Jump to content


Photo

Old SSH Vulnerability at Center of Credential-Stuffing Attacks


  • Please log in to reply
2 replies to this topic

#1 TheSentinel

TheSentinel

    The man in the dark

  • General Admin
  • 31,817 posts

Posted 13 October 2016 - 05:29 PM

Old SSH Vulnerability at Center of Credential-Stuffing Attacks

by Michael Mimoso
Follow @mike_mimoso
October 13, 2016 , 11:27 am

Connected devices aren’t just for DDoS attacks anymore. Researchers at Akamai this week exposed how attackers are using a 12-year-old SSH vulnerability in combination with weak or default credentials to compromise an array of IOT and home networking devices. Those connected things are then being used as proxies to test stolen credentials on third-party web-based applications.

More at: https://threatpost.c...attacks/121266/

 

 



#2 TheSentinel

TheSentinel

    The man in the dark

  • General Admin
  • 31,817 posts

Posted 13 October 2016 - 05:34 PM

See in addition too:

 

Hackers use old SSH vulnerability to attack Internet of Things devices

By Sead Fadilpašić
Published 2016-10-13

There is a 12 year old vulnerability in OpenSSH that hackers are now using to attack Internet of Things (IoT) devices and remotely generate traffic. Akamai Technologies' researchers Ory Segal and Ezra Caltum have identified the old vulnerability and dubbed it SSHowDowN Proxy.

Complete story at:
http://betanews.com/...-vulnerability/

 



#3 TheSentinel

TheSentinel

    The man in the dark

  • General Admin
  • 31,817 posts

Posted 14 October 2016 - 03:40 PM

Please read in addition too:

 

SSHowDowN Proxy attacks – A 12-Year-Old SSH bug exposes more than 2M IoT Devices
October 14, 2016  By Pierluigi Paganini

Akamai Technologies revealed that hackers are exploiting a 12-year-old bug in OpenSSH to hack into millions of IoT devices with SSHowDowN Proxy attacks.

IoT devices are a privileged target for hackers, design flaws and wrong configurations open to the attackers. Recently we read about massive DDoS attacks powered by huge botnets powered by hundreds of thousand compromised devices.

Details at:
http://securityaffai...xy-attacks.html