I opened the app to change some settings and noticed my network enabled door bell (probably routing through China) was listed as a vulnerable device. Pretty scary!
You can read about it on the wiki page, but here is a quick summary of Mirai: devices infected by Mirai scan the internet for IoT devices with default username and passwords and attempt to gain access and infect other devices. On command the infected devices (bots) can be used to create a massive distributed DDoS attack. Luckily the malware isn't written in to memory so rebooting the device should clear it, but if vulnerable devices are not patched then the malware will quickly reappear.
I did some searching and didn't find any simple tools that would scan my network for vulnerable devices, so I wrote a little python script that checks a given host (I used my router to see what devices were connected on what IPs) against the list of known default usernames and passwords put out when the Mirai hackers released the source code.
It's a work in progress but so far it works well enough for me.
I already knew my wireless door bell had a default username and password for the telnet port so I set out to change this to something else.
Changing the Telnet PasswordMy device didn't have the usual passwd command in linux that you would use to change the password of a user. I did some hunting and found a command chpasswd in the /usr/sbin/ directory. I followed the instructions here to work out how to use the command, then I changed the password of the root user by doing the following:
- Telnet in to the device (I use PuTTY)
- Enter the default username and password you discovered earlier
- Type the command "chpasswd" in and press enter
- Enter the new username and password in the format "username:password" and press enter
- Hit ctrl+d to exit the script
That's it! You have gone a long way toward making your device (and the internet) a safer place