-
(과학기술) 가정의 취약한 데이타 저장소 찾아주는 사이버 웜과학과 테크놀로지/테크놀로지 2014. 10. 16. 01:19
출처: http://www.bbc.com/news/technology-29595219
14 October 2014 Last updated at 23:38
Malicious worm seeks vulnerable home data stores 가정의 취약한 데이타 저장소 찾아주는 사이버 웜
If unleashed online the worm would travel the net seeking out vulnerable hardware
A malicious worm that can roam the net seeking data stored on insecure hardware has been created by a security researcher.
The proof-of-concept worm was written to illustrate how vulnerable such data stores are to malicious attack.
The worm can exploit the many bugs researcher Jacob Holcomb found in popular home data storage systems.
Already, he said, there was evidence cybercriminals had noticed how easy it was to exploit these data stores.
Game over
Mr Holcomb started work on the worm after carrying out a series of tests on Network Attached Storage (NAS) systems made by 10 separate manufacturers.
Many people connect these devices to a home router to give family members a place to put important files such as photos and films or to act as a back-up for other gadgets. Some home routers can also connect to hard drives to turn them into an NAS-type device.
Mr Holcomb's investigation revealed 30 separate undocumented vulnerabilities in the NAS devices. Many of these, if exploited, would give an attacker complete control over a device letting them plunder the data on it, or use it as a way to get at other devices on that home network and spy on what people did online.
Most of the exploitable problems he found were in the web-based interface typically used to administer these devices.
"I took the series of exploits I found and wrapped them into a software package that's in essence self-replicating," said Mr Holcomb.
The worm runs on an infected system and once it has taken control uses that system's resources to scan net addresses seeking out other vulnerable devices.
Many people store important documents and back-ups on their home data store
If an address gives an appropriate response, it sends a series of data requests to "fingerprint" that device so it knows which vulnerabilities to try against it.
once these devices are exposed to the internet, it's pretty much game over because most vulnerabilities can be exploited using authentication bypass techniques or with no authentication at all," he told the BBC.
Mr Holcomb is set to demonstrate how the worm works during a speech at the Black Hat Europe security conference being held in Amsterdam this week. To safeguard vulnerable hardware, he plans to run it on a closed network rather than live on the net.
Although Mr Holcomb's worm was written to demonstrate the danger these insecure data stores represent, he said there was evidence that cyber-thieves were waking up to the treasure trove of data these devices can contain.
In early 2014, a malicious program called TheMoon targeted hardware made by Linksys and in early October a malicious campaign was launched against NAS boxes made by Qnap.
"These attacks are definitely becoming more widespread," said Mr Holcomb.
Information about the vulnerabilities found in NAS boxes has been passed to manufacturers, said Mr Holcomb, and many were now updating the software that controls the devices to fix the bugs.
Qnap has issued an update for the firmware running on the gadgets vulnerable to the bug abused earlier this month.
Mr Holcomb said it was possible to use NAS safely if owners took some straightforward steps such as turning off unwanted features and services and ensuring the device can only be administered from within a home network rather than across the web.
'과학과 테크놀로지 > 테크놀로지' 카테고리의 다른 글
(테크놀로지) 애플 악성코드 중국 사용자들의 폰에 감염 (0) 2014.11.07 (테크놀로지) 공기주입식 아기 인큐베이터 제임스 디슨賞 수상 (0) 2014.11.07 (과학기술) 십대가 스스로 인터넷 사용을 통제하도록 (0) 2014.10.16 (과학기술) 사전준비 없이 주민등록증 체계 바꾸려는 한국 (0) 2014.10.16 (과학기술) 중국 BBC 웹사이트 차단 (0) 2014.10.15