Infecting DVRs with Bitcoin-mining malware even easier than you suspected


Userlevel 7
Badge +54
It took just a day for the Internet-connected device to be under attackers' spell.
 


The dialog that appears when users want to manually change the default password on their EPCOM Hikvision S04 DVR.
 
It took just one day for a low-end, Internet-connected digital video recorder to become infected with malware that surreptitiously mined Bitcoins on behalf of the quick-moving attackers.
The feat, documented in a blog post published Monday by researchers at the security-training outfit Sans Institute, was all the more impressive because the DVR contained no interface for downloading software from the Internet. The lack of a Wget, ftp, or kermit application posed little challenge for the attackers. To work around the limitation, the miscreants used a series of Unix commands that effectively uploaded and executed a Wget package and then used it to retrieve the Bitcoin miner from an Internet-connected server.
 
Full Article

0 replies

Be the first to reply!

Reply