Until you track down the mysterious Raspberry Pi set up by the company and find out the perpetrator



Australian programmer Christian Haschek, founder of Haschek Solutions , a security company founded in 2005, has written a blog post about the mysterious Raspberry Pi he discovered while working.

The curious case of the Raspberry Pi in the network closet
https://blog.haschek.at/2019/the-curious-case-of-the-RasPi-in-our-network.html

Christian runs a company called Haskek Solutions that provides security services with his father. One day, my father, who works in the client's office, sends me a photo with the message 'What's this?'



This mysterious Raspberry Pi was discovered in the client's network closet. Christian asks his father to take a picture of the Raspberry Pi and keep it out of the network closet.

The Raspberry Pi installed in the network closet is specifically the 1st generation Raspberry Pi model B. A USB dongle (left) and an SD card with a capacity of 16GB (right) were inserted into this.



At the time of discovery, Christian thought that this Raspberry Pi was 'installed by someone in the company for fun.' Therefore, ask anyone who has access to the network closet where the Raspberry Pi was installed if they have any idea of the mysterious Raspberry Pi. It seems that only four of the manager, office manager, Christian, and a colleague of Christian were able to access the network closet, and all of them answered, 'I have no idea about Raspberry Pi.'

So, Christian asks for insights on

Reddit about the USB dongle that was plugged into the Raspberry Pi. As a result, it turned out that this USB dongle is the nRF52832-MDK , a microprocessor as powerful as the Raspberry Pi. Since it is equipped with Wi-Fi, Bluetooth, RFID reader, etc., 'It is for connecting to Wi-Fi and Bluetooth with an old Raspberry Pi,' Christian speculates the role of nRF52832-MDK.



Next, analyze the image saved on the SD card inserted in the Raspberry Pi. There are several filesystem folders on the SD card, most of them

ext4 and one of them FAT16 .



Furthermore, in this, you will find the data written as 'resin'.



This 'resin' is a paid IoT service (renamed to balena at the time of article creation) that creates an image for an IoT device and deploys the device so that it can be updated and retrieved with the service. something like. Resin can also install a VPN on your device to securely transfer the collected data.

Then I found a file called 'config.json' in the folder labeled 'resin-boot'.



Examining this JSON file reveals that the application deployed to resin is called a 'logger'. In addition, the user ID that seems to be associated with the resin account, that the device is using a VPN via port 443, and that 'registered on May 13, 2018' (specifically what? It is unknown whether it was registered timing).



When I searched Google for the user ID found in the JSON file, I found a person with the same name at the same location as the company where Raspberry Pi was found. This person was featured in a feature article entitled 'Talented Children' published in 2001, 'I got the same person's name and address information from this article' and 'Multiple user names.' Keep in mind that the username may have been used by someone other than the person mentioned in the article, as it may be used by people, 'says Christian.



The SD card didn't seem to store any data that would have been collected from the network, but you'll find a very obfuscated Node.js app. However, 'I couldn't know exactly what the app was doing,' Christian said. However, it is clear that the Node.js app seems to be communicating via a serial connection to the USB dongle. In addition, Mr. Christian speculates that 'it was used to collect the movement and profile of Bluetooth and Wi-Fi compatible terminals around the network closet, and Wi-Fi packets.'

In addition, Christian found the 'LICENSE.md' file for the Node.js app. In the file with this license information, I also found the name of the company that seems to be the developer of the Node.js app.



Another interesting discovery that Christian mentions is a file called 'resin-wifi-01' found in the path '/ root-overlay / etc / NetworkManager / system-connections /'. This file contains the Wi-Fi

credentials used to set up the device, 'this was clearly not corporate Wi-Fi,' Christian wrote.



Then, by searching for this Wi-Fi credential with WiGLE , we succeeded in identifying the address of the person who seems to be the owner of the mysterious Raspberry Pi.



In addition, check the DNS logs to determine the exact date and time the Raspberry Pi first connected to your corporate network. Then check the RADIUS log to see which employees were in the company at the time. Then, it becomes clear that the employee account that should have been deactivated in the company at that time was trying to connect to Wi-Fi and got an error message. After investigating this, it was found that the administrator of the corporate account had made a transaction with a former employee and made the deactivated account available.

It seems that he is not directly involved because the processing after this was outside the work of Mr. Christian. However, he wrote, 'The company didn't want to take care of this, so I fired the person and made a move.'

in Security, Posted by logu_ii