Forgot your password?
typodupeerror

Submission + - Passwords for Tens of Thousands of Dahua Devices Cached in IoT Search Engine (bleepingcomputer.com)

An anonymous reader writes: Login passwords for tens of thousands of Dahua devices have been cached inside search results returned by ZoomEye, a search engine for discovering Internet-connected devices (also called an IoT search engine). A security researcher has recently discovered that instead of just indexing IoT devices, ZoomEye is also sending an exploitation package to devices and caching the results, which also include cleartext DDNS passwords that allow an attacker remote access to these devices.

Searching for the devices is trivial and simple queries can unearth tens of thousands of vulnerable Dahua DVRs. According to the security researcher who spotted these devices, the trick has been used in the past year by the author of the BrickerBot IoT malware, the one who was on a crucade last year, bricking unsecured devices in an attempt to have them go offline instead of being added to IoT botnets.

This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

Passwords for Tens of Thousands of Dahua Devices Cached in IoT Search Engine

Comments Filter:

"The chain which can be yanked is not the eternal chain." -- G. Fitch

Working...