DESCRIPTION LAST UPDATED: 2024-09-23
DEFAULT SEVERITY LEVEL: CRITICAL
This report aggregates information about compromised IoT devices detected through other means than HTTP-based scan detection. It complements our Compromised Website report. The intention is to make the data about the compromised IoT devices more accessible, rather than being spread out over multiple non-HTTP based detections, as well as to introduce additional datasets that are a result of correlations of existing datasets.
The report includes:
- Devices compromised by the 7777 botnet (as reported by Bitsight). These events are tagged
7777
. Make sure to investigate and check for any wider compromises. This data is also present in the Accessible Telnet Report. The source_type is set toscan.
- Data on hosts running SSH services that are known to be compromised, because they have known public malicious SSH keys installed which facilitate remote access. For more details on the issue, please read “Public SSH keys can leak your private infrastructure“. The data was obtained through collaboration with an external third party (thank you!). Data was previously made accessible through Compromised SSH Host Special Report. Reporting will now be continuous with events being reported out as we receive them. These events will be tagged
ssh
and the source_type set toscan
. - Data based on hosts observed attacking our honeypots using a known Common Vulnerability and Exposure (CVE), or equivalent, when we have successfully mapped the attacking device to a vendor (as a result of our Device Identification report). These events will be tagged
honeypot-http-scan
, and source_type set tohoneypot
.
If you receive an alert from us, assume your reported device is compromised and make sure to investigate. In some cases this may mean that it is another device on your network that may be generating the actual queries (such as an infected device behind the reported public IP address of a firewall or network address translation (NAT) gateway).
You can track statistics about these reported events in our public Dashboard.
Severity levels are described here.
Filename prefix(s): compromised_iot, compromised_iot6