TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Hacking millions of modems and investigating who hacked my modem

838 点作者 albinowax_12 个月前

45 条评论

phs318u12 个月前
What a great article. Very easy to follow. The best part was that instead of attacking the messenger and denying any problem, Cox seem to have acted like the very model of responsible security response in this kind of situation. I'd love to read a follow up on what the bug was that intermittently permitted unauthorised access to the APIs. It's the kind of error that could easily be missed by superficial testing or depending on the reason behind the bug, perhaps not even experienced in the test environment.
评论 #40575501 未加载
评论 #40572047 未加载
评论 #40572164 未加载
评论 #40580173 未加载
评论 #40572526 未加载
评论 #40572849 未加载
Bluecobra12 个月前
What sucks about this situation is when your ISP forces you to use their modem or router. For example, I have AT&amp;T fiber and it does some kind of 802.1X authentication with certificates to connect to their network. If they didn&#x27;t do this, I could just plug any arbitrary device into the ONT. There are&#x2F;were workarounds to this but I don&#x27;t want to go through all those hoops to get online. Instead, I ended up disabling everything on the AT&amp;T router and have my own router that I keep up to date plugged into that. Unbeknownst to me, the AT&amp;T router could be hacked and I would never notice unless it was adversely affects my service.<p>Thank god most things use HTTPS these days.
评论 #40575541 未加载
评论 #40575172 未加载
评论 #40575444 未加载
评论 #40574176 未加载
评论 #40576103 未加载
评论 #40578239 未加载
评论 #40575413 未加载
评论 #40576953 未加载
kn10012 个月前
Great read, and fantastic investigation. Also nice to see a story of some big corp not going nuclear on a security researcher.<p>I can&#x27;t say for certain, and the OP if they&#x27;re here I&#x27;d love for you to validate this - but I&#x27;m not convinced requests to the local admin interface on these Nokia routers is properly authenticated. I know this because I recently was provisioned with one and found there were certain settings I could not change as a regular admin, and I was refused the super admin account by the ISP. turns out you could just inspector hack the page to undisable the fields and change the fields yourself, and the API would happily accept them.<p>if this is the case, and an application can be running inside your network, it wouldn&#x27;t be hard to compromise the router that way, but seems awfully specific!
评论 #40575366 未加载
rwmj12 个月前
<i>&gt; After reporting the vulnerability to Cox, they investigated if the specific vector had ever been maliciously exploited in the past and found no history of abuse</i><p>Would you trust a thing they say? It seems their whole network is swiss cheese.
评论 #40572525 未加载
评论 #40573653 未加载
评论 #40573176 未加载
stonks12 个月前
Many routers require manual firmware updates. GL.iNet routers had several RCE (Remote Code Execution) vulnerabilities within the last 6 months. I advise you to have a quick look in your own router to ensure its not hacked, and possibly upgrade firmware.<p>As a typical user the noticeable symptoms for me were: - internet speed noticeably slows down - WiFi signal drops and personal devices either don&#x27;t see it, or struggle to connect. At the same time the router is still connected to the internet - router&#x27;s internal admin page (192.168.8.1) stopped responding<p>I imagine many users haven&#x27;t updated their routers and thus may be hacked. In my case the hacker installed Pawns app from IPRoyal, which makes the router a proxy server and lets hacker and IPRoyal make money. The hacker also stole system logs containing information about who and when they use the device, whether any NAS is attached. They also had a reverse shell.<p>Solution: 1. Upgrade firmware to ensure these vulnerabilities are patched. 2. Then wipe the router to remove the actual malware. 3. Then disable SSH access, e.g. for GL.iNet routers that&#x27;s possible within the Luci dashboard. 4. Afterwards disable remote access to the router, e.g. by turning Dynamic DNS off in GL.iNet. If remote access is needed, consider Cloudflare Tunnel or Zero Trust or similar. There is also GoodCloud, ZeroTier, Tailscale, etc. I am not too sure what they all do and which one would be suitable for protected access remotely. If anyone has advice, I would appreciate a comment.<p>Consider avoiding GL.iNet routers. They do not follow principle of least privilege (PoLP) - router runs processes using root user by default. SSH is also enabled by default (with root access), anyone can try to bruteforce in (10 symbol password consisting of [0-9A-Z] and possibly might be more predictable). I set mine to only allow ssh keys rather than a password to prevent that. Despite running OpenWrt they are actually running their own flavor of OpenWrt. So upgrading from OpenWrt 21.02 to 23.05 is not possible at the moment.
