Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Network Security //

Data Center

// // //
4/18/2018
08:05 AM
Larry Loeb
Larry Loeb
Larry Loeb

Alert Warns Russian Actors Are Targeted Unsecured Network Devices

A join statement from UK and US law enforcement and security agencies are warning that Russian actors are targeting older and unpatched network infrastructure as part of an ongoing cyberespionage campaign.

The US Department of Homeland Security (DHS), FBI and the United Kingdom's National Cyber Security Centre (NCSC) have issued a joint alert that should make anyone interested in computer security sit up and take notice.

The Technical Alert (TA) warns of the worldwide cyber exploitation of network infrastructure devices -- routers, switches, firewalls, Network-based Intrusion Detection System (NIDS) devices -- by Russian state-sponsored cyber actors. The three agencies state:

The current state of U.S. network devices -- coupled with a Russian government campaign to exploit these devices -- threatens the safety, security and economic well-being of the United States.

Not only that, but FBI has "high confidence" that Russian state-sponsored cyber actors are using compromised routers to conduct man-in-the-middle (MIM) attacks to support espionage, extract intellectual property, maintain persistent access to victim networks and potentially lay a foundation for future offensive operations.

(Source: Pixabay)
(Source: Pixabay)

Those are pretty strong words.

The alert reiterates in much of what has already been disseminated about the use of network devices as an attack platform. This ties in with previous security alerts that have been issued in the last month, such as the one for Cisco's Smart Installation. (See Cisco Warns of Possible Smart Install Client Hacking.)

It has been obvious since at least 2015 that all sorts of network devices have been leveraged by nation-state actors, including the Russians. Indeed, routers are being leveraged by all sorts of bad actors of all nationalities, including bot herders.

Perhaps the most important take-away here is that Russian cyber actors do not need to leverage zero-day vulnerabilities or install malware to exploit these sort of devices -- oh, no.

Instead, attackers take advantage of functional vulnerabilities such as devices with legacy unencrypted protocols or unauthenticated services, or devices insufficiently hardened before installation, or devices that are no longer supported with security patches by manufacturers or vendors (end-of-life devices).

The recent alert admits that these kinds of vulnerabilities are most likely to occur in consumer-level devices where secure installation is an afterthought.

The alert advocates certain strategies to deal with the problems it raises.

First, don't allow unencrypted (plaintext) management protocols (like Telnet) to enter an organization from the Internet. A wise move under most circumstances, since it stops a major avenue of attack.

Additionally, block Internet-sourced access to the device management interface and at the same time restrict device management to an internally trusted and whitelisted host or LAN. Again, cut off the avenue of attack.


The fundamentals of network security are being redefined -- don't get left in the dark by a DDoS attack! Join us in Austin from May 14-16 at the fifth-annual Big Communications Event. There's still time to register and communications service providers get in free!

Immediately change default passwords and enforce a strong password policy. This will stop dictionary attacks or those using known default passwords.DHS has also strongly advised owners and operators to retire and replace legacy devices that cannot be configured to use SNMP V3, which has encrypted messaging.

In an email to Security Now, Christy Wyatt, CEO at security vendor Dtex Systems, wrote:

The latest US-CERT alert shows that attacks have many components and that no single technology can be relied on to stop Russia, North Korea, Iran or any determined threat actor. Addressing weaknesses in the exploited devices may close the gates to the Russian-backed hackers involved, but that alone won’t mitigate long-term impacts …

That's a fair point. This alert is a response to an acute situation. But the same problem can arise from other actors using the same legacy equipment as a stepping stone. It's not just the Russians that are the threat, though they may be a current one.

Related posts:

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-1172
PUBLISHED: 2023-03-17
The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the full name value in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that w...
CVE-2023-1469
PUBLISHED: 2023-03-17
The WP Express Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘pec_coupon[code]’ parameter in versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping. This makes it possible for authenti...
CVE-2023-1466
PUBLISHED: 2023-03-17
A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0. It has been rated as critical. This issue affects the function view_student of the file admin/?page=students/view_student. The manipulation of the argument id with the input 3' AND (SELECT 2100 FROM (SELECT(...
CVE-2023-1467
PUBLISHED: 2023-03-17
A vulnerability classified as critical has been found in SourceCodester Student Study Center Desk Management System 1.0. Affected is an unknown function of the file Master.php?f=delete_img of the component POST Parameter Handler. The manipulation of the argument path with the input C%3A%2Ffoo.txt le...
CVE-2023-1468
PUBLISHED: 2023-03-17
A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/?page=reports&date_from=2023-02-17&date_to=2023-03-17 of the component Report Handler. The manipula...