Skip to main content

Hackers use SSH to control connected devices for brute-force attacks

akarnai ssh report brute force credential stuffing internet devices data center feat
Image used with permission by copyright holder
Content delivery network service provider Akamai Technologies released a new report on Wednesday (PDF) stating that hackers are taking advantage of a 12-year-old vulnerability in OpenSSH to gain control of internet-connected devices for mass-scale attack campaigns. The company dubs these attacks as “SSHowDowN Proxy,” which for now seem focused on using video surveillance devices, satellite antenna equipment, network devices, and internet-connected network-attached storage units.

According to the company, these compromised devices are used as proxies to attack a number of internet-based targets and “internet-facing” services, as well as the internal networks that host them. Hackers are actually gaining control of the devices by accessing their low-level command line console that still relies on the factory-shipped default login credentials provided by the vendor.

SSH stands for Secure Shell, and is a cryptographic network protocol that provides a secure channel, enabling services like remotely accessing a desktop residing on a home network from a public Wi-Fi access point. This protects data like usernames and passwords as the information travels across the internet. But this protocol isn’t completely secure, and Edward Snowden even indicated that the NSA could decrypt some SSH traffic.

Akamai began its investigation after it noticed active malicious HTTP/HTTPS traffic stemming from a third-party Network Video Recorder device targeting customer accounts. After determining that there were no unauthorized users accessing its network, the company then listed the device’s live network connections and their associated process IDs. The results showed that someone was running SSH connections using the default “admin” credentials provided by the manufacturer.

The thing is, the admin/admin credentials, by default, only allows web-based access to the machine, and does not provide SSH-level access. Whoever accessed the NVR machine took advantage of several SSH options to get past the default credential restriction. After that, the hacker set up the device as a proxy server, which establishes a TCP connection to a legitimate server from a remote client. Thus, any attack on a network would appear to stem from the NVR machine itself.

With all of this in mind, the company turned to other internet-connected devices to see if they have the same problem. In addition to the group of devices listed above, the company also saw that many units had additional weak points where a hacker wouldn’t need credentials at all to gain access to the device. For instance, one popular router has a “root” privileged user account while a common wireless hot spot doesn’t require a password for SSH connections.

As previously stated, the capability of this attack isn’t just internet-based. SSHowDowN Proxy could be used internally on a home or office network too.

“We managed to confirm and validate the feasibility of this severe abuse-case in our lab environment, and believe that malicious users are and will continue to actively exploiting this to penetrate private networks.”

So what are hackers actually doing with these devices? In the case of Akamai Technologies, they’re trying to break into customer accounts by way of a “credential stuffing” attack. They have gained access to username/password pairs and are automatically injecting the information via brute force at the account login page.

Although the report focuses on Akamai customers, the problem extends beyond the company’s user base. Akamai suggests that consumers change the default credentials of their internet-connected devices, and to make specific changes if the device offers direct file system access. Consumers are also suggested to disable SSH if the feature is not required.

Editors' Recommendations

Kevin Parrish
Former Digital Trends Contributor
Kevin started taking PCs apart in the 90s when Quake was on the way and his PC lacked the required components. Since then…
How to create a bibliography in Word on Windows and Mac
A family using the computer to browse Fios internet together.

A bibliography is an important part of any well-structured college essay, dissertation, article, or other researched writing sample. It lets your readers know what sources you used as building blocks for your work, and isn’t too difficult to make without a template tool. Still, if you’d like to skip a few steps, there’s a terrific bibliography generator built right into Microsoft Word.

Read more
The unsung hero behind the modernization of Windows laptops
New Surface Laptop Studio 2 with a Surface Pen.

The large, multitouch trackpad was once synonymous with the MacBook. And starting in 2015, that has also included a haptic feedback trackpad, which simulates a physical click via a motorized engine under the surface. It was quite the revelation, and despite some initial skepticism, it really took off.

As you would expect, Apple held a patent on the technology, enjoying a five-year start ahead of other laptops. The first attempts at haptic feedback trackpads on Windows laptops weren't promising either.

Read more
How to create a Memoji on a Mac
Memoji creation screen in Messages on Mac.

Using emojis is a great way to add flair and personality to what would just be a plain ole’ text message. But if you’re an Apple devotee, you’ll also be able to liven your chats up with Memojis. Introduced on iOS 12, Memojis are custom avatars that you make in your likeness. Choose from numerous clothing, facial hair, and other cosmetic filters to dial in your appearance. When finished, your Memojis can be used with a few iOS apps, including Messages and FaceTime.

Read more