评论 #40577751 未加载
daneel_w12 个月前
<i>&gt; &quot;...and found no history of abuse...&quot;</i><p>Because they didn&#x27;t have enough logging or auditing to start with, or no logs or audit data left since the hack.
评论 #40573529 未加载
评论 #40577186 未加载
评论 #40575386 未加载
mavamaarten12 个月前
What sort of authentication system just lets calls through randomly sometimes... The incompetence!
评论 #40571778 未加载
评论 #40574166 未加载
评论 #40573806 未加载
评论 #40572117 未加载
评论 #40572505 未加载
评论 #40575960 未加载
underlogic12 个月前
Did they *<i>pay*</i> him? He kind of saved them, tipped them off to a complete compromise of their security infrastructure which was not trivial to discover. Looks like he got nothing in return for &quot;doing the right thing&quot;. How insulting is that? What is their perception of someone walking in to their offices with this essential information? I guarantee his self image and their perception are very different. They see an overly caffeinated attention seeking &quot;nerd&quot; just handed them a 300k exploit in exchange for a gold star and then they ran like smeg to cover their asses and take all the credit internally. He feels like superman, goes home to his basement apt, microwaves some noodles and writes a blogpost. This is a perfect example why you never, never report a 0day.
评论 #40577628 未加载
评论 #40580138 未加载
评论 #40579217 未加载
mannyv12 个月前
An open question is still: how were the attackers able to grab his HTTP traffic?<p>Some CPEs have a cloud Wireshark-like capability for debugging. I&#x27;m not sure if those are even on the Cox production firmware images. Usually there&#x27;s a set of firmware for production and a set for test (which obviously makes it hard to test for problems in production).<p>I suppose Cox could do a check to see what firmware versions are out there. ISPs can auto-upgrade firmware that doesn&#x27;t match a specific firmware revision, and this was a Cox modem so they probably have firmware for it. So if it was a debug firmware how did it get there and survive?
评论 #40578658 未加载
评论 #40577768 未加载
评论 #40575412 未加载
megous12 个月前
One of the reasons to not be excited about ISP provided cable modems with WiFi functionality and to have good endpoint&#x2F;service security on your LAN. (TLS, DNS over TLS at least accross the modem&#x2F;ISP)<p>I just put it in bridge mode, disable wifi, and all network functionality is served by my own devices.<p>The last modem I rented from ISP, the ISP didn&#x27;t bother with any firmware updates for ~10 years. It was rock stable because of that, though. :)
评论 #40571827 未加载
评论 #40572057 未加载
评论 #40572822 未加载
评论 #40573546 未加载
cdaringe12 个月前
Nightmare fuel. Giant tech company, giant vuln. There’s so much to say, but more than anything Im just upset. The article and this dude are amazing. The exploit is not excusable.
lanrat12 个月前
I observed very similar behavior a few years back when transferring files between two servers under my control on different parts of a large university network.<p>We also initially thought we were the subject of a breach, but after the investigation we determined that the network&#x27;s IDS was monitoring all traffic, and upon certain triggers, would make identical requests from external networks.<p>We found a way to identify all other similar IDSs across the internet and even &quot;weaponize&quot; this behavior. We ended up writing a paper on it: <a href="https:&#x2F;&#x2F;ian.ucsd.edu&#x2F;papers&#x2F;cset2023_fireye.pdf" rel="nofollow">https:&#x2F;&#x2F;ian.ucsd.edu&#x2F;papers&#x2F;cset2023_fireye.pdf</a>
peter_d_sherman12 个月前
Observation: The root of this problem is NOT because Cox&#x27;s engineering practices lacked a comprehensive enough security review process to find and fix security vulnerabilities prior to them being discovered post deployment (&quot;hindsight is always 20&#x2F;20&quot; as they say), but rather because there was (and still is) an <i>Information Asymmetry</i> between Cox and Cox&#x27;s customers, i.e., in terms of complete knowledge of how Cox&#x27;s devices actually work under the hood...<p>Although, in fairness to Cox, this <i>Information Asymmetry</i> -- also exists between most companies that produce tech consumer goods and most tech consumers (i.e., is it really a big deal if most other big tech companies engage in the same practices?), with the occasional exception of the truly rare, completely transparent, 100% Open Source Hardware, 100% Open Source Software company...<p><a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Information_asymmetry" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Information_asymmetry</a><p>Anyway, a very interesting article!
