Jump to content

Anonymous hacked/attacked ISY


heyfrank

Recommended Posts

Has anyone encountered anything such as this recently? About two of our ISY's were hacked and making switches go 100% and the off function to turn the lights off for a second and back on 100%. The thermostat as well they set to 30 degrees F to turn the AC on in the middle of winter... They also were able to get into the Insteon wireless cameras as well it seems. There was a scene named "facepunch.com" as well, not so sure what this site is used for or why it was left in a device name, as well as what looked to be a username "Terminutter" (which is also a scene name) when i did some research into the site.

 

I know the default username and password was most likely the reason it was hacked, as well as keeping it on a common port. Which are issues I've already addressed and secured. But I'm just curious if anyone else has come such a thing.

 

I attached a screenshot as well.

post-3432-140474162866_thumb.jpg

Link to comment

Not with an ISY but I have seen other scenarios where people didn't take the time to implement basic security measures with IP cameras and other IP based devices. Lesson learned, I hope.

Personally what I see is a bit childish and funny but other might take offense to your pic, just an FYI.

 

At least ISY doesn't store your Credit Card for anything...

Link to comment
Has anyone encountered anything such as this recently? About two of our ISY's were hacked and making switches go 100% and the off function to turn the lights off for a second and back on 100%. The thermostat as well they set to 30 degrees F to turn the AC on in the middle of winter... They also were able to get into the Insteon wireless cameras as well it seems. There was a scene named "facepunch.com" as well, not so sure what this site is used for or why it was left in a device name, as well as what looked to be a username "Terminutter" (which is also a scene name) when i did some research into the site.

 

I know the default username and password was most likely the reason it was hacked, as well as keeping it on a common port. Which are issues I've already addressed and secured. But I'm just curious if anyone else has come such a thing.

 

I attached a screenshot as well.

 

Too funny! :mrgreen:

 

Teken . . .

Link to comment

The Vera was (to my knowledge) one of the most public. Reason being, by default, it does not use a username or password at all when accessed from the LAN. Many people !eave it that way 'for convenience' then act all surprised when their door can get unlocked. Go figure.

 

My guess, no SSL (or default certificate) used - or Username and password left default, or easily brute-forcible.

 

Edit: just saw that OP listed a default user name and password was in use.

Link to comment
  • 2 weeks later...

Funny, but not only did they hack themselves into your ISY, but more important is that in order to do this they need to be on your network. Are you securing your WiFi network?

 

For your WiFi I would:

* Enable WPA

* Change WiFi password

* Change password for your router

* Change SSID name

* Disable SSID Broadcast

Link to comment
Funny, but not only did they hack themselves into your ISY, but more important is that in order to do this they need to be on your network. Are you securing your WiFi network?

 

For your WiFi I would:

* Enable WPA

* Change WiFi password

* Change password for your router

* Change SSID name

* Disable SSID Broadcast

Does this mean they even ran the Admin Panel to edit the ISY?

You also got some nasty Trojan on your PC to get rid of I would think.

Link to comment
Funny, but not only did they hack themselves into your ISY, but more important is that in order to do this they need to be on your network. Are you securing your WiFi network?

 

For your WiFi I would:

* Enable WPA

* Change WiFi password

* Change password for your router

* Change SSID name

* Disable SSID Broadcast

Disabling SSID Broadcast is really pointless - does nothing but make it more difficult for you.

 

The SSID is still 'broadcasted' - its just suppressed from display.

Link to comment
Does this mean they even ran the Admin Panel to edit the ISY?

You also got some nasty Trojan on your PC to get rid of I would think.

Admin Panel/Console was definitely used, but was started from the hackers browser. They did not have any access to OP's computer and he did not get any virus/Trojans.

Link to comment

I don't think I would qualify leaving the default username/password and making the ISY available to the internet as "hacked".

 

Funny, but not only did they hack themselves into your ISY, but more important is that in order to do this they need to be on your network.

