I've been folding for a couple months now, but in the past week I've gotten multiple warnings from my ISP and I wonder if they are related to folding on two machines at home.
Nothing on my home network has changed. There's no significant chance my home or computer could be compromised really because I live on my own; no one has access to my hardware. So I'm wondering if anyone else has encountered issues from their ISP while folding.
My ISP is Telus, a major provider in Western Canada. Here's the message they're sending me.
Mirai vulnerability detected,. THis is not a computer virus. This vulnerability affects devices on your network such as a security camera, DVR or a non-TELUS routers. To remove the vulnerability you will need to update the firmware if an update is available. You should also change the admin password on the device. If you don?t know how to do this please contact the device manufacturer.
incident details:
IP: [my IP]
threat: iotmirai
type: vulnerability
source port: 7225
destination ip:
destination port: 5555
Warnings from ISP
Moderators: Site Moderators, FAHC Science Team
-
- Posts: 1996
- Joined: Sun Mar 22, 2020 5:52 pm
- Hardware configuration: 1: 2x Xeon [email protected], 512GB DDR4 LRDIMM, SSD Raid, Win10 Ent 20H2, Quadro K420 1GB, FAH 7.6.21
2: Xeon [email protected], 32GB DDR4, NVME, Win10 Pro 20H2, Quadro M1000M 2GB, FAH 7.6.21 (actually have two of these)
3: [email protected], 12GB DDR3, SSD, Win10 Pro 20H2, GTX 750Ti 2GB, GTX 1080Ti 11GB, FAH 7.6.21 - Location: UK
Re: Warnings from ISP
https://www.trendmicro.com/vinfo/us/sec ... acked-fbot … This is a recent expansion of the "Mirai" threat that maybe relates … If your ISP is being nice it may be noting features of your connections that are at risk - probably less to do with FAH tbh and more to do with some bit of kit attached to you home network that has a vulnerability that has recently been spotted such as "a security camera, DVR or a non-TELUS routers" or NAS that is vulnerable to this latest variant?
2x Xeon E5-2697v3, 512GB DDR4 LRDIMM, SSD Raid, W10-Ent, Quadro K420
Xeon E3-1505Mv5, 32GB DDR4, NVME, W10-Pro, Quadro M1000M
i7-960, 12GB DDR3, SSD, W10-Pro, GTX1080Ti
i9-10850K, 64GB DDR4, NVME, W11-Pro, RTX3070
(Green/Bold = Active)
Xeon E3-1505Mv5, 32GB DDR4, NVME, W10-Pro, Quadro M1000M
i7-960, 12GB DDR3, SSD, W10-Pro, GTX1080Ti
i9-10850K, 64GB DDR4, NVME, W11-Pro, RTX3070
(Green/Bold = Active)
-
- Site Admin
- Posts: 7993
- Joined: Tue Apr 21, 2009 4:41 pm
- Hardware configuration: Mac Studio M1 Max 32 GB smp6
Mac Hack i7-7700K 48 GB smp4 - Location: W. MA
Re: Warnings from ISP
To add to the response from Neil-B, the port used by the F@h client externally are ports 80 and 8080. Additionally two other ports could be configured to be open externally, ports 36330 and 7396, but are off by default except to internal connections.