TheRealPomax, to random
@TheRealPomax@mastodon.social avatar

I need a new 2.5gbps router to stick between my ISP's modem-router and my own network. Something with proper device management, port forwarding, IP bindings, being able to name devices myself instead of seeing "unknown device" and a MAC address etc

Any recommendations?

ricci, to security
@ricci@discuss.systems avatar

Hey! Let's talk about #SSH and #security!

If you've ever looked at SSH server logs you know what I'm about to say: Any SSH server connected to the public Internet is getting bombarded by constant attempts to log in. Not just a few of them. A lot of them. Sometimes even dozens per second. And this problem is not going away; it is, in fact, getting worse. And attackers' behavior is changing.

The graph attached to this post shows the number of attempted SSH logins per day to one of @cloudlab s clusters over a four-year period. It peaks at about 3.4 million login attempts per day.

This is part of a study we did on our production system, using logs of more than 640 million login attempts, covering more than 1,500 hosts on our side and observing more than 840 thousand incoming IP addresses.

A paper presenting our analysis and a new, highly effective means to block SSH brute force attacks ("Where The Wild Things Are: Brute-Force SSH Attacks In The Wild And How To Stop Them") will be presented next week at #NSDI24 by @sachindhke . The full paper is at https://www.flux.utah.edu/paper/singh-nsdi24

Let's dive in. 🧵

ricci,
@ricci@discuss.systems avatar

First things first: everyone "knows" that most brute force attacks are against the "root" account, right? This is certainly what earlier studies have found.

As it turns out, this used to be true, but it's not anymore. This graph shows that the fraction of brute force attacks using the username root was nearly 100% back in 2017, but it's been falling - by mid-2021, only around 20% off the attacks we saw were against root.

So, why? Well, we don't have a hotline to the attackers, but we have an educated guess from our own data and from many others' reporting: a lot of the usernames we see correspond to default usernames for , specific distributions, specific server software, and devices. Basically, as we connect ever more stuff to the Internet (and generally try to protect the "root" account), attackers seem to be diversifying the accounts they are going after.

(There's a table of the top 100 usernames in the paper.)

coldclimate, to random
@coldclimate@hachyderm.io avatar

UK folks, anybody gone sim based broadband? Any opinions on . Friend in a rural area has great 5G signal but dreadful Internet over the phone line and fibre is years away. What kit will work well for a family of non tech folks?
House has a games console, iPads, Netflix TV etc.

mattotcha, to Russia
@mattotcha@mastodon.social avatar
itnewsbot, to PoE
@itnewsbot@schleuss.online avatar

Ethernet For Hackers: Equipment Exploration - Last time, we talked about the surface-level details of Ethernet. They are fundame... - https://hackaday.com/2024/02/28/ethernet-for-hackers-equipment-exploration/ -to -45

itnewsbot, to security
@itnewsbot@schleuss.online avatar

Hackers backed by Russia and China are infecting SOHO routers like yours, FBI warns - Enlarge (credit: Getty Images)

The FBI and partners from 10 ot... - https://arstechnica.com/?p=2006319

danie10, to security
@danie10@mastodon.social avatar

How to keep your home network secure: Smart tricks and settings

Network security is not just for IT professionals. Even home users need to keep their networks secure to prevent unauthorized people from, for example, hogging their broadband, installing malware that turns connected devices into robots in botnets, and spying ...continues

See https://gadgeteer.co.za/how-to-keep-your-home-network-secure-smart-tricks-and-settings/

itnewsbot, to security
@itnewsbot@schleuss.online avatar

DOJ quietly removed Russian malware from routers in US homes and businesses - Enlarge (credit: Getty Images)

More than 1,000 Ubiquiti router... - https://arstechnica.com/?p=2003936

mattotcha, to Russia
@mattotcha@mastodon.social avatar
itnewsbot, to security
@itnewsbot@schleuss.online avatar

Chinese malware removed from SOHO routers after FBI issues covert commands - Enlarge / A Wi-Fi router. (credit: Getty Images | deepblue4you)

... - https://arstechnica.com/?p=2000376 -downs

itnewsbot, to tech
@itnewsbot@schleuss.online avatar

OpenWrt, now 20 years old, is crafting its own future-proof reference hardware - Enlarge / Failing an image of the proposed reference hardware by the Op... - https://arstechnica.com/?p=1998169 -firouters

jbzfn, to opensource
@jbzfn@mastodon.social avatar

🛜 OpenWrt developers consider launching their first hardware design
@liliputing

「 Now some of the developers behind the project have put together a proposal for the first hardware designed specifically for OpenWrt, with full upstream Linux support. It would be called OpenWrt One/AP-24.XY, and the goal is to produce a router board that would sell for less than $100 」

https://liliputing.com/openwrt-developers-consider-launching-their-first-hardware-design/

kkarhan, to random
@kkarhan@mstdn.social avatar

Someone asked me in regards to OS/1337 "why don't you just use mkroot from @landley ?"

https://landley.net/toybox/downloads/binaries/mkroot/latest/

And that is a valid question.

To sum it up:

  1. for requires 3MiB of storage and thus is not an option for the 1440kB target size of the current, minimalist system.

  2. shure I could instead make a but that feels like cheating...

  3. In the end the idea of OS/1337 is to build a -based that can be built to run on everything.

kkarhan,
@kkarhan@mstdn.social avatar
flameeyes, to random
@flameeyes@mastodon.social avatar

It's been [1] days since I fixed a (multi-year) "slow Internet" problem than both the ISP installing the line, and "computer guy" selling the router and access points have completely ignored by… replacing a cable.

