[193681] in North American Network Operators' Group
Re: IoT security
daemon@ATHENA.MIT.EDU (clinton mielke)
Sat Feb 11 04:39:20 2017
X-Original-To: nanog@nanog.org
In-Reply-To: <A7001028-C869-4B07-A2E0-45FA2E2A5FC8@marcoslater.com>
From: clinton mielke <clinton.mielke@gmail.com>
Date: Fri, 10 Feb 2017 13:50:11 -0800
To: Marco Slater <marco@marcoslater.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org
It's hilarious they reported on his honeypots :)
Kinda surprised I haven't gotten similar letters. I've gotten infected so
many times.
Amazon certainly noticed my cloud honeypot instances.
On Feb 10, 2017 5:48 AM, "Marco Slater" <marco@marcoslater.com> wrote:
>
> > As an ISP, scan your customers netrange, and notify customers with known
> > vulnerable devices. With regards to the current Mirai threat, theres
> only a
> > handful of devices that are the most critical importance. IE, biggest
> > fraction of the infected host pie.
>
> Virgin Media in the UK do this for Mirai-infected or susceptible devices
> already.
>
> What they send out: https://twitter.com/2sec4u/status/825337376692121601
>
> Quite interesting approach. If more consumers were aware of this, they may
> do something about it.. although.. people are lazy. :(