Hackers took control of 18,000 Huawei router devices in just one day
Researcher from NewSky Security recently discovered a hacker nicknamed Anarchy, only 24 hours to build a botnet from 18,000 Huawei router devices.
- What is a botnet, who does it use to attack, and how can you prevent botnet?
Immediately, other security vendors Rapid7 and Qihoo 360 Netlab quickly joined in and found that scanning of Huawei devices suddenly spiked.
The reason for this increase is that hackers conduct scans to search for vulnerable routers before the critical security vulnerability CVE-2017-17215, which can be exploited through port 37215. Hackers start perform this scan on July 18.
With this method, hackers can send malicious packets, launch attacks on Huawei routers and execute code remotely. The attacker can then control and add these devices to the botnet.
The purpose of the hacker is to create "the worst botnet in the city". This botnet may be used in targeted attacks or may be leased to bad guys to accomplish the attack.
Not only that, Anarchy also said he also intends to start scanning Realtek router router CVE-2014-8361, to control more devices.
See more:
- Warning: Bkav detected more than 700,000 computers in Vietnam infected with virtual money digging virus that slowed down the computer
- Half a million computers in Vietnam suffer from dangerous spyware
- Warning of new malware appear like Wannacry, capable of deleting Vietnamese percussion on computer
You should read it
- What is botnet DDoS?
- GoldBrute botnet campaign is trying to hack 1.5 million RDP servers worldwide
- Microsoft has just taken down a huge botnet network
- Microsoft dismantled the ZLoader botnet, naming key members as a deterrent
- Hacker exploited three vulnerabilities in Microsoft Office to spread Zyklon malware
- Botnet Echobot spreads across a wide range, specifically targeting Oracle and VMware applications
- The Gupteba botnet that infected 1 million Windows computers has just been taken down by Google
- Discovering botnets digging huge encrypted money earns $ 8,500 a day for hackers
May be interested
- The whole city had to return to the 'stone' era using typewriters because the entire computer system was hackedcomputer systems in mat su, a small city and the town of valdez in alaska, usa were attacked and 'kidnapped' caused the entire computer system, phone, server, e-mail server at this area is numb.
- Millions of Android devices stick with security holes in firmware, hackers can exploit to lock users' machineshackers can exploit this vulnerability to hijack the machine or lock the device so that users cannot use their smartphone.
- The 16-year-old boy hacked the Apple server, stealing 90GB of datathe 16-year-old student from a private high school in melbourne, australia hacked apple's server for more than a year and is facing charges after apple reported to the fbi about the incident.
- New error detection in 4G LTE protocolscientists from purdue and iowa university have discovered new vulnerabilities in the main protocol of the 4g lte mobile network - currently very popular in the world.
- The new Specter vulnerability appears to be a new variant that easily 'crashes' secure partitions created by Intel SGXresearchers from the ohio state university have discovered a new dangerous variant of the specter vulnerability called sgxpectre with the ability to exploit information from safe partitions created by intel sgx.
- Bkav released a free detection tool for Meltdown and Specterbkav has released a free tool that checks whether the browser and the user's computer are also suffering from specter and meldown errors.