Thousands of Asus routers are being hit with stealthy, persistent backdoors (arstechnica.com)
from schizoidman@lemm.ee to technology@lemmy.world on 29 May 07:26
https://lemm.ee/post/65299659

cross-posted from: rss.ponder.cat/post/193175

Thousands of home and small office routers manufactured by Asus are being infected with a stealthy backdoor that can survive reboots and firmware updates in an attack by a nation-state or another well-resourced threat actor, researchers said.

The unknown attackers gain access to the devices by exploiting now-patched vulnerabilities, some of which have never been tracked through the internationally recognized CVE system. After gaining unauthorized administrative control of the devices, the threat actor installs a public encryption key for access to the device through SSH. From then on, anyone with the private key can automatically log in to the device with administrative system rights.

Durable control

“‍The attacker’s access survives both reboots and firmware updates, giving them durable control over affected devices,” researchers from security firm GreyNoise reported Wednesday. “The attacker maintains long-term access without dropping malware or leaving obvious traces by chaining authentication bypasses, exploiting a known vulnerability, and abusing legitimate configuration features.”

Read full article

Comments


From Ars Technica - All content via this RSS feed

#technology

threaded - newest

db2@lemmy.world on 29 May 07:34 next collapse

Wouldn’t a factory reset also “fix” it then?

n3cr0@lemmy.world on 29 May 07:54 collapse

Yes, except if they alter the factory image. In this case a new factory image has to be flashed before factory reset.

I haven’t tried on my ASUS router, yet. But there might be a serial port in one of the RJ45 sockets, as on my old netgear. Plug in your PC there and run the manufacturer’s flash utility.

This trick worked for me when a normal factory reset didn’t help getting back acces to the WebUI.

bdonvr@thelemmy.club on 29 May 10:17 next collapse

Is there any way to test for this?

AmbiguousProps@lemmy.today on 29 May 10:35 collapse

From the article:

The only way for router users to determine whether their devices are infected is by checking the SSH settings in the configuration panel. Infected routers will show that the device can be logged into by SSH over port 53282 using a digital certificate with a truncated key of

ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAo41nBoVFfj4HlVMGV+YPsxMDrMlbdDZ…

To remove the backdoor, infected users should remove the key and the port setting.

People can also determine if they’ve been targeted if system logs indicate that they have been accessed through the IP addresses 101.99.91[.]151, 101.99.94[.]173, 79.141.163[.]179, or 111.90.146[.]237.

LastYearsIrritant@sopuli.xyz on 29 May 11:02 next collapse

Kinda tricky to tell what exactly I’m supposed to check.

I run an ASUS RT-AX86S

To check if the settings have been compromised:
Log into the router under 192.168.1.1
Advanced Settings/Administration
System tab
Service section
Enable SSH should be set to OFF

ShinkanTrain@lemmy.ml on 29 May 12:14 next collapse

Persistent backdoor was my nickname on college

LastYearsIrritant@sopuli.xyz on 29 May 12:53 next collapse

Took a while to find a list of router models, I doubt this is an exclusive list, but at least bleeping computer has a list at all.

The threat monitoring firm reports that the attacks combine brute-forcing login credentials, bypassing authentication, and exploiting older vulnerabilities to compromise ASUS routers, including the RT-AC3100, RT-AC3200, and RT-AX55 models.

bleepingcomputer.com/…/botnet-hacks-9-000-plus-as…

MangoPenguin@lemmy.blahaj.zone on 29 May 13:42 next collapse

Oh wow, the router allows Admin and SSH on the WAN port? That seems like a massive problem to start with.

WAN should allow nothing except established.

LastYearsIrritant@sopuli.xyz on 29 May 13:47 collapse

It’s off by default, but it allows you to turn it on in the advanced settings. Seems like a good compromise, especially since it lets you whitelist clients.

If you were using the router as a secondary network, like for IoT or homelab, it would kind of make sense to allow SSH or other logins from WAN, as long as the WAN was also your network and not the open internet.

zapzap@lemmings.world on 29 May 16:15 next collapse

Those “backdoors” are called RJ-45 jacks. That’s where the bits get in and out.

Theoriginalthon@lemmy.world on 29 May 20:18 next collapse

You have to fill them with both ends of a cable or the bits leak on the floor

HakunaHafada@lemm.ee on 30 May 07:36 collapse

My ports are on the front of the router. No backdoors for me, checkmate Atheists.

yesman@lemmy.world on 29 May 16:32 next collapse

Nobody is going to install this on my TP-Link. The back door is factory.

who@feddit.org on 29 May 19:16 next collapse

At least one of the named routers (RT-AC3100) is supported by OpenWRT, which generally has a better security track record than stock firmware.

isVeryLoud@lemmy.ca on 30 May 03:52 collapse

Is the RT-AX58U affected?