Bleeping Computer magazine warned that fixing a bug in the AVG and Avast applications led…
The experts contacted Philips and Thomson, informing them of the research findings and proposing a number of measures to improve product safety. Unfortunately, Philips said the vulnerabilities could no longer be fixed, and Thomson did not respond to Avast’s message at all.
The investigation, which began back in January of this year, led Vladislav Ilyushin, head of the IoT laboratory, and IoT threat researcher Marko Zbirka. This research was part of an Avast initiative to research and test security solutions for smart devices.
Let me remind you that recently the staff of this IoT laboratory recorded more than 500,000 attacks on iOT-devices in 2 hours.
At the beginning of the analysis, the experts discovered that both manufacturers supply STBs with Telnet ports open by default.
“This protocol was created in 1969, so it is more than 50 years old, it does not have encryption, but is still used to communicate with remote devices or servers. Essentially, in the case of vulnerable set-top boxes, Telnet allows attackers to remotely access devices and make them part of botnets, then use them for DDoS attacks and other malicious activity”, – say the Avast experts.
For example, the researchers managed easily run the binary file of the famous IoT Mirai malware on both consoles.
Also, experts have identified a problem related to the architecture of gadgets. So, both consoles use the Linux kernel version 3.10.23, installed on devices back in 2016. In essence, it serves as a bridge between the hardware and software of the set-top boxes, but support for version 3.10.23 expired back in November 2017. After this date release of updates stopped, and as a result, users are now vulnerable to potential attacks for which they simply did not receive fixes.
In addition to the already listed problems, an unencrypted connection was found in Philips and Thomson consoles between the set-top boxes and the pre-installed (and outdated) application of the popular weather forecast service AccuWeather.
An insecure connection between set-top boxes and the AccuWeather backend allows an attacker to change the content that users see on their TVs when using the weather app. For example, an attacker might display a ransomware message on the screen stating that the user’s TV has been hacked and now requires a ransom payment to unblock it.
“Manufacturers are responsible for meeting safety standards not only when they sell them. They are also responsible for the safety of their further exploitation by users. Unfortunately, manufacturers of IoT devices rarely wonder how they can mitigate the threats posed by their products. Instead, they rely on minimal or at least completely ignore IoT security to cut costs and speed time to market”, – said in Avast.
As a result, Avast experts recommend that users of DVB-T2 set-top boxes choose models from reliable brands that have a history of long-term support for devices and work on security. In addition, after purchase, it is worth disabling the Plug and Play (UPnP) settings, and also checking the port forwarding configuration and disabling it, if it is not necessary. If the user still has doubts about the reliability and safety of such a device, it is worth abandoning the “smart” functions at all and not connecting the device to the home network.
As a reminder, Avast researchers recently found several surveillance applications on Google Play.
Kurlibat.xyz is a site that tries to trick you into clik to its browser notifications…
Initiateintenselyrenewedthe-file.top is a domain that tries to trick you into clik to its browser notifications…
Wotigorn.xyz is a site that tries to force you into subscribing to its browser notifications…
Initiateintenselyprogressivethe-file.top is a domain that tries to force you into clik to its browser notifications…
Nuesobatoxylors.co.in is a domain that tries to trick you into subscribing to its browser notifications…
Helistym.xyz is a site that tries to force you into clik to its browser notifications…