I'm sorry, but if you have the wherewithal to commandeer 600,000 devices
well enough to permanantly brick them, you have the wherewithal to
commandeer them and load a patched version of software on them closing up
the vulnerability.

If there's no fixed version of software available for the platform, then
you cannot fault the ISP for not patching the devices.

If there IS a fixed version of the software available, this person should
have used the botnet c2 to distribute and apply the fixed firmware, thus
solving the problem while not killing connectivity for innocent end users.

The decision to take destructive action is indefensible.  The right choice
should been to update the devices with patched software if it was
available, and if it wasn't, to leave them alone and instead focus on
trying to develop a fixed version of software.

Now, if they were simply inept, and were trying to load fixed software onto
the devices but failed to test their process adequately first, then at
least their heart was in the right place, even if their understanding of
how to do large-scale firmware upgrades safely wasn't.

But that's certainly not what that article would lead us to suspect was the
intended outcome.

Matt


On Sun, Jun 2, 2024, 16:47 Dave Taht <dave.t...@gmail.com> wrote:

>
>
>
> https://www.linkedin.com/pulse/600000-families-using-one-internet-provider-have-routers-bruce-perens-geedc/
>
>
> --
> https://www.youtube.com/watch?v=BVFWSyMp3xg&t=1098s Waves Podcast
> Dave Täht CSO, LibreQos
>

Reply via email to