At-Risk Routers & Russian Hacking Plans Stir Talk at RSA

  /     /     /  
Publicated : 22/11/2024   Category : security


At-Risk Routers & Russian Hacking Plans Stir Talk at RSA


At last weeks RSA conference, the recent US and UK disclosure that Russia-backed actors have been targeting unpatched and older routers stirred conversations among security experts.



If you havent been thinking about the security of your unpatched or misconfigured routers, nows a good a time to start.
Recent alerts from US and UK authorities have warned that older and unpatched routers, switches, firewalls and Network-based Intrusion Detection System (NIDS) devices are vulnerable to hacking and that Russia-backed groups have been exploiting these vulnerabilities, possibly for years. This new, grim reality has caused some heavy reflection in the security community. (See
Alert Warns Russian Actors Are Targeted Unsecured Network Devices
.)
At the recently concluded 2018 RSA Conference in San Francisco, much of the talk in the halls and sessions drifted back to the alert, which
US Computer Emergency Readiness Team
(US-CERT) released right before the gathering started on April 16.
(Source:
Pexels
)
It is not clear what the end-goal of these attacks are -- possibly espionage, or even basic theft -- but security experts believe that the people behind these exploits of routers and other equipment might be laying the groundwork for a more substantial disruption.
This could come in the form of a massive botnet or distributed denial of service (DDoS) attack that takes advantage of possibly thousands of compromised routers and other equipment in homes and smaller businesses.
The compromised routers are only part of the attack and eventual impact, David Ginsburg, the vice president of marketing at
Cavirin
, which offers security assessment and remediation across physical and cloud infrastructure, noted in an email. Look at both
Mirai and Reaper
, where the ultimate goal was a DDoS attack against other assets, most notably the
Dyn attack
that took down many Internet properties in the US and Europe.
One of the more interesting, and possibly frustrating, parts of this attack and the alert that followed is that group took advantage of a rather simple exploit -- namely old gear that was not patched or misconfigured or merely unauthorized. It required no zero-day exploit or an injection of malware.
This is something the security community has been talking about for many years, but from a cultural standpoint, we simply dont care enough to secure these devices properly and prevent these kinds of attacks from happening, noted Nathan Wenzler, chief security strategist at
AsTech
, a San Francisco-based security consulting company.
Wenzler added:

Manufacturers have little incentive to do so, as they leave the responsibility of securing the devices in the hands of the users, and most users dont know how to get into their router and configure it properly. Weve been setting ourselves up for an attack like this for a long time, and now were starting to see the cusp of what this problem will look like.

One of the other big problems with this type of vulnerability is that routers and other hardware will likely function normally and look the same to the untrained eye. Since there was no true exploit, a compromised router looks the same as one that is not.
The fundamentals of network security are being redefined -- dont get left in the dark by a DDoS attack! Join us in Austin from May 14-16 at the fifth-annual
Big Communications Event
. Theres still time to register and communications service providers get in free!
Matt Walmsley, the head of EMEA Marketing at
Vectra
, which uses artificial intelligence and machine learning for threat detection and response, noted that security pros should take two lessons away from this incident.
The first is not to leave the door wide open, which means do the patching and updates that are required. It also means changing default administrative credentials
This may seem like cybersecurity 101 advice but, only last month, default settings in some Cisco switches allowed over 168,000 devices exposed to the internet to be identified as vulnerable to illicit remote command execution via an admin protocol, Walmsley wrote in an email. (See
Misconfigured Routers Could Be Used for Botnets, Espionage
.)
The second piece of advice is to ensure that the firmware of these devices is up-to-date. Even if you have robust OS level security controls, threats such as Sub-OS rootkits will remain undetected, he added.
Related posts:
Cyber Attacks Have Doubled, but Security Is Getting Better at Blocking Them
Firewall Fail: IT Cant Identify All Network Traffic
Microsoft Security Is Channeling the Terminator
Microsofts Brad Smith: 2017 Was a Cybersecurity Wake-Up Call
— Scott Ferguson is the managing editor of Light Reading and the editor of
Security Now
. Follow him on Twitter
@sferguson_LR
.

Last News

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
At-Risk Routers & Russian Hacking Plans Stir Talk at RSA