Skip to main content

Hackers use SSH to control connected devices for brute-force attacks

akarnai ssh report brute force credential stuffing internet devices data center feat
Image used with permission by copyright holder
Content delivery network service provider Akamai Technologies released a new report on Wednesday (PDF) stating that hackers are taking advantage of a 12-year-old vulnerability in OpenSSH to gain control of internet-connected devices for mass-scale attack campaigns. The company dubs these attacks as “SSHowDowN Proxy,” which for now seem focused on using video surveillance devices, satellite antenna equipment, network devices, and internet-connected network-attached storage units.

According to the company, these compromised devices are used as proxies to attack a number of internet-based targets and “internet-facing” services, as well as the internal networks that host them. Hackers are actually gaining control of the devices by accessing their low-level command line console that still relies on the factory-shipped default login credentials provided by the vendor.

SSH stands for Secure Shell, and is a cryptographic network protocol that provides a secure channel, enabling services like remotely accessing a desktop residing on a home network from a public Wi-Fi access point. This protects data like usernames and passwords as the information travels across the internet. But this protocol isn’t completely secure, and Edward Snowden even indicated that the NSA could decrypt some SSH traffic.

Akamai began its investigation after it noticed active malicious HTTP/HTTPS traffic stemming from a third-party Network Video Recorder device targeting customer accounts. After determining that there were no unauthorized users accessing its network, the company then listed the device’s live network connections and their associated process IDs. The results showed that someone was running SSH connections using the default “admin” credentials provided by the manufacturer.

The thing is, the admin/admin credentials, by default, only allows web-based access to the machine, and does not provide SSH-level access. Whoever accessed the NVR machine took advantage of several SSH options to get past the default credential restriction. After that, the hacker set up the device as a proxy server, which establishes a TCP connection to a legitimate server from a remote client. Thus, any attack on a network would appear to stem from the NVR machine itself.

With all of this in mind, the company turned to other internet-connected devices to see if they have the same problem. In addition to the group of devices listed above, the company also saw that many units had additional weak points where a hacker wouldn’t need credentials at all to gain access to the device. For instance, one popular router has a “root” privileged user account while a common wireless hot spot doesn’t require a password for SSH connections.

As previously stated, the capability of this attack isn’t just internet-based. SSHowDowN Proxy could be used internally on a home or office network too.

“We managed to confirm and validate the feasibility of this severe abuse-case in our lab environment, and believe that malicious users are and will continue to actively exploiting this to penetrate private networks.”

So what are hackers actually doing with these devices? In the case of Akamai Technologies, they’re trying to break into customer accounts by way of a “credential stuffing” attack. They have gained access to username/password pairs and are automatically injecting the information via brute force at the account login page.

Although the report focuses on Akamai customers, the problem extends beyond the company’s user base. Akamai suggests that consumers change the default credentials of their internet-connected devices, and to make specific changes if the device offers direct file system access. Consumers are also suggested to disable SSH if the feature is not required.

Editors' Recommendations

Kevin Parrish
Former Digital Trends Contributor
Kevin started taking PCs apart in the 90s when Quake was on the way and his PC lacked the required components. Since then…
Quest Pro 2: What we know about Meta’s next premium VR headset
From a side view, you can see how glasses can be worn along with a Quest Pro.

While Meta’s Quest Pro is one of the best VR headsets available, it never reached its full potential as a laptop replacement for spatial computing. Meta hasn’t given up on making a work-centric solution, and rumors suggest a Meta Quest Pro 2 is still in development. Here’s what we know so far about Meta's answer to Apple's Vision Pro.
Meta Quest Pro 2 release date speculation
It’s difficult to make a solid prediction on when Meta will launch the Quest Pro 2. Meta CTO Andrew “Boz” Bosworth made it clear in an Instagram AMA that Meta is continually prototyping new VR headsets to find out what’s possible with current technology. That gives Meta more flexibility than manufacturers that research for years before doing hardware testing.

If Meta is satisfied with the performance of the Snapdragon XR2+ Gen 2 and LG can deliver enough micro-OLED displays, the Quest Pro 2 could arrive as early as this October at Meta Connect 2024.

Read more
Does RAM speed matter for PC performance?
Installing RAM sticks in a motherboard.

RAM is one of the primary components in a PC, and it's important that you have at least a certain amount of RAM depending on what you want to do with your PC. However, there are more things to RAM than just capacity: Frequency and latency are important considerations, too.

The question of whether RAM speed matters is especially important now that we have two generations of RAM available, both DDR4 and DDR5 -- and they have vastly different speeds. The official maximum clock speed for DDR4 was 3200MHz, while DDR5 starts at 4800MHz, an increase of 50%; however, you'll easily find RAM kits reaching above 7000MHz. Although latency significantly went up, from CL14 on most 3200MHz DDR4 kits to CL40 on most 4800MHz DDR5 kits, DDR5 is still found to be faster.

Read more
The 6 best 2-in-1 laptops for drawing in 2024
Portal RTX running on the Surface Laptop Studio 2.

Whether you're a seasoned professional or enjoy drawing as a hobby, investing in a 2-in-1 laptop is a great idea for all sorts of artists. Drawing on a laptop makes it easy to quickly share your creation with others, which is especially useful if you're doing it as a professional–negating the need to upload your pen-and-paper sketch to the computer before sending it to a client. Moreover, working on a laptop lets you undo mistakes, zoom in to better handle small details, and quickly change utensils.

There are a lot of perks to drawing on a 2-in-1 laptop, but not all of them are great for creators. Some have unresponsive displays that can't register all your movements, while others might have a lackluster resolution or color spectrum that turns most images into a muddled mess. Because of that, it can be hard figuring out which laptop is best for your needs. And if you'll be spending a good chunk of change on the laptop, you'll want to make sure you get it right.

Read more