117
all 12 comments
sorted by: hot top controversial new old
[-] Pika@sh.itjust.works 19 points 7 months ago* (last edited 7 months ago)

It's weird that DLINK's response was basically "tough shit buy our newer product we don't work on those anymore" especially given the extent of the attack.

[-] AnUnusualRelic@lemmy.world 9 points 7 months ago

Hasn't that been basically been those domestic network appliance vendors' answer to most such problems?

[-] Outtatime@sh.itjust.works 5 points 7 months ago

Most tech companies are of the same mentality

[-] Quexotic@infosec.pub 12 points 7 months ago

This calls for new legislation. There are FTC best practice laws being discussed for just this kind of situation.

https://www.ftc.gov/system/files/documents/plain-language/913a_careful_connections.pdf

So, basically the enforcement of the above documents recommendations from what I understand. Not an expert though.

The thinking is this kind of bullshit directly compromises national security.

I agree with that thinking.

[-] Dust0741@lemmy.world 11 points 7 months ago

Is there a nice up to date list of companies like this that have clearly little desire to improve security or are just very anti consumer?

[-] AnUnusualRelic@lemmy.world 6 points 7 months ago* (last edited 7 months ago)

They're all like that. Unless it's enterprise grade gear, which has a much longer support plan (although this kind of thing can happen there as well). It's a classic with domestic network gear.

Your way out is to replace the original firmware with an open source one if possible. Of course if you buy a brand new model, you don't know if it's going to eventually be supported.

For nas specifically, synology is usually fairly reliable, or you can build your own with one of several specialised system distributions, such as Truenas (there are several others). It may require a bit of learning, depending on how familiar you are with computing and networking.

[-] Dust0741@lemmy.world 3 points 7 months ago

Cool. My rule of thumb of only buying products that either are open source or can have open source firmware and software is sticking.

[-] AnUnusualRelic@lemmy.world 2 points 7 months ago

That's really the only reasonable way to go nowadays.

[-] JustARegularNerd@lemmy.world 10 points 7 months ago

I'm still learning Cybersec in general, if I'm reading this right, were these credentials hardcoded in by D-Link, these devices reached EOL, and so they refuse to remove that backdoor on the basis that the devices are EOL?

Is there a likely reason that these were left in, like could it have been a development oversight, or does it look more likely that this was malicious?

Regardless, I definitely hold the opinion that D-Link should do the right thing for their customers and patch that vulnerability, regardless of the device being EOL, similar to how Microsoft pushed a security update to Windows XP re WannaCry when it was EOL, on the basis that "Yes, XP is unsupported and you shouldn't use it, but we are patching this particular vulnerability anyway."

[-] protozoan_ninja@sh.itjust.works 4 points 7 months ago

D-Link suck, they probably just overlooked it. Consumer-grade router manufacturers generally have abysmal/terrifying software QA. One prominent reason I recommend picking up hardware that supports an open router firmware.

[-] PixelTron@lemm.ee 7 points 7 months ago

Well I’ll add D-Link to my ‘never buy’ list. Not just for their crappy response, but for the poor security practices used in a networked product in the first place!

this post was submitted on 07 Apr 2024
117 points (99.2% liked)

Cybersecurity

5759 readers
135 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !cybersecurity@lemmy.capebreton.social !securitynews@infosec.pub !netsec@links.hackliberty.org !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 2 years ago
MODERATORS