kid

joined 9 months ago
MODERATOR OF
 
  • Water Barghest, which comprised over 20,000 IoT devices by October 2024, monetizes IoT devices by exploiting vulnerabilities and quickly enlisting them for sale on a residential proxy marketplace.

  • Its botnet uses automated scripts to find and compromise vulnerable IoT devices sourced from public internet scan databases like Shodan.

  • Once IoT devices are compromised, the Ngioweb malware is deployed, which runs in memory and connects to command-and-control servers to register the compromised device as a proxy.

  • The monetization process, from initial infection to the availability of the device as a proxy on a residential proxy marketplace, can take as little as 10 minutes, indicating a highly efficient and automated operation.

[–] kid 5 points 4 months ago (3 children)
[–] kid 2 points 4 months ago

Well, depends. If the user go to a captive portal to "authenticate" before the VPN could closes, than no. But, if the VPN can "pierce" through it (without any intervention from the AP), than yes. Anyways, If the user is willing to provide authentication data (like social media accounts, etc), nothing matters.

[–] kid 3 points 5 months ago (2 children)

Yes.

303,481 servers worldwide, according to Shodan.

[–] kid 2 points 5 months ago (2 children)

Interesting. I didn't know that syncthing does hole punching.

From a defense perspective, how would this work with an enterprise firewall, with UDP/TCP only allowed to specific destinations or specific sources. Example: only the internal DNS relay server can access 53/UDP and only the internal proxy server can access 80/443. What I mean is in a network with a very closed firewall, how would Syncthing be able to connect with peers?

[–] kid 11 points 5 months ago (3 children)

Instance Rules

Be respectful. Everyone should feel welcome here.

[–] kid 6 points 5 months ago (4 children)

Not necessarily. Torrent is a way to find a peer for direct connection or via a relay (of course that is more than that). Syncthing, even using a relay server, requires some ports available for at least outbound connection (22000 TCP/UDP or whatever port the relay is using). This should not be possible in a medium security network, let alone a defense network. I don't know if syncthing works without a direct connection (to the peer or relay, something like transport via http proxy).

[–] kid 6 points 5 months ago (6 children)

Honestly, I didn't think about vulnerability in SyncThing when I read the article. But I wondered why defense forces would have p2p open on their networks.

[–] kid 3 points 6 months ago

By the messages that they are sending to customers, looks like is related to recent updates to the services, but nothing clear.

[–] kid 1 points 6 months ago

IoCs available in the original article.

[–] kid 17 points 6 months ago (16 children)

Please note that the attack can only be carried out if the local network itself is compromised.

view more: ‹ prev next ›