IPV6 Test         email Hindi Marathi

 


What's New

Mirai Botnet Affecting IoT Devices

For More Details Click Here


50% reduction in Prices of Landline Premium Numbers

For More Details Click Here


Now MTNL, Mumbai Landline/Dolphin customers can pay their bills using UPI, BharatQR on Selfcare Portal

Click here for Selfcare Portal


Opportunities to partner with MTNL for provision of FTTH services on Revenue share basis.
For More details contact Senior Manager (FTTH) on Email.
This email address is being protected from spambots. You need JavaScript enabled to view it. , This email address is being protected from spambots. You need JavaScript enabled to view it.

For More Details Click Here



To Let

Prime Commercial Space on Rent

More than 3 Lac Sq. Ft. commercial space in MTNL Buildings at strategic locations across Mumbai, Navi Mumbai & Mira-Bhayandar available for lease For more details click here

Renting Space for Vending Van Parking at BKC TE Compound

For more details click here

 

Integrity Pact & IEM

 

 

Click Here For CVC Circular Regarding Integrity Pact

 

A new committee of Independent External Monitors has been formed as per the details given below:


Name                                                     E-mail ID

(1) Shri Dhruv Kumar Agarwal               This email address is being protected from spambots. You need JavaScript enabled to view it.
(2) Shri V.K. Gupta                                 This email address is being protected from spambots. You need JavaScript enabled to view it.
(3) Ms. Alka Sirohi                                  This email address is being protected from spambots. You need JavaScript enabled to view it.

 

Cyber Security Alerts

 

 

Mirai Botnet Affecting IoT Devices

A new malware named as "Mirai" targeting Internet of Things (IoT) devices such as printers, video camera, routers, smart TVs is spreading.The malware is capable of scanning the network devices or Internet of Things and try to compromise these systems especially those protected with defaults credentials or hardcoded username passwords.     For more Details Click Here

Malware Mirai

 

A new malware named as "Mirai" targeting Internet of Things (IoT) devices such as printers, video camera, routers, smart TVs is spreading.The malware is capable of scanning the network devices or Internet of Things and try to compromise these systems especially those protected with defaults credentials or hardcoded username passwords.

The malware is capable of performing the following function:

  • Compromise IoT systems with default username and passwords
  • Create botnets of the compromised devices.
  • Use compromise devices to launch DDoS attacks.
  • Make network connections to receive commands from launch further attacks.

 Indicators of compromise:

  • Abnormal traffic on port 2323/TCP and 23/TCP as it scans for vulnerable devices.
  • Command and Control Network traffic on port 48101/TCP.
  • Huge outbound traffic if the device is part of DDoS attack.

When the malware runs, it turns the infected system into a bot connecting to a C&C server. Bot infected systems are connecting to the C&C Servers on specific ports and listen for commands from remote attacker. In view of the high damage potential of Botnet infected machines, the  customers are requested to disinfect their systems and take appropriate countermeasures suggested below to prevent such incidents in future.

Countermeasures for securing IOT devices:

  • Restrict Web Management Interface access of IoT devices to authorized users only and change default username/passwords.
  • Always change Default login credentials before deployment in production.
  • Change default credentials at device startup and ensure that passwords meet the minimum complexity.
  • Disable Universal Plug and Play (UPnP) on IoT devices unless absolutely required.
  • Users should be aware of the installed devices and their capabilities. If a device comes with a default password or an open Wi-Fi connection, users should change the password and only allow it to operate on a home network with a secured Wi-Fi router.
  • Control access to the devices with Access List.
  • Configure devices to "lock" or log out and require a user to re-authenticate if left unattended.
  • Identify systems with default passwords and implement abovementioned measures. Some the systems that need to be examined are Routers, switches,web applications and administrative web interfaces, ICS systems, Telnet and SSH interfaces.
  • Implement account lockout policies to reduce the risk of brute forcing attacks.
  • Telnet and SSH should be disabled on device if there is no requirement of remote management.
  • Configure VPN and SSH to access device if remote access is required.
  • Configure certificate based authentication for telnet client for remote management of devices.
  • Implement Egress and Ingress filtering at router level.
  • Report suspicious entries in Routers to your Internet Service Provider.
  • Keep up to date Antivirus on the computer system.
  • Keep up-to-date on patches and fixes on the IoT devices, operating system and applications.
  • Unnecessary port and services should be stopped and closed.
  • Logging must be enabled on the device to log all the activities.
  • Enable and monitor perimeter device logs to detect scan attempts towards critical devices/systems.

 

 

Subcategories

Broadband Plans