mrbluecoat12 个月前
Great article, but unfortunately a determined threat actor would just go to the source and get a remote job as a Cox technician to gain access to millions of routers to add to their botnet. A real solution by the ISP would be to implement a software (or, preferably, hardware) setting that prevents remote access by default unless explicitly enabled by the customer. That approach would slow a social engineering campaign and limit the scope of a hack like this.
fellerts12 个月前
Great read, I loved following your thought process as you kept digging.<p>At what point did you inform Cox about your findings? It doesn&#x27;t sound like you were ever given the green light to poke at their management platform. Isn&#x27;t work like this legally dubious, even if it is done purely in white-hat fashion?
评论 #40571993 未加载
评论 #40571994 未加载
zaptrem12 个月前
Why do y’all think the attacker was replying all of his requests? Could they be probing for unintentionally exposed endpoints themselves?
评论 #40572622 未加载
评论 #40572205 未加载
评论 #40575646 未加载
评论 #40572218 未加载
goshx12 个月前
It&#x27;s unbelievable that Cox offers no compensation or reward for incredible work like this.
biosboiii12 个月前
Holy hell, but how are your laws in the US aligned so doing something like this is okay?<p>In Germany you would get minimum 3 years in jail for this, people got in front of court for way way way way less.
评论 #40572518 未加载
评论 #40573233 未加载
评论 #40572475 未加载
评论 #40574793 未加载
评论 #40579980 未加载
TeMPOraL12 个月前
Great writeup. There&#x27;s just one thing I don&#x27;t get: the auth part. It seems the author managed to access protected endpoints without any auth, by just repeating the same request over and over until the endpoint randomly accepted it. The part that confuses me is, <i>how could that possibly happen</i>? What possible architecture could this system have to enable this specific failure mode?<p>I struggle to think of anything, short of auth handling being a separate service injected between a load balancer and the API servers, and someone somehow forgot to include that in autoscaling config; but surely this is not how you do things, is it?
评论 #40584458 未加载
评论 #40580750 未加载
mannyv12 个月前
The intermittent auth thing in &#x2F;profilesearch is a sign that they&#x27;re round-robinning the servers and misconfigured one.<p>Also, it looks like he hit a front-end API that drives the TR-069 backend. Changing the WiFi SSID is a long way from being able to &quot;...execute commands on the device&quot;
评论 #40575387 未加载
评论 #40575228 未加载
longsword12 个月前
i&#x27;m really glad that i can use my own modem. In germany every ISP is by law required to accept self brought modems. They can&#x27;t force you to use their often shitty hardware. My current modem&#x2F;router is up for 3 months without a single interruption to my connection.
评论 #40575992 未加载
评论 #40573834 未加载
评论 #40574523 未加载
评论 #40576842 未加载
psd112 个月前
I see arguments in favour of tr069, but it&#x27;s the mechanism that BT used to reboot my modem every night at 3am. I hate ISPs.
评论 #40575369 未加载
评论 #40573096 未加载
wouldbecouldbe12 个月前
This is seems like a huge vulnerability, are there any legal repercussion that happens in those situations?
