(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 

Early today, a reader reported they were seeing a big spike to inbound tcp/6789 to their honeypots. We have seen similar on DShields data started on December 17. It was actually a subject of discussion this weekend and this helpful data from Qihoos Network Security Research lab attributes the large increase to Mirai, the default-password-compromising malware infected various IoT devices that are internet-connected. Its hard to see in the graph as it is still not a huge (but still it is significant) portion of Mirai scanning traffic. Here is port-specific graphs from Qihoo as well showing the start time of the spike. The command the it tries to execute once logged in is:

`busybox telnetd -p 19058 -l /bin/sh`

Current intelligence suggests this is an attempt to compromise DaHua devices and establishes a reverse shell on port 19508 if the compromise is successful. The usual defenses apply here (keep this stuff off the public internet, manufacturers please stop shipping devices with telnet and default passwords) but the amount of potential bandwidth Mirai operators have under their control could potentially swamp even the most robust DDoS defenses.

Let us know if you see other interesting behavior and feel free to update your honeypots to capture some of the attack code if you can.

--
John Bambenek
bambenek \at\ gmail /dot/ com
Fidelis Cybersecurity

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
NVIDIA GeForce Experience CVE-2016-8827 Information Disclosure Vulnerability
 
Siemens Desigo PX Web Modules CVE-2016-9154 Insufficient Entropy Vulnerability
 
NVIDIA GPU Driver CVE-2016-8826 Local Denial of Service Vulnerability
 
Bottle CVE-2016-9964 CRLF Injection Security Bypass Vulnerability
 
Xen CVE-2016-10013 Privilege Escalation Vulnerability
 
BlackBerry Good Enterprise Mobility Server CVE-2016-3129 Arbitrary Command Execution Vulnerability
 
NVIDIA Windows Kernel Mode Driver CVE-2016-8823 Local Denial of Service Vulnerability
 
xrdp CVE-2013-1430 Information Disclosure Vulnerability
 
Samsung Mobile Phones Multiple Denial of Service Vulnerabilities
 
 
NVIDIA GPU Driver CVE-2016-8825 Local Privilege Escalation Vulnerability
 
Pivotal Greenplum CVE-2016-6656 Arbitrary Command Injection Vulnerability
 
Squid HTTP proxy Multiple Information Disclosure Vulnerabilities
 
libical CVE-2016-9584 Heap Based Buffer Overflow Vulnerability
 
DCMTK CVE-2015-8979 Stack Buffer Overflow Vulnerability
 
Apache Hadoop CVE-2016-5001 Local Information Disclosure Vulnerability
 
OpenSSL CVE-2000-1254 Security Bypass Vulnerability
 
[SECURITY] [DSA 3738-1] tomcat7 security update
 
Samsung DVR credentials encoded in base64 in cookie header
 
Internet Storm Center Infocon Status