Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - The front lines for cutting edge software.

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews




spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Macrium Reflect FREE Edition
3. Smart Defrag
4. Visual C++ Redistributable Runtimes AIO Repack
5. Visual C++ Runtime Installer (All-In-One)
6. McAfee Removal Tool (MCPR)
7. MusicBee
8. Rufus
9. K-Lite Mega Codec Pack
10. Sergei Strelec's WinPE
More >>

top reads

Star How to Disable 1-Click Ordering on Amazon (and Avoid Surprise Charges)

Star How to Fix Shallow Paint Layer Depth in Bambu Studio

Star Aviator Betting Game Secrets: Unlock 97% RTP & Triple Your Wins

Star Windows Recall: What It Is, Why Hackers Will Love It, and How to Stay Safe

Star Star Trek Fleet Command Promo Codes: Redeem Codes for Free Shards, Blueprints And Resources

Star How To Use VLC Media Player to Trim Video Clips

Star What Is the $WinREAgent Folder and Can I Delete It?

Star Swear Your Way to Better Search Results

Star How to Get a Dark Start Menu and Taskbar in Windows 10 & 11

Star Enable, Disable, Manage, Delete or Create a System Restore Point


MajorGeeks.Com » News » March 2013 » Botnet uses hacked devices to scan the internet

Botnet uses hacked devices to scan the internet


Contributed by: Email on 03/19/2013 02:47 PM [ comments Comments ]


A previously unknown hacker has undertaken a census of the web. To perform his "Internet Census 2012" he infected around 420,000 poorly protected embedded devices with what he describes as a harmless bot, named Carna. "Poorly protected" in this case means that either no login credentials were required or standard credentials such as "root:root" or "admin:admin" were able to gain entry.

In response to enquiries by The H's associates at heise Security, the hacker was not willing to divulge any information about his identity. CNET states that Gordon Lyon (Fyodor), the author of network scanning tool nmap, is behind the census. This may, however, be due to a misunderstanding. nmap was used for the census, but there is no evidence that Fyodor himself was behind the legally dubious project. It is legally dubious because the perpetrator uploaded between 46KB and 60KB (depending on processor architecture) of botnet software onto third party devices without obtaining the owner's prior consent.

This enabled the hacker to accelerate the scanning speed by a significant factor. In response to enquiries, the hacker confirmed that he did not obtain legal advice prior to carrying out his census. The unknown hacker has packed the results of the census into some fascinating graphics. He recorded every IP address which responded to one of 52 billion pings sent between June and October 2012. A total of 420 million IP addresses/devices responded to ping requests.

But it's another result from the census which is most interesting – the number of poorly secured network devices connected to the internet. The hacker states that he did not sniff around on intranets of which infected devices were members. In response to heise Security's enquiries, he writes that it would have been easy to add functionality for infiltrating intranets to the bot code.

He underlined his efforts to ensure that his bots did not cause any damage by noting that the scan was set to be performed with the lowest possible priority and that binaries were removed from devices when they were reset. Whilst the census was being undertaken, however, surrounding bots ensured that the bot code was reinstalled.

As well as the bot binary, the hacker also placed a README file on infected devices, explaining the purpose of the project and providing an email address for enquiries. The designated email address received only two messages, both from honeypot operators whose honeypots had been infected by the bot.






« Threatening Facebook statuses can now be prosecuted in Florida · Botnet uses hacked devices to scan the internet · ChromeOS was unreliably exploited at Pwnium 2013 »




Comments
comments powered by Disqus

MajorGeeks.Com » News » March 2013 » Botnet uses hacked devices to scan the internet

© 2000-2025 MajorGeeks.com
Powered by Contentteller® Business Edition