My mother in law has a 500Mbit FTTH connection, but the ONT was connected to the router with a 8p4c (yes) cat 5 Ethernet cable. I realized that as soon as a speed test showed 90/90 results.

https://flameeyes.blog/2016/12/05/ethical-implications-of-selling-routers/?mtm_campaign=social&mtm_kwd=mastodon

0x58, to Cybersecurity

📨 Latest issue of my curated and list of resources for week /2023 is out! It includes the following and much more:

➝ 🔓 repos bombarded by info-stealing commits masked as
➝ 🇯🇵 💸 Investigating After Hackers Offer to Sell Stolen Data
➝ 🔓 Ontario child registry affects 3.4 million people
➝ 🇭🇰 🔓 Personal data of 25,000 Hongkongers at risk after against consumer watchdog, up from earlier estimate of 8,000
➝ 🇺🇸 🔓 National Student Clearinghouse data breach impacts 890
➝ 🇨🇦 ✈️ discloses data breach of employee and 'certain records'
➝ 🇰🇵 🇪🇸 North Korean hackers posed as recruiter on
➝ 👥 ShadowSyndicate: A New Group Linked to 7 Families
➝ 🇷🇺 ✈️ Russian flight booking system suffers ‘massive’ cyberattack
➝ 🇨🇳 🇺🇸 Chinese hackers stole emails from US State Dept in breach, Senate staffer says
➝ 🇨🇳 Chinese Hackers TAG-74 Targets South Korean Organizations in a Multi-Year Campaign
➝ 🇺🇦 🚀 Ukrainian Military Targeted in Phishing Campaign Leveraging Manuals
➝ 🥷🏻 💰 Hackers steal $200M from company
➝ 🇳🇬 ⚖️ Nigerian man pleads guilty to attempted $6 million BEC email heist
➝ 🇺🇸 ⚖️ ShinyHunters member pleads guilty to $6 million in data theft damages
➝ 🇨🇳 -Linked Budworm Targeting Middle Eastern and Asian Government Agencies
➝ 🇨🇳 🚪 Backdoored firmware lets China state hackers control with “magic packets”
➝ 🇺🇸 👮🏻‍♂️Security researcher warns of chilling effect after feds search phone at
➝ 🦠 ❗️FBI Warns Organizations of Dual Ransomware, Wiper Attacks
➝ 🤖 🦠 Chat responses infiltrated by ads pushing
➝ 🏥 🎣 Red Cross-Themed Attacks Distributing DangerAds and AtlasAgent Backdoors
➝ 🥷🏻 🐍 keys stolen by stream of malicious and packages
➝ 🏦 🎠 New Variant of BBTok Targets Over 40 Latin American Banks
➝ 🦠 🚪 : New Advanced Backdoor with Distinctive Malware Tactics
➝ 🚀 Launches Realtime Attack Graph for Cloud Environments
➝ 🐛 📨 Critical vulnerabilities in threaten over 250k servers worldwide
➝ 🔓 Progress warns of maximum severity WS_FTP Server vulnerability
➝ 🩹 🔥 fixes fifth actively exploited Chrome zero-day of 2023
➝ 🩹 🍏 14 Patches 60
➝ 🩹 🦊 118 Patches High-Severity Vulnerabilities
➝ 🤫 ✅ Google quietly corrects previously submitted disclosure for critical 0-day
➝ 👀 🇪🇬 0-days exploited by commercial surveillance vendor in

📚 This week's recommended reading is: "Philosophy of Cybersecurity" by @LukaszOlejnik and Artur Kurasinski

Subscribe to the newsletter to have it piping hot in your inbox every week-end ⬇️

https://infosec-mashup.santolaria.net/p/infosec-mashup-week-392023

ai6yr, to China
itnewsbot, to security
@itnewsbot@schleuss.online avatar

China state hackers are camping out in Cisco routers, US and Japan warn - Enlarge (credit: Getty Images)

Hackers backed by the Chinese g... - https://arstechnica.com/?p=1971587 &it

jann, to apple
@jann@twit.social avatar

Hey : just give me back my ! I am SO SICK of being in the environment!

itnewsbot, to random
@itnewsbot@schleuss.online avatar

It took 48 hours, but the mystery of the mass Asus router outage is solved - Enlarge / Detail of the ethernet ports on an Asus DSL-AC88U router, tak... - https://arstechnica.com/?p=1940702

danie10, to random
@danie10@mastodon.social avatar

ESET Research Report: How I could’ve stolen your corporate secrets for $100

Yes, it is not just hard drives that need to be wiped. Network routers also contain storage with even more valuable information, especially when it relates to accessing that network, or other 3rd party networks. Even remote access information around VPNs is s ...continues

See https://gadgeteer.co.za/eset-research-report-how-i-couldve-stolen-your-corporate-secrets-for-100/

ldodds, to random
@ldodds@mastodon.me.uk avatar

Does anyone know why, after rebooting, it takes so long for a Virgin Media router to offer a stable wifi connection?

I've got 2 home networks on ours. They both come and go intermittently during the reboot cycle. As if it initialises them several times, with the more secure network being the flakiest.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • GTA5RPClips
  • DreamBathrooms
  • InstantRegret
  • magazineikmin
  • khanakhh
  • Youngstown
  • ngwrru68w68
  • slotface
  • everett
  • rosin
  • thenastyranch
  • kavyap
  • tacticalgear
  • megavids
  • cisconetworking
  • normalnudes
  • osvaldo12
  • ethstaker
  • mdbf
  • modclub
  • Durango
  • tester
  • provamag3
  • cubers
  • Leos
  • anitta
  • lostlight
  • All magazines