top | item 12595936

150,000 IoT Devices Behind the 1Tbps DDoS Attack on OVH

230 points| sengork | 9 years ago |securityaffairs.co

114 comments

order
[+] justinsaccount|9 years ago|reply
Only 150,000 ?

We see upwards of 2 million unique ipv4 sources scan us on port 23 every day. These are all compromised IoT devices and routers.

In the past hour we saw 350k+ unique sources.

In just the past 3 minutes that number is 168,230

Top sources in the past 3 minutes:

  848 211.201.69.50
  840 180.66.99.72
  838 222.121.157.61
  759 95.17.97.136
  639 171.248.123.112
  542 189.78.49.194
  511 176.109.222.124
  386 60.249.84.179
  378 118.161.69.18
  377 61.75.42.129
  252 125.142.55.218
  252 183.102.221.85
  245 106.186.20.183
  233 112.162.191.217
  203 121.143.65.181
  199 115.86.134.94
  190 89.163.242.12
  183 91.205.123.37
  181 86.90.10.151
  179 91.240.140.14
  177 191.103.72.251
  173 185.129.2.236
  169 218.201.74.122
  168 116.99.113.72
  164 82.119.65.190
  160 118.129.105.9
  158 194.88.205.101
  156 77.88.202.60
  156 82.79.75.5
  155 112.165.227.205
We see 2000pps of this shit all day every day. No one cares.
[+] khc|9 years ago|reply
Is there a database of this so people can check if their devices are compromised?
[+] pritambarhate|9 years ago|reply
Can you please explain or provide a reference link to provide more explanation:

>We see upwards of 2 million unique ipv4 sources scan us on port 23 every day. These are all compromised IoT devices and routers.

What is the unique connection between port 23 and IoT devices? Genuinely Curious.

Thanks.

[+] api|9 years ago|reply
We run a distributed network of PoPs in the cloud and get easily many times this, as well as massive ssh brute force attempts and other more bizarre forms of scan/attack. I sometimes look up the IPs and check them out and they are ancient cameras, routers, and things like Windows 2000 Server instances sitting on the Internet running malware.
[+] bogomipz|9 years ago|reply
Can you share what is the methodology you are using for determining the source IP is an IoT device? Are you just nmap'ing them and using OS/TCP finger printing?

I had the same question for how OVH was determining that X amount were IPs cameras vs X amount were DVRs etc.

[+] VikingCoder|9 years ago|reply
Some idiot has been attacking me all month:

127.0.0.1

I keep counter-attacking him, but he's always one step ahead of me!

[+] honkhonkpants|9 years ago|reply
A lot of people including numerous EU regulators would think that posting such a list of IPs is very tacky. At Google I would be reprimanded and probably fired just for producing a list like this, or even writing a tool that was capable of producing a list of non-anonymized IPs of clients.

Now that I got that out of my system: where's all the v6 traffic?

[+] nacnud|9 years ago|reply
As system administrator of my home network, it worries me that a device on my network might be involved in an attack like this, and I would never know.

Maybe the target of such an attack could gather a list of IP addresses used in the attack, then pass them to Google, who might warn on their search homepage if you browse from one of the IPs on the list? (e.g. "Some of your internet devices may be at risk, click here to find out more") I know IP addresses are a poor proxy for identity, but it could be a step in the right direction.

[+] ge0rg|9 years ago|reply
Google already has a similar mechanism in place where they require captchas from IP addresses that abused Google APIs previously.

The combination of that with Google Shield might actually work to inform the users, but then again users are confronted with similar warnings from abusive ad networks all the time, and probably learned to click them away fast and forget about it.

[+] vadiml|9 years ago|reply
Simply set up your firewall to drop outgoing packets with source address not belonging to your subnet. The DDOS slaves are usually sending packets with spoofed source ip addresses
[+] falcolas|9 years ago|reply
Ironically enough, this is a place where I think that remotely managed routers (like the OnHub) might be a fantastic solution for the average Joe. Dynamically identify problematic traffic patterns, and block them at the home router.

It would be an 80% solution at best, and I wouldn't want one; but I trust Google more than I do my mom when it comes to managing the packets coming out of her network.

