Hackers Leaked More Than 500,000 Passwords for IoT Devices, Routers & Cloud Servers!

A hacker released a huge list of Telnet credentials for more than 5,00,000 systems online last week that incorporates data centers, routing protocols, and handheld devices for IoT (Internet of Things).

The spreadsheet was publicly released on a famous hacking forum by a distributed botnet denial of service (DDoS) provider.

The post featured creds of more than 515,000 Telnet devices relating to their corresponding ports such as IP addresses, usernames and passwords.

Telnet is a communication service protocol that helps the user to control a remote device over the IP/TCP network. Further study revealed that devices on the list are located all over the world. And while few of them are based on home networks, most of them are based on reputed cloud service providers.

The intruder collected the data by searching the rest of the internet for computers utilizing default usernames and passwords provided by the factory or easy-to-guess variations of passwords.

The web hacked archives included information obtained from October through November 2019. They utilized IoT browsers such as BinaryEdge which Shodan and discovered that certain systems were placed on the networks of established Internet service providers (ISPs) (indicating that they were either home routers or IoT products), but other devices were identified on global cloud service providers networks.

While many of the systems may now operate on a dynamic IP address or utilizes distinct login credentials, the lists are still extremely valuable for an advanced intruder who can manipulate it in various ways.

To evaluate the service provider, a hacker could use the IP addresses in the databases and then certainly-scan the ISP’s network to figure out their new IP addresses. Then the intruder can either use the standard login credentials of the vendor or accurately guess the widely used combination of username/password for remote access to the impacted goods. In addition, this would enable cybercriminals to use the machines in IoT botnet activities such as DDoS assaults, malicious advertising schemes or others.

To maintain your web-connected devices secure, it’s often worthwhile to just use login details which vary from the standard account credentials of the manufacturer. Solid passwords, which have a mixture of alphabets, numbers and standard characters, are also advised.

Back to top button
Close