TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Cisco routers in at least 4 countries infected by highly stealthy backdoor

200 pointsby Deinosover 9 years ago

9 comments

snowyover 9 years ago
So it requires a Cisco router that has a default username and password, and the router has to not have any kind of input firewall for its SSH.<p>Then you log in and install a patched firmware containing your backdoor.<p>It&#x27;s hardly Cisco specific. Surely any router (or any device for that matter)that has a known default username and password can be exploited in this way?<p>Am I missing something here?
评论 #10223774 未加载
评论 #10224951 未加载
评论 #10222686 未加载
评论 #10222375 未加载
评论 #10223838 未加载
评论 #10222131 未加载
turk-over 9 years ago
hmm I wonder who could be doing this.<p><a href="https:&#x2F;&#x2F;www.techdirt.com&#x2F;articles&#x2F;20140518&#x2F;17433327281&#x2F;cisco-goes-straight-to-president-to-complain-about-nsa-intercepting-its-hardware.shtml" rel="nofollow">https:&#x2F;&#x2F;www.techdirt.com&#x2F;articles&#x2F;20140518&#x2F;17433327281&#x2F;cisco...</a>
评论 #10221457 未加载
评论 #10221357 未加载
_wmdover 9 years ago
FWIW IOS backdoors were already being researched by 2003, this isn&#x27;t surprising at all, and I imagine by now the true scope of the problem is a little bigger than a few routers
评论 #10222426 未加载
acdover 9 years ago
This is why your routers should run open source software. At least then you can reinstall it and be reasonably assured it does not have malware.<p>Also we need an inventory of where things can be hidden in devices. Are there embedded flash areas where are they?<p>A modern reinstall should:<p>1) Reinstall the operating system from a known good source 2) Flash all firmware and flash chips with known good code.<p>Both operating system and firmware should be open source so you can inspect the code.
评论 #10222119 未加载
评论 #10222910 未加载
评论 #10222534 未加载
评论 #10267607 未加载
评论 #10222121 未加载
eyearequeover 9 years ago
First, I don&#x27;t think this is the NSA. It is far to sloppy for something like this. You probably wouldn&#x27;t be able to detect them so easily. It is possible to be from another nation state though, or smart attacker. Also, we know that the NSA tries to cover their tracks: <a href="http:&#x2F;&#x2F;arstechnica.com&#x2F;tech-policy&#x2F;2014&#x2F;08&#x2F;snowden-the-nsa-not-assad-took-syria-off-the-internet-in-2012&#x2F;" rel="nofollow">http:&#x2F;&#x2F;arstechnica.com&#x2F;tech-policy&#x2F;2014&#x2F;08&#x2F;snowden-the-nsa-n...</a> &quot;Instead, the TAO’s hackers “bricked” the router, Snowden said. He described the event as an “oh shit” moment, as the TAO operations center team tried to repair the router and cover their tracks, to no avail.&quot;<p>What I am confused about is that I assumed IOS images were signed. How are people creating backdoored IOS images without failing signature checking? Maybe they patched rommon?
tamersalamaover 9 years ago
Why is a country relevant in this context?
评论 #10221306 未加载
评论 #10221309 未加载
评论 #10221294 未加载
评论 #10221276 未加载
评论 #10221383 未加载
评论 #10221301 未加载
horchataover 9 years ago
So FireEye posted the original article. Anyone surprised?
happyscrappyover 9 years ago
&gt;The initial infection doesn&#x27;t appear to exploit any vulnerabilities in Cisco devices. Rather, attackers seem to be taking advantage of routers that use passwords that are factory default
评论 #10221466 未加载
评论 #10222125 未加载
mtgxover 9 years ago
Whoever trusts Cisco at this point are living in la-la land where they refuse to acknowledge the <i>reality</i> that Cisco has been helping governments build surveillance capabilities into its routers to spy on its customers.<p>Whatever negative impact this has on their own business is fully deserved at this point.
评论 #10221436 未加载
评论 #10221443 未加载