[+] fivesigma|9 years ago|reply
@internetofshit will have a field day with this.

In all seriousness, this is only going to become worse in the future. Can't wait until the day when smart fridges, toasters and bicycle locks join in on a multi-Tbps attack and break the entire internet.

[+] praptak|9 years ago|reply
Internet providers will curb it by reverse-firewalling all consumer connections, maybe with support from the copyright abuse lobby, so as to kill P2P and any other advanced internet usage for that matter.
[+] FilterSweep|9 years ago|reply
You can't have "Intelligent" without "Intelligent(ly sending over personal data to servers you don't own for fun and profit)" in your devices.

Because connecting your toaster and fridge over a local network, and running updates via your PC/laptop would be just too complex

[+] M_Grey|9 years ago|reply
I wonder if at some point a government or two will just decide that the dubious benefit of a wired fridge isn't worth the national security risk of increasing existing botnets by an order of magnitude?
[+] luhn|9 years ago|reply
If it breaks the internet, the perpetrators will have no way to shut it off. Internet armageddon.
[+] martin_|9 years ago|reply
It's unfortunately way too easy to find such devices. A quick scan of the (less scary) end of the ipv4 address space and I was able to find ~15k cameras and I was only searching for a couple of models for fun... Here was the result: http://opencam.ma.rtin.so/ -- most of the pins probably wont work anymore, as it's a couple of years old.. Still crazy.
[+] DanBC|9 years ago|reply
I was able to find a few still working - in England: leamington spa, birmingham, Bradford (appears to be covered in cobweb!) Carlisle, etc.

EDIT: I'm going to be spending hours on this today!

[+] INTPenis|9 years ago|reply
Jesus I was just thinking about the consequences of no patch routine in the IoT device world. And, here it is. :)

Imagine having to internationally co-ordinate patching of 150000 devices. Because the alternative is that 150000 homes will have their NATed IP-addresses blocked from each service being attacked.

Just wow...

[+] pmontra|9 years ago|reply
That would mean blocking the ISP, and every ISP, so it's the end of blocking because there won't be any legitimate traffic left.

The manufacturers must be both sued for selling exploitable devices and educated about how to write secure software.

There is another post on the home page of HN about the security of the Linux kernel https://news.ycombinator.com/item?id=12589894 That's very important for this kind of issues because many of those devices are probably running on some Linux distribution.

[+] rasz_pl|9 years ago|reply
you dont have to coordinate any patching, just null route end users who are the source of DOS and let them deal with it. Its them who opted for $25 with free shippintg 720p 'Cloud based, works with your iphone' nanny cam.
[+] pinaceae|9 years ago|reply
And now let's apply such a scenario to autonomous vehicles, on land and in air.

but rather than causing a virtual DDOS, now in physical space. shutting down a whole city, for the lulz.

IoT and AV show that the "Facebook" method of software development - move fast, break things, agile/scrum, whatever label is used for non-engineering, will not work for the next stage.

ditto the skills of most young CS grads. most companies can't even secure their shitty email services - but cars is easier?

a whole new supply chain for code needs to be developed, from languages to curriculums. take what the airline industry has been doing and commoditize it, it must be braindead easy to build a secure and robust piece of code for this new world.

[+] throwaway1974|9 years ago|reply
I remember when the ntp exploit came out few years ago datacenter where we have a rack contacted me saying the Supermicro IPMI devices on the Supermicro servers were participating in an amplification attack.

I was like wtf! Matter was quickly resolved of course, also they learned a lesson and moved ipmi ips to 10mbit limited connnections not 1gbit.

Tho ideally a local ip that accessible only via a vpn would have been the best option for remote management but yeh, little steps I suppose with some providers.

[+] vadiml|9 years ago|reply
The problem is that that there are ISP's who are not implementing BCP38 (http://www.bcp38.info)
[+] Retr0spectrum|9 years ago|reply
This will only take us so far. Many of these botnets are large enough that they don't need any spoofing/amplification to be effective.
[+] pixl97|9 years ago|reply
How does that stop spoofing addresses inside the segment?

If I am 8.8.8.8 and I fake 8.8.4.4, you still get my traffic, and someone else gets the complaint.

