Warnings from ISP

If you're new to FAH and need help getting started or you have very basic questions, start here.

Moderators: Site Moderators, FAHC Science Team

Post Reply
pkrfold
Posts: 1
Joined: Wed May 13, 2020 2:29 pm

Warnings from ISP

Post by pkrfold »

I've been folding for a couple months now, but in the past week I've gotten multiple warnings from my ISP and I wonder if they are related to folding on two machines at home.

Nothing on my home network has changed. There's no significant chance my home or computer could be compromised really because I live on my own; no one has access to my hardware. So I'm wondering if anyone else has encountered issues from their ISP while folding.

My ISP is Telus, a major provider in Western Canada. Here's the message they're sending me.

Mirai vulnerability detected,. THis is not a computer virus. This vulnerability affects devices on your network such as a security camera, DVR or a non-TELUS routers. To remove the vulnerability you will need to update the firmware if an update is available. You should also change the admin password on the device. If you don?t know how to do this please contact the device manufacturer.

incident details:
IP: [my IP]
threat: iotmirai
type: vulnerability
source port: 7225
destination ip:
destination port: 5555
Neil-B
Posts: 2027
Joined: Sun Mar 22, 2020 5:52 pm
Hardware configuration: 1: 2x Xeon E5-2697v3@2.60GHz, 512GB DDR4 LRDIMM, SSD Raid, Win10 Ent 20H2, Quadro K420 1GB, FAH 7.6.21
2: Xeon E3-1505Mv5@2.80GHz, 32GB DDR4, NVME, Win10 Pro 20H2, Quadro M1000M 2GB, FAH 7.6.21 (actually have two of these)
3: i7-960@3.20GHz, 12GB DDR3, SSD, Win10 Pro 20H2, GTX 750Ti 2GB, GTX 1080Ti 11GB, FAH 7.6.21
Location: UK

Re: Warnings from ISP

Post by Neil-B »

https://www.trendmicro.com/vinfo/us/sec ... acked-fbot … This is a recent expansion of the "Mirai" threat that maybe relates … If your ISP is being nice it may be noting features of your connections that are at risk - probably less to do with FAH tbh and more to do with some bit of kit attached to you home network that has a vulnerability that has recently been spotted such as "a security camera, DVR or a non-TELUS routers" or NAS that is vulnerable to this latest variant?
2x Xeon E5-2697v3, 512GB DDR4 LRDIMM, SSD Raid, W10-Ent, Quadro K420
Xeon E3-1505Mv5, 32GB DDR4, NVME, W10-Pro, Quadro M1000M
i7-960, 12GB DDR3, SSD, W10-Pro, GTX1080Ti
i9-10850K, 64GB DDR4, NVME, W11-Pro, RTX3070

(Green/Bold = Active)
Joe_H
Site Admin
Posts: 7870
Joined: Tue Apr 21, 2009 4:41 pm
Hardware configuration: Mac Pro 2.8 quad 12 GB smp4
MacBook Pro 2.9 i7 8 GB smp2
Location: W. MA

Re: Warnings from ISP

Post by Joe_H »

To add to the response from Neil-B, the port used by the F@h client externally are ports 80 and 8080. Additionally two other ports could be configured to be open externally, ports 36330 and 7396, but are off by default except to internal connections.
Image

iMac 2.8 i7 12 GB smp8, Mac Pro 2.8 quad 12 GB smp6
MacBook Pro 2.9 i7 8 GB smp3
Post Reply