Hackers Prepping IOTroop Botnet with Exploits

Researchers warn that hackers have weaponized a vulnerability that could be used in an IOTroop (or Reaper) attack, bringing the likelihood of an attack one step closer. Continue reading Hackers Prepping IOTroop Botnet with Exploits

‘IOTroop’ Botnet Could Dwarf Mirai in Size and Devastation, Says Researcher

Malware dubbed IOTroop that researchers say is “worse than Mirai” has already infected one million businesses worldwide. Continue reading ‘IOTroop’ Botnet Could Dwarf Mirai in Size and Devastation, Says Researcher

A Brief Recap of the SANS DFIR Summit

Hello again readers and welcome back!! I had the pleasure of attending (and speaking at, more on that in a bit!) at the 10th SANS DFIR Summit this past week. It is one conference that I always try to attend, as it always has a fantastic lineup of DFIR … Continue reading A Brief Recap of the SANS DFIR Summit

TP-Link Debug Protocol Give Up Keys To Kingdom

If the headline makes today’s hack sound like it was easy, rest assured that it wasn’t. But if you’re interested in embedded device hacking, read on.

[Andres] wanted to install a custom OS firmware on a cheap home router, so he bought a router known to be reflashable only to find that the newer version of the firmware made that difficult. We’ve all been there. But instead of throwing the device in the closet, [Andres] beat it into submission, discovering a bug in the firmware, exploiting it, and writing it up for the manufacturer.

This is not a weekend …read more

Continue reading TP-Link Debug Protocol Give Up Keys To Kingdom

Converting a TP Link Router to Mission Control for Cheap 433MHz Home Automation

[Jean-Christophe Rona] found himself with some free time and decided to finish a project he started two years ago, reverse engineering cheap 433MHz home automation equipment. He hopes to control his space heaters remotely, in preparation for a cold and, now, robotic winter.

In a previous life, he had reverse engineered the protocol these cheap wireless plugs, garage doors, and electric window shutters all use. This eventually resulted in a little library called rf-ctrl that can toggle and read GPIO pins in the correct way to control these objects. He has a few of the more popular protocols built into …read more

Continue reading Converting a TP Link Router to Mission Control for Cheap 433MHz Home Automation

FCC orders TP-Link to allow third-party firmware on their routers

The Federal Communications Commission’s Enforcement Bureau has reached a $200,000 settlement with TP-Link in regards to selling in the US routers that could operate at output levels higher that allowed by FCC rules. At the same time, TP-Link has also agreed to work with the open-source community and Wi-Fi chipset manufacturers to enable consumers to install third-party firmware on their Wi-Fi routers. Problem solved Under Commission rules, devices such as routers are certified by the … More Continue reading FCC orders TP-Link to allow third-party firmware on their routers

FCC Reaches Agreement With Router Manufacturers

Last year, the Federal Communications Commission proposed a rule governing the certification of RF equipment, specifically wireless routers. This proposed rule required router manufacturers to implement security on the radio module inside these routers. Although this rule is fairly limited in scope – the regulation only covers the 5GHz U-NII bands, and only applies to the radio subsystem of a router, the law of unintended consequences reared its ugly head. The simplest way to lock down a radio module is to lock down the entire router, and this is exactly what a few large router manufacturers did. Under this rule, …read more

Continue reading FCC Reaches Agreement With Router Manufacturers

Threatpost News Wrap, July 8, 2016

Mike Mimoso, Tom Spring and Chris Brook discuss the news of the week, including all things Android: the crypto weakness, the full disk encryption bypass, and new malware, Hummingbad, which impacts the mobile operating system. The three also discuss the… Continue reading Threatpost News Wrap, July 8, 2016