评论 #40572479 未加载
taink12 个月前
<p><pre><code> One of the things I&#x27;ll never understand was why the attacker was replaying my traffic? They were clearly in my network and could access everything without being detected, why replay all the HTTP requests? So odd. </code></pre> I was thinking about this while reading. My guess is that the vulnerability was limited to reading incoming requests (to the modem) or something along those lines, not full control of the network. Replaying the requests is a good way to get both ends of the traffic if you can only access one. For instance, a login + password being authenticated. Just a thought!<p>EDIT: I&#x27;d be hard-pressed to know how one could exploit this, given TLS would encrypt the requests. Maybe they&#x27;re counting on using badly encrypted requests, encrypted with e.g. TLSv1.0?
thecodemonkey12 个月前
It&#x27;s easy to hate on big companies. But can we just applaud Cox for having patched this within a day? That&#x27;s incredible.
评论 #40573332 未加载
评论 #40571797 未加载
评论 #40571816 未加载
评论 #40578858 未加载
arrty8812 个月前
&gt; One of the things I&#x27;ll never understand was why the attacker was replaying my traffic? They were clearly in my network and could access everything without being detected, why replay all the HTTP requests? So odd.<p>Did you determine if POSTs were replayed? As in, logging into accounts and sending payment info and account info?
Namidairo12 个月前
&gt; Somehow, someone was intercepting and replaying the web traffic from likely every single device on my home network.<p>Normally I&#x27;d laugh and assume device compromise but...<p>The largest ISP in Australia (Telstra) got caught doing exactly this over a decade ago. People got extra paranoid when they noticed the originating IP was from Rackspace as opposed to within Telstra. Turned out to be a filter vendor scraping with dubious acceptance from customers. The ToS was quietly and promptly updated.
EligibleDecoy12 个月前
My bet on the replays was that the attacker misconfigured their payload or something and it was meant to replay command and control requests to obfuscate where the C2 server was
gianpaj12 个月前
This reminded me to turn off &quot;privacy settings&quot; to &quot;keep your vehicle in good condition and observe the vehicle&#x27;s health&quot; on my Volvo XC40 after the mechanics asked me to turn it on yesterday during the yearly maintenance. I don&#x27;t know if they can change some settings remotely, but I prefer to be cautious
jokoon12 个月前
I remember creating some webserver at work years ago, and I saw a router querying it. I warned the company admin.<p>Also, my wifi firmware occasionally crashes and needs to be restarted.<p>I don&#x27;t work in cyber security or on anything sensitive, but if I was told I&#x27;m under surveillance by some government or some criminal, I would not be surprised.
__turbobrew__12 个月前
Another reason to not use ISP provided hardware. I have never had issues using my own OpenBSD box as a router.
Heidaradar12 个月前
I love how well he explains it, even to someone like me who knows p much nothing about cybersecurity.
metadat12 个月前
<i>&gt; there were about 700 different API calls..</i><p>That&#x27;s more API endpoints than some first tier public clouds, wow. For a modem.<p>Somebody wanted (and sorta deserves) promo..<p>But also not, because the whole platform turned out to be incredibly insecure! Egregious!!!
_benj12 个月前
Wow! I just what a high a security researcher would feel while performing this research and keep finding open doors!<p>I wonder if it’s a mix of exhilaration and being terrified!
webninja12 个月前
Are there any creation of new laws or removal of hindering laws that would facilitate the fixing of these devastating security vulnerabilities?
worewood12 个月前
Not trusting the modems we&#x27;re given is a damn good reason to use a VPN, as opposed to the market bulsshsait the VPN companies usually propagate
amluto12 个月前
Some CPE exposes an API on the LAN side, and some of these APIs aren’t protected against CSRF. I wonder whether the modem in question is vulnerable.
评论 #40575569 未加载
codedokode12 个月前
Replaying requests might be not a malicious attacker, but simply an ISP wishing to know and sell customer&#x27;s interests.
system212 个月前
It was so fun to read this. I am also surprised COX hot patched it within a day.
kernal12 个月前
Moral of the story - never turn on remote access on your modem.
jokoon12 个月前
What were those fbi redacted things? Were those backdoors?
评论 #40572156 未加载
评论 #40572159 未加载
andrewstuart12 个月前
&gt;&gt; Authenticate your access patterns.<p>What does this mean?
sammy225512 个月前
No payout?
评论 #40576661 未加载
syngrog6612 个月前
WARNING: nerd sniping. lol
wiz21c12 个月前
page is now 404 :-&#x2F;
评论 #40572496 未加载
评论 #40572467 未加载