Linked by Thom Holwerda on Mon 22nd Feb 2010 09:57 UTC
Privacy, Security, Encryption Discovered by Czech researchers, the Chuck Norris botnet has been spreading by taking advantage of poorly configured routers and DSL modems. The malware got the Chuck Norris moniker from a programmer's Italian comment in its source code: 'in nome di Chuck Norris', which means 'in the name of Chuck Norris'. Chuck Norris is unusual in that it infects DSL modems and routers rather than PCs. It installs itself on routers and modems by guessing default administrative passwords and taking advantage of the fact that many devices are configured to allow remote access. They're behind the times, though. It should've been the Epic Beard Man Botnet. Move over, Chuck.
Order by: Score:
This is rather effective...
by fatjoe on Mon 22nd Feb 2010 10:21 UTC
fatjoe
Member since:
2010-01-12

At this point, I should drop everything and run to my modem to see if it is infected. Instead, I am searching the tubes for new "Chuck Norris facts" jokes...

http://en.wikipedia.org/wiki/Chuck_Norris_facts

Edited 2010-02-22 10:26 UTC

Reply Score: 2

RE: This is rather effective...
by sakeniwefu on Mon 22nd Feb 2010 12:18 UTC in reply to "This is rather effective..."
sakeniwefu Member since:
2008-02-26

This man crushes Chuck Norris botnets with his eyebrows:

http://www.schneierfacts.com/

Reply Score: 2

Cable Modems/Routers
by mlauzon on Mon 22nd Feb 2010 16:04 UTC
mlauzon
Member since:
2005-07-25

What about cable modems/router combos, seeing as how they mention routers & DSL modems?

Reply Score: 1

Ugh!
by Jedd on Mon 22nd Feb 2010 16:22 UTC
Jedd
Member since:
2005-07-06

The company I work for just had the router for one of its smaller subnets infected with that worm. I removed the router and setup a new Cisco and plugged it into the network, fortunately the worm had not spread to any other places on the network, we are still looking into it.
[Just for info: that infection took place in a rural area in the US, state: Maine.]

Reply Score: 1

Comment by ssa2204
by ssa2204 on Mon 22nd Feb 2010 17:41 UTC
ssa2204
Member since:
2006-04-22

guessing default administrative passwords


Question, how difficult would it be for these manufacturers to require in the setup or initial loading of the administrative page for a password to be set? In the article it says that this can be mitigated by using a strong password. How about just ANY freaking password other than default? Problem here is these are devices marketed to consumers with very little knowledge or technical skills, so I don't think it is out of the ordinary or asking too much for these device makers to simply require a password to be set.

Reply Score: 3

RE: Comment by ssa2204
by Earl Colby pottinger on Mon 22nd Feb 2010 19:17 UTC in reply to "Comment by ssa2204"
Earl Colby pottinger Member since:
2005-07-06

I seen what happens when you do that for the general consumer market.

5% will change it to a good strong password and keep it in their head or a secured place.

10% will change it to the easiest password they can remember (usually their own name, the dog or cat). Very rarely is this a strong password in any sense.

25% will stick a post-it note with the password to the machine (50% of these will lose the post-it note within a year or the next move).

33% Will suffer brain lock and claim they can't read/understand that tech talk. And they will keep on claiming this if they call tech support.

And most of the rest will either pack-up and return the item or wait till their eight(8) year old comes home who will in turn read the manual/screen instructions. However, 8 year olds don't understand security so they don't pick strong passwords either.

Reply Score: 7

RE[2]: Comment by ssa2204
by Quazion on Mon 22nd Feb 2010 23:01 UTC in reply to "RE: Comment by ssa2204"
Quazion Member since:
2007-12-04

I just removed the password on all my home equipment. Typing passwords is just a waste of time.

Reply Score: 2

RE[3]: Comment by ssa2204
by sakeniwefu on Mon 22nd Feb 2010 23:11 UTC in reply to "RE[2]: Comment by ssa2204"
sakeniwefu Member since:
2008-02-26

As long as your system doesn't allow remote logins without password you may actually be safer than with a password.
You should still think about the implications if your devices are stolen, though. The most stupid two characters password is well beyond what any burglar will be able to break. He will format the drive and be done. Without a password he just needs to be able to use a computer at all to recover personal information possibly including on-line banking login data.

Reply Score: 2

RE[4]: Comment by ssa2204
by stabbyjones on Tue 23rd Feb 2010 03:19 UTC in reply to "RE[3]: Comment by ssa2204"
stabbyjones Member since:
2008-04-15

Passwords don't really matter with physical access.

Reply Score: 3

Bruce vs. Chuck
by n4cer on Tue 23rd Feb 2010 01:12 UTC
n4cer
Member since:
2005-07-06

Quick, someone create a Bruce Lee anti-malware solution.

Reply Score: 3

RE: Bruce vs. Chuck
by Karitku on Tue 23rd Feb 2010 12:50 UTC in reply to "Bruce vs. Chuck"
Karitku Member since:
2006-01-12

Quick, someone create a Bruce Lee anti-malware solution.

No change Chuck Norris ones hit router and whole Internetz went down.

Reply Score: 2

Bridged mode DSL modems
by bluedodo on Tue 23rd Feb 2010 03:59 UTC
bluedodo
Member since:
2006-03-26

Can this worm infect DSL modems in bridged mode?

Reply Score: 1