The login attempts GreyNoise is seeing are happening over SSH connections, but Eye Control researcher Teusink said the undocumented account can also be accessed using a Web interface. GreyNoise deploys collection sensors in hundreds of data centers worldwide to monitor Internetwide scanning and exploitation attempts. “By definition, anything we’re seeing has to be opportunistic,” Morris said, meaning the attackers are using the credentials against IP addresses in a pseudorandom manner in hopes of finding connected devices that are susceptible to takeover. In most or all of the login attempts, the attackers have simply added the credentials to existing lists of default username/password combinations used to hack into unsecured routers and other types of devices. Combined with a vulnerability like Zerologon this could be devastating to small and medium businesses.”Īndrew Morris, founder and CEO of security firm GreyNoise, said on Monday that his company’s sensors have detected automated attacks that are using the account credentials in an attempt to log in to vulnerable devices. They could also intercept traffic or create VPN accounts to gain access to the network behind the device. Someone could for example change firewall settings to allow or block certain traffic. “An attacker could completely compromise the confidentiality, integrity and availability of the device. “As the zyfwp user has admin privileges, this is a serious vulnerability,” Eye Control researcher Niels Teusink wrote.
#FTP SITE FOR ZYXEL FIRMWARE WINDOWS#
Have you patched?The researcher warned that the account put users at considerable risk, particularly if it were used to exploit other vulnerabilities such as Zerologon, a critical Windows flaw that allows attackers to instantly become all-powerful network administrators. Further Reading New Windows exploit lets you instantly become admin.