Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats //

Advanced Threats

9/24/2015
02:00 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Cisco Offers Free Tool To Detect SYNful Knock Router Malware

Tool helps businesses detect routers running known version of newly discovered malicious implant.

Cisco Systems enterprise users now have a way to check if their network routers might have been infected by the recently disclosed SYNful Knock malware.

The company yesterday released a new Python script that organizations can use to scan their networks for potentially infected routers. The free tool works by looking for routers on the network that answer to the malware’s specific “knock,” William McVey, technical lead at Cisco’s Talos Threat Intelligence group said in a blog post.

The tool can be used to detect hosts compromised with currently known versions of SYNful Knock, McVey said. “But it cannot establish that a network does not have malware that might have evolved to use a different set of signatures,” he added in a somewhat confusingly worded caveat.

"The tool injects custom crafted packets at the Ethernet layer (layer 2) and monitors and parses the responses,” McVey said. “This functionality requires that the tool be run with root privileges.”

SYNful Knock is basically malware code that allows attackers to gain nearly undetectable and persistent remote control over certain Cisco business routers.

Security vendor FireEye, which issued an alert on the issue last week, described it as a malicious implant designed to replace and masquerade as the legitimate firmware on a handful of now discontinued Cisco router models (Cisco 1841, Cisco 2811 and Cisco 3825). Other models are likely impacted as well, FireEye said, based on its observation of the malware and the impacted systems.

SYNful Knock gives attackers complete administrative control over a compromised router via a backdoor password and provides them with a platform from which to launch attacks against other systems and routers on the same network. FireEye said it has discovered at least 14 Cisco network routers, used by businesses to connect to the Internet, infected with the poisoned implant.

Contrary to what some might expect, the attack is not the result of a security flaw in any of the affected Cisco products. Instead, in each case the attackers appear to have managed to either gain actual physical access to the devices, or used administrative credentials to break into the systems and plant the malware.

Attacks involving the swapping out and replacing of firmware in a commercial-grade router with a rogue version have up to now been considered largely theoretical. The appearance of SYNful Knock suggests otherwise and shows that threat actors have begun exploring ways to backdoor the critical network routers that organizations use to connect to the Internet.

As FireEye noted in its report last week, SYNful Knock could well be the first of a new kind of attack tactic involving the use of modified router images to gain remote control of the devices. The same kind of malicious firmware that was implanted on the Cisco routers can be loaded on routers from other vendors as well.

“Routers are one of the Holy Grail targets for attackers because they lie outside of many normal security protections,” says Lamar Bailey, leader of Tripwire's Vulnerability and Exposures Research Team. “Modifying firmware for your own needs or to add new features is a common practice and has been used to great success on home routers and access points,” Bailey says. “This is just the same practice used on a grander scale.”

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark Reading,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-15625
PUBLISHED: 2020-01-18
A memory usage vulnerability exists in Trend Micro Password Manager 3.8 that could allow an attacker with access and permissions to the victim's memory processes to extract sensitive information.
CVE-2019-19696
PUBLISHED: 2020-01-18
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishi...
CVE-2019-19697
PUBLISHED: 2020-01-18
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administr...
CVE-2019-20357
PUBLISHED: 2020-01-18
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.
CVE-2020-7222
PUBLISHED: 2020-01-18
An issue was discovered in Amcrest Web Server 2.520.AC00.18.R 2017-06-29 WEB 3.2.1.453504. The login page responds with JavaScript when one tries to authenticate. An attacker who changes the result parameter (to true) in this JavaScript code can bypass authentication and achieve limited privileges (...