Information Security News
Early today, a reader reported they were seeing a big spike to inbound tcp/6789 to their honeypots. We have seen similar on DShields data started on December 17. It was actually a subject of discussion this weekend and this helpful data from Qihoos Network Security Research lab attributes the large increase to Mirai, the default-password-compromising malware infected various IoT devices that are internet-connected. Its hard to see in the graph as it is still not a huge (but still it is significant) portion of Mirai scanning traffic. Here is port-specific graphs from Qihoo as well showing the start time of the spike. The command the it tries to execute once logged in is:
`busybox telnetd -p 19058 -l /bin/sh`
Current intelligence suggests this is an attempt to compromise DaHua devices and establishes a reverse shell on port 19508 if the compromise is successful. The usual defenses apply here (keep this stuff off the public internet, manufacturers please stop shipping devices with telnet and default passwords) but the amount of potential bandwidth Mirai operators have under their control could potentially swamp even the most robust DDoS defenses.
Let us know if you see other interesting behavior and feel free to update your honeypots to capture some of the attack code if you can.
bambenek \at\ gmail /dot/ com