A list of Telnet credentials for more than 515,000 servers, home routers, and IoT (Internet of Things) "smart" devices has been published this week on a popular hacking forum. This marks the biggest leak of Telnet passwords up to now.
As per ZDNet, that first broke the news, the so called ‘bot lists’ include the IP address, username and password for the Telnet service for each device. The list appears to be the result of an Internet scan for devices using default credentials or easy-to-guess passwords. As for the source the leak, it appears that the list was shared online by the the maintainer of a DDoS-for-hire (DDoS booter) service.
In conversation with ZDNet, the hacker explained that he “upgraded his DDoS service from working on top of IoT botnets to a new model that relies on renting high-output servers from cloud service providers”. All the lists the hacker published are dated October-November 2019.
According to BinaryEdge and Shodan search results, the devices included in the lists are located all over the world with some of them located on the networks of known internet service providers, while many of the devices located on the networks of major cloud service providers.