 6x2gb G.skill @ 6-8-6-24-1T 
Hard DriveOptical DriveOSMonitor
WD-VR 300GBx1, 2xWD 1tb,2x60gb Agility Some crappy combo burner... Arch x64 3xDell U2410f rev A02 
KeyboardPowerCaseMouse
X-Armor U9BL TT Toughpower 1200w (NTB more efficient) Mountain Mods Pinnacle 24 CYO Roccat Kone (R.I.P. A4Tech x7) 
Mouse Pad
Steelpad Experience I-1 
  hide details  
Reply
    
CPUMotherboardGraphicsRAM
Core i7 920 D0 4.2ghz HT (1.3625v) Asus R3E 2xGTX 460 (non SLi, no overclock) 6x2gb G.skill @ 6-8-6-24-1T 
Hard DriveOptical DriveOSMonitor
WD-VR 300GBx1, 2xWD 1tb,2x60gb Agility Some crappy combo burner... Arch x64 3xDell U2410f rev A02 
KeyboardPowerCaseMouse
X-Armor U9BL TT Toughpower 1200w (NTB more efficient) Mountain Mods Pinnacle 24 CYO Roccat Kone (R.I.P. A4Tech x7) 
Mouse Pad
Steelpad Experience I-1 
  hide details  
Reply
post #14 of 15
Netgear flashed with tomato smile.gif problem solved?
post #15 of 15
Thread Starter 
Quote:
Originally Posted by Xaero252 View Post

Low threat seems like a bit of an understatement. "No threat" is more like it. And yes - I did read the article. The number of potential targets for this worm is remarkably low; and since it uses known malicious servers the probability of infection on basically any modern network is next to zero. For one, it targets specifically x86 processors running on an unpatched code base that suffers from the vulnerability. Well, interestingly, almost all x86 based distributions move rather quickly - and almost zero infrastructure devices (those that go without updates for months on end) run an x86 processor. Not to mention the "vulnerability" relies on easy to guess passwords, stored in common locations. Another article blowing things way out of proportion.

Not really. The article makes it quite clear that the risk is low. But since some people forget about securing their networking hardware -thinking only PCs / servers can get hacked- it's good to raise awareness that anything with a processor is a potential vulnerability.

It's also worth noting that x86 isn't only a target because that's what the code's been compiled against. However any architecture could be targeted in the same way. So the scope for this vulnerability (if not this specific attack) isn't quite as narrow as you state - though you're other points are bang on smile.gif
New Posts  All Forums:Forum Nav:
  Return Home
  Back to Forum: Linux, Unix
Overclock.net › Forums › Software, Programming and Coding › Operating Systems › Linux, Unix › New Linux worm targets routers, cameras, “Internet of things” devices