Archive-October 2016-Tech Bulletin–Mirai Advisory And New Wireless Network Products MG90

Our mission is to keep you informed about information key to the success of your organization’s wireless data initiatives. Below you will find an overview of important facts about the Mirai virus. Near the bottom of this email, you will find information about new products that you should be aware of in the wireless data communications space.

Mirai Summary: A new Trojan virus called Mirai is in the news.  Mirai is targeting Linux servers, M2M and IoT devices, including cellular gateways and routers, but mainly cameras and DVRs, running Linux-based firmware, for the purpose of nefariously engaging these systems as part of a large botnet used to stage Denial-of-Service DDoS attacks designed to disrupt access to web properties. (More info: https://safeum.com/blog/2014-mirai-trojan-is-the-next-big-threat-to-iot-devices-and-linux-servers.html) Runaway cellular airtime usage can be a result of infection. In the world of wireless networking, any device that runs on Linux is susceptible. PLEASE NOTE USAT CLIENT BASE: Critical infrastructure clients who are on private networks run a reduced risk of infection.

How Infection Happens: Mirai infects devices via brute-force attacks on the Telnet port, exploiting a “black hat” list of default password credentials, taking advantage of instances where device owners have forgotten to change the built-in default password to a secure password. Critical infrastructure clients who are not on private networks but who have implemented complicated passwords (like what the USAT DevProv+ service facilitates) and instituted other basic security functions like “white lists” and “black lists” are unlikely victims. If you have not or suspect that a user within your organization has not changed the default passwords on the devices attached to your corporate network, then it is important to implement secure passwords now in order to avoid operational ramifications as well as possible financial charges due to data consumption overages.

How To Diffuse Your Risk & Treat Infection: Good news: even if your device is infected, restarting the device and changing the password is an effective treatment. Sierra Wireless, a world leader in the manufacture of cellular gateways was the first to issue a technical bulletin detailing the threat of Mirai to the M2M/IOT ecosystem. Please refer to the steps that they suggest to secure devices here: http://usatcorp.com/action-required-sierra-wireless-technical-bulletin-mirai-trojan/.  The Department of Homeland Security also very recently issued an informative publication on defeating Botnets here https://www.us-cert.gov/ncas/alerts/TA16-288A. In addition to the advice issued on the DHS link, best practices dictate that if you are a user of cellular routers and gateways, make sure that devices in your network are running the latest firmware.
Please feel free to respond to this email with additional questions or concerns about the Mirai virus.

NEW PRODUCT ANNOUNCEMENTS FOLLOW:
USAT NEW PRODUCTS—Poynting High-Gain Multi-band Antennas Launched
Poynting high gain directional antennas are now a stocked item at USAT Corp. USAT conducted an extensive search for multi-band high gain antennas, both omni and directional (yagi) that can support the different flavors of LTE used domestically and around the world, and this product line tested out the best. See examples here http://usatcorp.com/usat-corp-will-now-offer-poynting-antennas/. If you have interest in superior high gain antennas, respond to this email, and a specialist will contact you.

CRADLEPOINT NEW PRODUCTS

SIERRA WIRELESS AIRLINK NEW PRODUCTS

DIGI NEW PRODUCTS

As you set budgets for wireless data communication and networking initiatives in 2017 and beyond, please consider USAT Corp. as your consultative partner and engage with us early and often. You can get in touch with me to discuss your upcoming projects, or reach out directly to your USAT account manager.

Comments are closed.