• Contact Us
  • Login
Upgrade
Tech News Hero
Advertisement
  • Home
  • News
  • Gadgets
  • Social
  • Gaming
  • Mobile
  • PC
  • Internet
  • Security
  • Apps
No Result
View All Result
  • Home
  • News
  • Gadgets
  • Social
  • Gaming
  • Mobile
  • PC
  • Internet
  • Security
  • Apps
No Result
View All Result
Tech News Hero
No Result
View All Result
Home Security

Hackers are hijacking smart building access systems to launch DDoS attacks

by technewshero
February 2, 2020
in Security
0
Share on FacebookShare on Twitter
smart-doors.jpg

Image: Nortek Security & Control, LLC

Hackers are actively searching the internet and hijacking smart door/building access control systems, which they are using to launch DDoS attacks, according to firewall company SonicWall.

The attacks are targeting Linear eMerge E3, a product of Nortek Security & Control (NSC).

Linear eMerge E3 devices [1, 2, 3] fall in the hardware category of “access control systems.” They are installed in corporate headquarters, factories, or industrial parks. Their primary purpose is to control what doors and rooms employees and visitors can access based on their credentials (access codes) or smart cards.

In May 2019, researchers from Applied Risk, a cyber-security firm specialized in industrial security services, disclosed details about ten vulnerabilities impacting NSC Linear eMerge E3 devices.

NSC Linear eMerge E3 devices

Despite the fact that six of the ten vulnerabilities had a vulnerability severity (CVSSv3) score of 9.8 or 10 out of a maximum of 10, NSC failed to provide patches, according to an Applied Risk security advisory.

Applied Risk later released proof-of-concept exploit code in November.

CVE-2019-7256 exploitation

Now, in a report published last week, SonicWall researchers say that hackers are scanning the internet for exposed NSC Linear eMerge E3 devices and using one of the ten vulnerabilities.

The vulnerability they are using is CVE-2019-7256. Applied Risk described this vulnerability as a command injection flaw. It is one of the two that received a severity score of 10/10, meaning it can be exploited remote, even by low-skilled attackers without any advanced technical knowledge.

“This issue is triggered due to insufficient sanitizing of user-supplied inputs to a PHP function allowing arbitrary command execution with root privileges,” SonicWall said in a security alert published last week. “A remote unauthenticated attacker can exploit this to execute arbitrary commands within the context of the application, via a crafted HTTP request.”

Hackers are using CVE-2019-7256 to take over devices, download & install malware, and then launch DDoS attacks on other targets.

The first of these attacks began on January 9, this year, and were spotted by intelligence firm Bad Packets, and have continued in a steady stream ever since.

CVE-2019-7256 is actively being exploited by DDoS botnet operators.

This unauthenticated remote command injection vulnerability affects Linear eMerge E3 access control systems running firmware versions 1.00-06 and older.https://t.co/5VQbJshH6l#threatintel

— Bad Packets Report (@bad_packets) January 10, 2020

“Attackers seem to be actively targeting these devices as we see tens of thousands of hits every day, targeting over 100 countries with the most [attacks being] observed in U.S.,” SonicWall said.

The attack surface isn’t too large, though. SonicWall reports that only “2,375 Internet-accessible eMerge devices are listed by the Shodan search engine.”

This number is far lower than the millions of security cameras and home routers that are also available online. However, the small number of vulnerable devices has not dissuaded attackers so far, and exploitation attempts they’re likely to continue.

IoT devices used as entry points

But while having your smart building door system launch DDoS attacks on Steam or the PlayStation Network is one issue, a bigger threat is that these vulnerable systems can also be used as entry points into an organization’s internal networks.

In August last year, Microsoft reported that it observed a Russian state-sponsored hacking crew using Internet of Things (IoT) smart devices as launching points for other attacks on corporate networks.

The Russian hackers tried to exploit a VOIP phone, an office printer, and a video decoder, Microsoft said, but the NSC Linear eMerge E3 devices are just as attractive targets, primarily due to the high severity of the ten security bugs disclosed last year.

System administrators managing networks were NSC Linear eMerge E3 devices are installed are advised to take these systems off the internet, or at least limit access to these devices using a firewall or VPN.

Previous Post

Google wants to sell you a printed photos subscription service

Next Post

CERN Ditches Facebook’s Workplace App Over Data Privacy

technewshero

technewshero

Related Posts

2020 Shows the Danger of a Decapitated Cyber Regime
Security

2020 Shows the Danger of a Decapitated Cyber Regime

by technewshero
January 13, 2021
A ‘Bulletproof’ Criminal VPN Was Taken Down in a Global Sting
Security

A ‘Bulletproof’ Criminal VPN Was Taken Down in a Global Sting

by technewshero
January 14, 2021
The Worst Hacks of 2020, a Surreal Pandemic Year
Security

The Worst Hacks of 2020, a Surreal Pandemic Year

by technewshero
January 15, 2021
Security

How Your Digital Trails Wind Up in the Police’s Hands

by technewshero
December 31, 2020
How to Understand the Russia Hack Fallout
Security

How to Understand the Russia Hack Fallout

by technewshero
December 22, 2020
Next Post

CERN Ditches Facebook's Workplace App Over Data Privacy

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Most Popular

This Timepiece Collection Is Both Nautical and Aeronautical

November 15, 2019
Origin PC Chronos review: A 4K gaming monster in a petite package

Origin PC Chronos review: A 4K gaming monster in a petite package

January 15, 2021
Stop annoying robocalls to your phone using every trick we know

Google’s Call Screen feature can tell spam callers to get lost. Here’s how

January 13, 2021

Browse by Category

  • Apps
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • News
  • PC & Laptops
  • Security
  • Social
Tech News Hero

© 2020 Tech News Hero.

No Result
View All Result
  • Home
  • Landing Page
  • Buy JNews
  • Support Forum
  • Contact Us

© 2020 Tech News Hero.

Welcome Back!

Login to your account below

Forgotten Password?

Create New Account!

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?