[193681] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: IoT security

daemon@ATHENA.MIT.EDU (clinton mielke)
Sat Feb 11 04:39:20 2017

X-Original-To: nanog@nanog.org
In-Reply-To: <A7001028-C869-4B07-A2E0-45FA2E2A5FC8@marcoslater.com>
From: clinton mielke <clinton.mielke@gmail.com>
Date: Fri, 10 Feb 2017 13:50:11 -0800
To: Marco Slater <marco@marcoslater.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org

It's hilarious they reported on his honeypots :)
Kinda surprised I haven't gotten similar letters. I've gotten infected so
many times.

Amazon certainly noticed my cloud honeypot instances.

On Feb 10, 2017 5:48 AM, "Marco Slater" <marco@marcoslater.com> wrote:

>
> > As an ISP, scan your customers netrange, and notify customers with known
> > vulnerable devices. With regards to the current Mirai threat, theres
> only a
> > handful of devices that are the most critical importance. IE, biggest
> > fraction of the infected host pie.
>
> Virgin Media in the UK do this for Mirai-infected or susceptible devices
> already.
>
> What they send out: https://twitter.com/2sec4u/status/825337376692121601
>
> Quite interesting approach. If more consumers were aware of this, they may
> do something about it.. although.. people are lazy. :(

home help back first fref pref prev next nref lref last post