Author: JackMoveSubject: Gpu based paravirtualization rootkit, all os vulne
Posted: 12 July 2017 at 9:14pm
Well its been a little while, I guess I'll add some more of my observations here...
Several indiciations have led me to believe that utility smart meters are somehow involved. Maybe only in some cases, and maybe not officially, but it seems like the industrial, low-level communication networks they use are somehow being exploited and used to access private home devices.
I also wouldnt rule out some type of new, over-reaching lawful intercept technology being implemented. Using Wireshark on any of my home computers shows a few FC protocol initial connections made by a Cray Comm "device" upon each physical ethernet connection (plugging it in to any other device). The captured packets unfortunately dont offer much data. This behavior is observed even when connecting isolated machines (all traditional wireless hardware physically removed) via ethernet to switches or routers that are also offline. The mac address shows it belongs to Cray Comm but they are originating from the machine I'm on. Cray Comm does not make any consumer devices as far as i know. I believe theyre known for large data acquisition devices.
Also, using nmap and similar tools on my local network has revealed signs that the whole network has been virtualized. I can only see it with certain configurations of the app but when i do i see a "host" on every single IP on my home network. A handful with unknown mac addresses, most of which are fake (first few characters not associated with any OUI). The ones that do resolve belong to Cisco/Linksys, Microchip Technology, and Liteon, to name a few.
There are other clues, for instance, I have a router with a built in touch screen (so i can change the settings without having to connect a potentially compromised device to it). Whenever i change the password and then try to connect a device to it with the new password, it always hangs for a while and usually fails. It doesnt connect successfully until the second attempt. Some data from Nmap also has suggested that devices appearnto not have the same identity they just had, etc.
well thats all the fun info i can recall right now. i look forward to seeing what others post.