Password hacking open 510,000 servers, routers and physical networking devices

Many home routers and networking equipment were hackers target, because they can form a large botnet to launch attacks.

As for how these hackers infect routers and networking equipment were, in fact, very simple. The factory default password or user passwords Most devices have user unmodified weak. For example, a hacker recently announced 510000 servers, routers and password IoT (Internet of Things) devices. Anyone can use these passwords to manipulate server, router, and IoT devices.

Password hacking open 510,000 servers, routers and physical networking devices

Hacker in dark DDoS services sold online, which means that some companies collect funds to help attack a competitor's site or service. Initially, these attacks rely mainly on a large botnet composed of routers and IoT devices. Such botnets can initiate more traffic attacks. However, the hacker re-leased a large number of high-performance cloud servers to launch attacks, to improve service quality. Therefore, the hackers made an incredible decision: immediate release more than 500,000 password management device, so that anyone can manipulate them.

ZDNet After learning of this incident to contact the security experts and hackers themselves. After performing a number of verification data, it may determine that the data is valid. Hacker said password data mainly through automated programs scan obtained. Most importantly, many of the default password for the device has not been modified.

Then, the hacker also be used such as a combination of the universal code dictionary and the like, and many devices using a general password or weak passwords, they are also scanned and successfully infected. These data will definitely want to directly infect other routers hackers. This can expand the number of zombies zombie network formed by the hackers.

Guess you like

Origin www.linuxidc.com/Linux/2020-01/162098.htm