in

Hackers are hijacking smart building access systems to launch DDoS attacks

smart-doors.jpgImage: Nortek Security & Control, LLC

Hackers are actively searching the internet and hijacking smart door/building access control systems, which they are using to launch DDoS attacks, according to firewall company SonicWall.

The attacks are targeting Linear eMerge E3, a product of Nortek Security & Control (NSC).

Linear eMerge E3 devices [1, 2, 3] fall in the hardware category of “access control systems.” They are installed in corporate headquarters, factories, or industrial parks. Their primary purpose is to control what doors and rooms employees and visitors can access based on their credentials (access codes) or smart cards.

In May 2019, researchers from Applied Risk, a cyber-security firm specialized in industrial security services, disclosed details about ten vulnerabilities impacting NSC Linear eMerge E3 devices.

NSC Linear eMerge E3 devices

NSC Linear eMerge E3 devices

Despite the fact that six of the ten vulnerabilities had a vulnerability severity (CVSSv3) score of 9.8 or 10 out of a maximum of 10, NSC failed to provide patches, according to an Applied Risk security advisory.

Applied Risk later released proof-of-concept exploit code in November.

CVE-2019-7256 exploitation

Now, in a report published last week, SonicWall researchers say that hackers are scanning the internet for exposed NSC Linear eMerge E3 devices and using one of the ten vulnerabilities.

The vulnerability they are using is CVE-2019-7256. Applied Risk described this vulnerability as a command injection flaw. It is one of the two that received a severity score of 10/10, meaning it can be exploited remote, even by low-skilled attackers without any advanced technical knowledge.

“This issue is triggered due to insufficient sanitizing of user-supplied inputs to a PHP function allowing arbitrary command execution with root privileges,” SonicWall said in a security alert published last week. “A remote unauthenticated attacker can exploit this to execute arbitrary commands within the context of the application, via a crafted HTTP request.”

Hackers are using CVE-2019-7256 to take over devices, download & install malware, and then launch DDoS attacks on other targets.

The first of these attacks began on January 9, this year, and were spotted by intelligence firm Bad Packets, and have continued in a steady stream ever since.

“Attackers seem to be actively targeting these devices as we see tens of thousands of hits every day, targeting over 100 countries with the most [attacks being] observed in U.S.,” SonicWall said.

The attack surface isn’t too large, though. SonicWall reports that only “2,375 Internet-accessible eMerge devices are listed by the Shodan search engine.”

This number is far lower than the millions of security cameras and home routers that are also available online. However, the small number of vulnerable devices has not dissuaded attackers so far, and exploitation attempts they’re likely to continue.

IoT devices used as entry points

But while having your smart building door system launch DDoS attacks on Steam or the PlayStation Network is one issue, a bigger threat is that these vulnerable systems can also be used as entry points into an organization’s internal networks.

In August last year, Microsoft reported that it observed a Russian state-sponsored hacking crew using Internet of Things (IoT) smart devices as launching points for other attacks on corporate networks.

The Russian hackers tried to exploit a VOIP phone, an office printer, and a video decoder, Microsoft said, but the NSC Linear eMerge E3 devices are just as attractive targets, primarily due to the high severity of the ten security bugs disclosed last year.

System administrators managing networks were NSC Linear eMerge E3 devices are installed are advised to take these systems off the internet, or at least limit access to these devices using a firewall or VPN.


Source: Information Technologies - zdnet.com

Raytheon engineer arrested for taking US missile defense data to China

NBN testing short-term satellite connections for disaster recovery