Wednesday, January 1, 2025
HomeSecurity NewsHackers Used Default/weakest Credentials for IoT Botnet Command and Control Server

Hackers Used Default/weakest Credentials for IoT Botnet Command and Control Server

Published on

SIEM as a Service

Hackers used default Username: root, Password: root for their IoT botnet command and control server.

IoT botnet Owari relies on default/ weak credentials to hack IoT devices uses a MySQL server for command and control that allows attackers to maintain communications with compromised systems.

NewSky Security researcher Ankit Anubhav observed that their honeypot with default credentials attacked by OWARI bot and attempts to download payload form IP 80[.]211[.]232[.]43.

- Advertisement - SIEM as a Service

Also Read Secure Cloud Migration Guide – Technical and Business Considerations

With their further investigation on attack IP 80[.]211[.]232[.]43, it was identified that default MySQL server port 3306 was open and unexpectedly the server contains the default and weakest credential that every computer user know.

Username: root
Password: root

Ankit Anubhav said the database contains the login credentials of users who control’s the database and the time duration limit for users to utilize the bot for the DDoS attack.

“Some of them can be botnet creators or some can simply be the customers of the botnet, a.k.a black box users, who pay a sum of money to launch DDoS attacks.”

Ankit Anubhav points out that history tables show that bot has been used to launch a DDoS attack against various IP address and the next table is whitelist which contains no Ip address.

IoT botnet Owari

“This IP was not a standalone case with its database exposed via weak credentials. The MySQL database of another attack IP 80[.]211[.]45[.]89 was accessible with “root: root” credentials.”

He concluded that both IP’s are offline now, they aware “their IPs will be flagged soon due to the bad network traffic” and “to stay under the radar, they often voluntarily change attack IPs.”

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

CISA Warns of Palo Alto Networks PAN-OS Vulnerability Exploited in Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert on...

US Treasury Department Breach, Hackers Accessed Workstations

The Biden administration confirmed that a Chinese state-sponsored hacking group breached the U.S. Treasury...

TrueNAS CORE Vulnerability Let Attackers Execute Remote Code

Security researchers Daan Keuper, Thijs Alkemade, and Khaled Nassar from Computest Sector 7 disclosed...

New Botnet Exploiting D-Link Routers To Gain Control Remotely

Researchers observed a recent surge in activity from the "FICORA" and "CAPSAICIN," both variants...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

North Korean Hackers Stolen $2.2 Billion From Crypto Platforms In 2024

Cryptocurrency hacking incidents in 2024 surged 21.07% YoY to $2.2 billion, with 303 breaches...

Deloitte Denies Breach, Claims Only Single System Affected

Ransomware group Brain Cipher claimed to have breached Deloitte UK and threatened to publish...

Poison Ivy APT Launches Continuous Cyber Attack on Defense, Gov, Tech & Edu Sectors

Researchers uncovered the resurgence of APT-C-01, also known as the Poison Ivy group, an...