[+] thesehands|9 years ago|reply
we need customers to want BCP38 implementing routers in their homes
[+] jimjimjim|9 years ago|reply
how many years until iot manufacturers get sued for producing insecure devices?
[+] blunte|9 years ago|reply
I think the reason we have such bad security is that non-technical end users just don't care. You can try a dozen different approaches to getting them to care about security, but they often cannot be bothered with it.

Thus, if you want to go the legal/penalty route, you need to sue the end users. The entity that owns the house/office that installed the unpatched CCTV camera is effectively responsible for the behavior of that camera. If they then want to shift the responsibility to the manufacturer, that's their choice (and effort).

What it will do is make users consider a bit more carefully when choosing devices and manufacturers, and it will make manufacturers have to consider (and promote) their security and patching practices to maintain marketshare.

[+] wiredfool|9 years ago|reply
Good luck finding that vendor on Ali-express or Amazon.
[+] zcam|9 years ago|reply
Not gonna happen. Think of all the insecure windows "devices" out there. How do you draw the line.
[+] dax1928|9 years ago|reply
There needs to be an international standard to avoid things like this.
[+] CommanderData|9 years ago|reply
It should be easier managing devices that have access to the Internet on the router level.

Most can't understand access restrictions, IP Tables or installing custom firmware. There needs to be a common standard, API on each router to manage devices connecting to the Internet and seeing which devices do and don't.

This would open the doors to creating apps etc and possibly help mitigate threats from unknown Chinese IoT devices.

[+] dehef|9 years ago|reply
I manage a huge fleet of raspberry pi in my jobs. There are geographically everywhere.

I wish that there will not be found by some bad guy, but I know our system and I'm 100% sure that will happen one day. We have a basic level security, like so many other startup in that field though.

[+] ffggvv|9 years ago|reply
And you do nothing? Because of you many business could loose their reputation and money.
[+] jessaustin|9 years ago|reply
At last, a legitimate reason to use a green-bean HN handle.
[+] erpellan|9 years ago|reply
Feels like how things might have been when home electricity was first becoming pervasive.

Lots of dubious devices and a laisez-faire approach to eg. electrocution risks and fire hazards.

After enough public outcry regulation is introduced, standards are developed and enforced and your television is no longer at risk of bursting into flames or frying the cat.

Or, in today's world, of being conscripted into a global botnet and DDOS'ing your neighbours.

[+] mjevans|9 years ago|reply
This isn't bad enough, not yet, for some kind of protocol that allows source quench / notify a remote ISP of a suspected infected host and suppress traffic from said host.

It would need to be out of band, and I suggest it use OpenPGP for signatures (chain of trust from IP allocating bodies), actually it would also need to query a database of allocated IP ranges.

[+] api|9 years ago|reply
IoT = Internet of Targets

Something needs to be done about DDOS at the backbone and tier-1 level of the Internet or we are going to lose the public Internet.

[+] solotronics|9 years ago|reply
the problem is more complicated than you make it out to be. DDoS aren't always some special kind of packet or traffic that is easy to identify, it is just a flood of normal looking traffic from a ton of compromised sources
[+] SG-|9 years ago|reply
Any idea why OVH is being targeted? What customer is OVH hosting that they're trying to hit so hard?
[+] gravypod|9 years ago|reply
I wonder if you use the DVRs for bitcoin mining how much you could produce per day.
[+] deftnerd|9 years ago|reply
Most IoT devices wouldn't produce any significant revenues from Bitcoin Mining because they don't have anywhere near the computational power of dedicated Bitcoin mining devices.

A DVR might have a chance to make an impact if it had a GPU that was used to encode video that could be co-opted to mine Bitcoin, but I think most DVR's use special video encoding chips rather than a general purpose GPU.

I think the only hardware they would have that could mine Bitcoin would be their general purpose CPU, which is probably under-powered anyway.

A DVR would be more easily monitized as a node in a Botnet that does DDoS attacks, email spamming, or network scanning.

One resource they do have though is drive space. a DVR botnet could sell unused DVR HD space using a service like Maidsafe [1]

[1] https://maidsafe.net

[+] zodPod|9 years ago|reply
How are they able to identify that these were IoT devices?