Flaws expose DVB-T2 set-top boxes to botnet & ransomware attacks

Flaws expose DVB-T2 set-top boxes to botnet & ransomware attacks

Almost every device today can be vulnerable to cyber attacks, be it a computer or a simple remote control. Keeping this in mind, just recently, Avast Security has released a detailed blog post highlighting how 2 DVB top-set boxes are vulnerable to both botnet and ransomware attacks.


The boxes happen to be THOMSON THT741FTA and Philips DTR3502BFTA allowing consumers to enable their televisions to support DVB-T2 when not inbuilt.


See: LG Smart TV Screen Bricked After Android Ransomware Infection


The vulnerability is centered around how both of these devices do not use encryption for transmitting data back and forth to their servers or other connected devices. Furthermore, when tested by Avast; telnet network protocol was found exposing the device to infection from infamous Mirai botnet.



In a blog post, Avast’s Vladislav Iliushin and Marko Zbirka wrote that:



Luckily for the “bad guys”, the firmware has a wget utility built in, which allows fetching data from HTTP servers, be it a webpage or a file with malicious payload built in. So, downloading the binaries within the telnet session is relatively easy.

It is important to mention here that in the example below, we downloaded the binary of the widespread Mirai botnet to the /tmp directory because by default it is the only folder with write access, said Avast.




The code used to execute the Mirai botnet



Yet, this i ..

Support the originator by clicking the read the rest link below.