Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats //

Advanced Threats

9/24/2015
02:00 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Cisco Offers Free Tool To Detect SYNful Knock Router Malware

Tool helps businesses detect routers running known version of newly discovered malicious implant.

Cisco Systems enterprise users now have a way to check if their network routers might have been infected by the recently disclosed SYNful Knock malware.

The company yesterday released a new Python script that organizations can use to scan their networks for potentially infected routers. The free tool works by looking for routers on the network that answer to the malware’s specific “knock,” William McVey, technical lead at Cisco’s Talos Threat Intelligence group said in a blog post.

The tool can be used to detect hosts compromised with currently known versions of SYNful Knock, McVey said. “But it cannot establish that a network does not have malware that might have evolved to use a different set of signatures,” he added in a somewhat confusingly worded caveat.

"The tool injects custom crafted packets at the Ethernet layer (layer 2) and monitors and parses the responses,” McVey said. “This functionality requires that the tool be run with root privileges.”

SYNful Knock is basically malware code that allows attackers to gain nearly undetectable and persistent remote control over certain Cisco business routers.

Security vendor FireEye, which issued an alert on the issue last week, described it as a malicious implant designed to replace and masquerade as the legitimate firmware on a handful of now discontinued Cisco router models (Cisco 1841, Cisco 2811 and Cisco 3825). Other models are likely impacted as well, FireEye said, based on its observation of the malware and the impacted systems.

SYNful Knock gives attackers complete administrative control over a compromised router via a backdoor password and provides them with a platform from which to launch attacks against other systems and routers on the same network. FireEye said it has discovered at least 14 Cisco network routers, used by businesses to connect to the Internet, infected with the poisoned implant.

Contrary to what some might expect, the attack is not the result of a security flaw in any of the affected Cisco products. Instead, in each case the attackers appear to have managed to either gain actual physical access to the devices, or used administrative credentials to break into the systems and plant the malware.

Attacks involving the swapping out and replacing of firmware in a commercial-grade router with a rogue version have up to now been considered largely theoretical. The appearance of SYNful Knock suggests otherwise and shows that threat actors have begun exploring ways to backdoor the critical network routers that organizations use to connect to the Internet.

As FireEye noted in its report last week, SYNful Knock could well be the first of a new kind of attack tactic involving the use of modified router images to gain remote control of the devices. The same kind of malicious firmware that was implanted on the Cisco routers can be loaded on routers from other vendors as well.

“Routers are one of the Holy Grail targets for attackers because they lie outside of many normal security protections,” says Lamar Bailey, leader of Tripwire's Vulnerability and Exposures Research Team. “Modifying firmware for your own needs or to add new features is a common practice and has been used to great success on home routers and access points,” Bailey says. “This is just the same practice used on a grander scale.”

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Post a Comment
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-29043
PUBLISHED: 2021-05-17
The Portal Store module in Liferay Portal 7.0.0 through 7.3.5, and Liferay DXP 7.0 before fix pack 97, 7.1 before fix pack 21, 7.2 before fix pack 10 and 7.3 before fix pack 1 does not obfuscate the S3 store's proxy password, which allows attackers to steal the proxy password via man-in-the-middle a...
CVE-2021-29044
PUBLISHED: 2021-05-17
Cross-site scripting (XSS) vulnerability in the Site module's membership request administration pages in Liferay Portal 7.0.0 through 7.3.5, and Liferay DXP 7.0 before fix pack 97, 7.1 before fix pack 21, 7.2 before fix pack 10 and 7.3 before fix pack 1 allows remote attackers to inject arbitrary we...
CVE-2021-29045
PUBLISHED: 2021-05-17
Cross-site scripting (XSS) vulnerability in the Redirect module's redirection administration page in Liferay Portal 7.3.2 through 7.3.5, and Liferay DXP 7.3 before fix pack 1 allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_redirect_web_internal_portlet_RedirectPor...
CVE-2021-29046
PUBLISHED: 2021-05-17
Cross-site scripting (XSS) vulnerability in the Asset module's category selector input field in Liferay Portal 7.3.5 and Liferay DXP 7.3 before fix pack 1, allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_asset_categories_admin_web_portlet_AssetCategoriesAdminPortl...
CVE-2021-29053
PUBLISHED: 2021-05-17
Multiple SQL injection vulnerabilities in Liferay Portal 7.3.5 and Liferay DXP 7.3 before fix pack 1 allow remote authenticated users to execute arbitrary SQL commands via the classPKField parameter to (1) CommerceChannelRelFinder.countByC_C, or (2) CommerceChannelRelFinder.findByC_C.