We are all DOOMED...
Chuck Norris' beard is barbed wire soaked in ox blood and held together by the souls of mortals.
A so-called Chuck Norris botnet is hijacking poorly-configured routers and DSL modems. According to ComputerWorld, the botnet spreads by malware that installs itself on routers and modems by guessing the default administrative password and seizing control due to many devices being configured to allow remote access. Masaryk …
'because of a comment in its source code that reads: "in nome di Chuck Norris."'
Really? Where did he get the source code? I didn't realise that malware was now spread in a way that means the victim needs to build it themselves.
Or did he actually /scritto/ it himself ;-)
Hmm. Scientist of black helicopter? Neither, if systems are now sharing source code including comments, then this must be RotM.
Eh ? What are those ? Are they different from the ports I have on my PC ? Is the HTTP port (80) a "remote communication port" ? If so, can the PC still access the Web when the malware is active ?
I would suppose so, otherwise the user would wizen up to the fact that his 'puter has been haxx0red, right ?
It's not the OS that's at issue here, it's the brain-dead way most of the devices are configured. The real core of the attack is just a brute force using a list of known default logins and passwords (the single D-Link vulnerability aside). It boggles the mind why these devices aren't configured to require you to pick a new password at least when you first log into them, and for that matter they really should disable administrative access from the outbound ports (there are however ways to get around that if you abuse UPnP or bounce through a compromised system inside the network). Ultimately nothing is going to make these devices 100% secure, but we could at least make them have to work for it a little. I can't tell you how many times I've been able to log into someones how router to fix an issue just by guessing admin/admin.
Biting the hand that feeds IT © 1998–2019