22 C
Jaipur
Friday, October 30, 2020

Hacker Compromised 29 IoT Botnet C2 Servers and Taken Control

Must read

Wary of security issues, Japan’s government moves to shut China out of its drone supply chain – Latest News

Japan may effectively shut off China from supplying drones to its government to protect sensitive information, according to six people in government and the...

WinZO raises $2m from Stephan Pagliuca, co-chairman of Bain Capital – Latest News

Vernacular entertainment platform WinZO said it has raised $2 million (about Rs 15 crore) in funding from Stephan Pagliuca, co-chairman of private equity firm...

Paytm Payments Bank aims to issue 5 million FASTags in three months – Latest News

NEW DEHI: Paytm Payments Bank Ltd (PPBL) said that it has equipped over 5 million vehicles with FASTags, and is aiming to issue a...

How to Install YOURLS self-hosted URL shortener on CentOS 8

YOURLS is a free, open-source and self-hosted URL shortener written in PHP. It is very similar to TinyURL or Bitly and allows you to...

A Hacker who goes by name Subby has compromised more than 29 IoT botnet command and control servers that were using weak login credentials.

He launched a brute force attack on these C2 servers and gain access to a number of IoT botnets including Mirai and QBot botnet servers using their weak and default passwords.

Threat actors themselves use weak and default passwords for their C2 servers, which enables another black hat hacker to gain access to the bots and to perform malicious activities.

Subby shared a list of weak credentials to Ankit Anubhav, that shows a list of common username and passwords. The common username and passwords include “root=root, admin=admin”.

29 IoT botnet

An interview with Subby by Ankit Anubhav details the methods used by the attacker to compromise the IoT botnet servers.

He used NMAP scanner to find the port numbers of the C2 server, he said that a “large percentage of botnet operators are simply following tutorials which have spread around in the community or are accessible on YouTube to set up their botnet.”

“Within the 1st week of brute forcing, I surpassed 40,000 devices. This was quite an inflated number due to possible duplication. I estimate the number to be closer to 25,000 unique devices.”

Here you can find the full interview of Anubhav’s with Subby.

Source link

- Advertisement -

More articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest article

Wary of security issues, Japan’s government moves to shut China out of its drone supply chain – Latest News

Japan may effectively shut off China from supplying drones to its government to protect sensitive information, according to six people in government and the...

WinZO raises $2m from Stephan Pagliuca, co-chairman of Bain Capital – Latest News

Vernacular entertainment platform WinZO said it has raised $2 million (about Rs 15 crore) in funding from Stephan Pagliuca, co-chairman of private equity firm...

Paytm Payments Bank aims to issue 5 million FASTags in three months – Latest News

NEW DEHI: Paytm Payments Bank Ltd (PPBL) said that it has equipped over 5 million vehicles with FASTags, and is aiming to issue a...

How to Install YOURLS self-hosted URL shortener on CentOS 8

YOURLS is a free, open-source and self-hosted URL shortener written in PHP. It is very similar to TinyURL or Bitly and allows you to...

How to Install Jira Agile Project Management Tool on Ubuntu 20.04

JIRA is a project management tool developed by Atlassian which is used as an issue and bug-tracking system. It is a commercial tool and...