 

* Disable SSID Broadcast

 

Why do you say that? There's nothing to indicate that they were "on the network". He said it was available to the internet on the default port with the default username/password. Thus no need for local access.

 

As someone else already mentioned, disabling SSID broadcast provides no security against hacking. The SSID is still sent in clear text during beacons by clients for association. It just makes it more difficult for some devices to associate.

Link to comment
I don't think I would qualify leaving the default username/password and making the ISY available to the internet as "hacked".

 

Why do you say that? There's nothing to indicate that they were "on the network". He said it was available to the internet...

Now we're just playing with words. Either they were connected to his wifi network - maybe no wifi password. Or they figured out the public IP address of his router (from his network provider?) and that OP managed to open up the address/port of the ISY in that router using default port. Not an easy task. I vote for the first one - wifi.

 

Anyhow, let's close this until OP comes back with more facts.

Link to comment
  • 1 year later...

After reading all comments and considering several people open their ISY to the "wild web" I was wondering if there is any brute force attack prevention on the ISY, let's say, if there are more than x wrong passwords do something.

 

For sure it should be considered, it could be a notification and also a "growing wait time to release again the access" (ie 3 errors 1 minute, additional password error exponential growth).

 

I know people may complain, but I'd rather have to power cycle my ISY to reconnect than reinstall it after a hacking session...

 

 

 

MF_Bra

Link to comment

After reading all comments and considering several people open their ISY to the "wild web" I was wondering if there is any brute force attack prevention on the ISY, let's say, if there are more than x wrong passwords do something.

 

For sure it should be considered, it could be a notification and also a "growing wait time to release again the access" (ie 3 errors 1 minute, additional password error exponential growth).

 

I know people may complain, but I'd rather have to power cycle my ISY to reconnect than reinstall it after a hacking session...

 

 

 

MF_Bra

 

In the past many of us have asked that the next firmware drop increase the number of characters that can be used. Say from 8-10 to 12-16 characters. The system should also have user set attempt value from 3 to what ever they desire. Once this threshold has been exceeded there should be a user definable time out.

 

Most systems allow it to be timed out for 3-15 minutes . . .

 

Even better if the system could send a two form authentication via its e-mail feature. I've always mused about being able to create a custom e-mail which the system upon user login would ask the person to take the inbound e-mail and enter what ever pass phrase was used in conjunction with the user name / password.

 

That would be extremely hard for the casual hacker to determine and breach. 

Link to comment

After reading all comments and considering several people open their ISY to the "wild web" I was wondering if there is any brute force attack prevention on the ISY, let's say, if there are more than x wrong passwords do something.

 

For sure it should be considered, it could be a notification and also a "growing wait time to release again the access" (ie 3 errors 1 minute, additional password error exponential growth).

 

I know people may complain, but I'd rather have to power cycle my ISY to reconnect than reinstall it after a hacking session...

 

 

 

MF_Bra

I do like the lockout functions that many security schemes use. After three bad passwords a lockout of say 3-5 minutes would stop most trial and error password sniffers. Even my keypad doorlocks use this simple technique.

 

A very common technique the lockout on password failure should be easy for UDI to implement and present very little or no hardship to any user.

 

Three to five minutes would be about right to access your password vault (wife) and confirm your password.

Link to comment

Another option is we could figure out a way to proxy through Apache running on a Raspberry Pi, then logs could possibly be monitored and bad actors blocked.

 

There's a few big concerns I see with security on the ISY:

 

- SSL is so slow as to be almost unusable

 

- Can't proxy SSL through another machine and still get live updates or Admin console

 

- Doesn't support HTTP Digest authentication, so that even if HTTP (not HTTPS) is used to work around the above problems, at least your password is still mostly protected (though still vulnerable to MITM attacks)

 

- Doesn't support multiple user accounts or an API key, so at least you could have throw-away passwords

 

If any of these points could be addressed (particularly the first three) I think it would do a lot for the security of the ISY

Link to comment

Archived

This topic is now archived and is closed to further replies.


×
×
  • Create New...