CIO News Hubb
Advertisement
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
CIO News Hubb
No Result
View All Result
Home Visionary CIO

Raspberry Pi Foundation ditches default username policy

admin by admin
April 11, 2022
in Visionary CIO
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter


The Raspberry Pi Foundation, the organisation behind the wildly popular eponymous computing platform, is rolling out a small but impactful security policy update, eliminating default usernames to cut off a potential avenue for malicious actors to conduct brute-force cyber attacks.

A brute-force attack, simply put, is a trial-and-error method of cyber attack by which a malicious actor tries all possible username and password combinations to access a system – usually using some kind of automated tool – until they hit on the right one.

This technique remains remarkably effective because so many people still choose weak passwords that can be broken in seconds, and if they are using a known default username, it becomes even more so.

Up to now, all installations of the Raspberry Pi Operating System (OS) have carried an initial default username of “pi”, but according to the foundation’s senior principal software engineer, Simon Long, this seemingly innocuous feature presents an easy opportunity for a malicious actor to exploit.

“This isn’t that much of a weakness – just knowing a valid username doesn’t really help much if someone wants to hack into your system; they would also need to know your password, and you’d need to have enabled some form of remote access in the first place,” explained Long in a blog post.

“But nonetheless, it could potentially make a brute-force attack slightly easier, and in response to this, some countries are now introducing legislation to forbid any internet-connected device from having default login credentials.”

To address the loophole, said Long, the default “pi” user will be removed and users will instead have to create a user the first time they boot a newly flashed Raspberry Pi OS image.

Long acknowledged the change might cause a few issues with documentation or programs that assume the existence of the “pi” user, but since this is in line with how most current operating systems work, the Raspberry Pi Foundation felt it was “a sensible change to make at this point”.

The change will also force Raspberry Pi owners to use the setup wizard when booting a new image. Previously, using the wizard was optional because until an account was created, a user could not log into the desktop, which was not an issue if the default “pi” user existed. Now it does not exist, that option cannot exist either.

The setup wizard will now run in a dedicated environment at first boot, but is otherwise largely unchanged. It will allow users to set the username and password as “pi” and “raspberry” if they wish, although this is highly inadvisable.

At the same time as making this change, the foundation is making additional tweaks to how Bluetooth devices pair with Raspberry Pi, and for the first time making it possible to run the desktop on top of Wayland – the proposed replacement for the X Window System that underpins the majority of Unix desktops – on an experimental basis. More details of these changes, and additional setup information, is available here.

“With over 200,000 machines on the internet running the standard Raspberry Pi OS, it was an attractive target for malicious actors. Ending the ‘pi’ default username is a good move by Raspberry Pi, setting minimum cyber hygiene standards across its devices and closing this vulnerability that put user systems at risk”
Oliver Pinson-Roxburgh, Bulletproof

Oliver Pinson-Roxburgh, CEO of Bulletproof, described the small change as a crucial step in the right direction. He cited recent research conducted by his firm which suggested that the default credentials for Raspberry Pi OS were in fact in the top 10 most regularly used default credentials by attackers.

“With over 200,000 machines on the internet running the standard Raspberry Pi OS, it was an attractive target for malicious actors. Ending the ‘pi’ default username is a good move by Raspberry Pi, setting minimum cyber hygiene standards across its devices and closing this vulnerability that had regularly put user systems at risk,” he said.

“Unfortunately, the scope of the problem of default credentials is far broader than Raspberry Pi. The term ‘default credentials’ has become almost outdated with so many users sticking with them, creating fertile ground for bad actors to exploit.

“With hackers increasingly turning to automated attack methods – [our] data showed that 70% of total web activity is bot traffic – they can rapidly use these standard credentials as a ‘skeleton key’ to chain together multiple hacks,” he added.

In the UK, the proposed Product Security and Telecoms Infrastructure Bill – which is currently in the report stage ahead of its third reading in the House of Commons – will ultimately prevent the manufacturers and retailers of connected technology products from programming default credentials into devices, among other things.

The law will apply to any device that can access the internet, such as smartphones and smart TVs, games consoles, security cameras and connected alarms, smart toys and baby monitoring equipment, smart home hubs and voice-activated assistants (like Alexa) and connected appliances.

Also in scope will be products that, while they can connect to other devices, do not directly access the internet themselves – such as smart lightbulbs and thermostats, or wearable fitness bands.

Failure to comply with the new law will result in fines of up to £10m, or 4% of global turnover, and up to £20,000 for every day in the case of ongoing breaches.



Source link

Previous Post

Six key executive-CIO conversations to help AI succeed

Next Post

Building distributed systems requires effective developer teams

Related Posts

Visionary CIO

JPMorgan’s UK digital retail bank reaches half-million customer mark

by admin
May 24, 2022
Visionary CIO

Set innovation free and make great ideas a reality

by admin
May 24, 2022
Visionary CIO

Japan Airlines: digitally re-imagining the air passenger experience

by admin
May 24, 2022
Visionary CIO

Learn to work with the Office 365 unified audit log

by admin
May 23, 2022
Visionary CIO

Ukrainian startup offers financial cloud, business advice

by admin
May 23, 2022
Next Post

Building distributed systems requires effective developer teams

Leave Comment

Recommended

JPMorgan’s UK digital retail bank reaches half-million customer mark

May 24, 2022

Set innovation free and make great ideas a reality

May 24, 2022

Japan Airlines: digitally re-imagining the air passenger experience

May 24, 2022

Yes, Containers Are Terrific, But Watch the Security Risks

May 24, 2022

Learn to work with the Office 365 unified audit log

May 23, 2022

Zero Trust for Data Helps Enterprises Detect, Respond and Recover from Breaches

May 23, 2022

© 2022 CIO News Hubb All rights reserved.

Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Privacy Policy.

Navigate Site

  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

Newsletter Sign Up

No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

© 2022 JNews - Premium WordPress news & magazine theme by Jegtheme.