POPPUR爱换

 找回密码
 注册

QQ登录

只需一步,快速开始

手机号码,快捷登录

搜索
查看: 2757|回复: 8
打印 上一主题 下一主题

"Psyb0t" worm病毒攻擊Linksys等路由, 使用DD-WRT的其他器由同樣受影響

[复制链接]
跳转到指定楼层
1#
发表于 2009-4-17 16:25 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
'Psyb0t' worm infects Linksys, Netgear home routers, modems

More information has surfaced about the botnet “psyb0t,” the first known to be capable of directly infecting home routers and cable/DSL modems.

It was first observed infecting a Netcomm NB5 modem/router in Australia.

Members of the website DroneBL, a real-time IP tracker that scans for and botnets and vulnerable machines, came to the conclusion that the “psyb0t” (or “Network Bluepill”) botnet was a test run to prove the technology. After the botnet’s discovery and public outing, the botnet operator swiftly shut it down, APC reports.

However, the most recently discovered generation (dubbed ‘version 18′ in the code) targets a wide range of devices, and contains the s**code for over 30 different Linksys models, 10 Netgear models, and 15 other models of cable and DSL modems, APC reports. It did not specify which models.

http://blogs.zdnet.com/BTL/?p=15197



==================================================================


Worm turns Linux routers into botnet

Researchers are warning of a new worm that targets DSL routers running a distribution of Linux.

The psyb0t worm appears to have been in circulation since the start of the year, and targets routers running Mipsel, a form of the Debian Linux distribution designed for MIPS processors.

The worm is believed to be the first of its kind, and the researchers at DroneBL estimate that it may have infiltrated as many as 100,000 routers.

Psyb0t uses a brute force dictionary attack against the router to obtain username and passwords. This shows that the exploitation is not an attack on the flaw in the operating system itself, but against poor user security.

"Ninety per cent of the routers and modems participating in this botnet are participating due to user error (the user themselves or otherwise). Unfortunately, it seems that some of the people covering this botnet do not understand this point, and it is making us look like a bunch of idiots," said a posting on the DroneBL blog.

"Any device that meets the above criteria is vulnerable, including those built on custom firmware such as OpenWRT and DD-WRT. If the above criteria are not met, then the device is NOT vulnerable."

Once installed, psyb0t allows remote control of the router, and infected hardware has already been used to take part in botnet attacks. It also uses deep packet inspection to try and harvest usernames and passwords for other sites.

http://www.vnunet.com/vnunet/new ... inux-routers-botnet
Emu10k2 该用户已被删除
2#
发表于 2009-4-21 00:17 | 只看该作者
提示: 作者被禁止或删除 内容自动屏蔽
回复 支持 反对

使用道具 举报

3#
发表于 2009-4-21 04:04 | 只看该作者
没事吧··········没见过·······
回复 支持 反对

使用道具 举报

4#
发表于 2009-4-21 11:27 | 只看该作者
等待更新新固件修正
回复 支持 反对

使用道具 举报

skevin 该用户已被删除
5#
发表于 2009-4-22 10:16 | 只看该作者
提示: 作者被禁止或删除 内容自动屏蔽
回复 支持 反对

使用道具 举报

Lynin 该用户已被删除
6#
发表于 2009-4-25 13:22 | 只看该作者
提示: 作者被禁止或删除 内容自动屏蔽
回复 支持 反对

使用道具 举报

7#
发表于 2009-4-25 14:37 | 只看该作者
Am I Vulnerable?

You are only vulnerable if:

    * Your device is a mipsel (MIPS running in little-endian mode, this is what the worm is compiled for) device.
    * Your device also has telnet, SSH or web-based interfaces available to the WAN, and
    * Your username and password combinations are weak, OR the daemons that your firmware uses are exploitable.

As such, 90% of the routers and modems participating in this botnet are participating due to user-error (the user themselves or otherwise). Unfortunately, it seems that some of the people covering this botnet do not understand this point, and it is making us look like a bunch of idiots.

Any device that meets the above criteria is vulnerable, including those built on custom firmware such as OpenWRT and DD-WRT. If the above criteria is not met, then the device is NOT vulnerable.

路由器不对外网开放,应该没事
回复 支持 反对

使用道具 举报

8#
 楼主| 发表于 2009-4-28 00:11 | 只看该作者
更多相關資料:

首隻路由器 / 數據機蠕蟲現身

http://www.itis.tw/node/2641

http://www.adam.com.au/bogaurd/PSYB0T.pdf?info=EXLINK
回复 支持 反对

使用道具 举报

9#
发表于 2009-5-4 19:00 | 只看该作者
中了会否破坏路由?
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 注册

本版积分规则

广告投放或合作|网站地图|处罚通告|

GMT+8, 2025-2-27 20:37

Powered by Discuz! X3.4

© 2001-2017 POPPUR.

快速回复 返回顶部 返回列表