by albinowax_ on 6/3/24, 6:51 AM with 272 comments
by phs318u on 6/4/24, 6:07 AM
by Bluecobra on 6/4/24, 1:00 PM
Thank god most things use HTTPS these days.
by kn100 on 6/4/24, 1:20 PM
I can't say for certain, and the OP if they're here I'd love for you to validate this - but I'm not convinced requests to the local admin interface on these Nokia routers is properly authenticated. I know this because I recently was provisioned with one and found there were certain settings I could not change as a regular admin, and I was refused the super admin account by the ISP. turns out you could just inspector hack the page to undisable the fields and change the fields yourself, and the API would happily accept them.
if this is the case, and an application can be running inside your network, it wouldn't be hard to compromise the router that way, but seems awfully specific!
by rwmj on 6/4/24, 9:17 AM
Would you trust a thing they say? It seems their whole network is swiss cheese.
by stonks on 6/4/24, 3:27 PM
As a typical user the noticeable symptoms for me were: - internet speed noticeably slows down - WiFi signal drops and personal devices either don't see it, or struggle to connect. At the same time the router is still connected to the internet - router's internal admin page (192.168.8.1) stopped responding
I imagine many users haven't updated their routers and thus may be hacked. In my case the hacker installed Pawns app from IPRoyal, which makes the router a proxy server and lets hacker and IPRoyal make money. The hacker also stole system logs containing information about who and when they use the device, whether any NAS is attached. They also had a reverse shell.
Solution: 1. Upgrade firmware to ensure these vulnerabilities are patched. 2. Then wipe the router to remove the actual malware. 3. Then disable SSH access, e.g. for GL.iNet routers that's possible within the Luci dashboard. 4. Afterwards disable remote access to the router, e.g. by turning Dynamic DNS off in GL.iNet. If remote access is needed, consider Cloudflare Tunnel or Zero Trust or similar. There is also GoodCloud, ZeroTier, Tailscale, etc. I am not too sure what they all do and which one would be suitable for protected access remotely. If anyone has advice, I would appreciate a comment.
Consider avoiding GL.iNet routers. They do not follow principle of least privilege (PoLP) - router runs processes using root user by default. SSH is also enabled by default (with root access), anyone can try to bruteforce in (10 symbol password consisting of [0-9A-Z] and possibly might be more predictable). I set mine to only allow ssh keys rather than a password to prevent that. Despite running OpenWrt they are actually running their own flavor of OpenWrt. So upgrading from OpenWrt 21.02 to 23.05 is not possible at the moment.
by daneel_w on 6/4/24, 10:07 AM
Because they didn't have enough logging or auditing to start with, or no logs or audit data left since the hack.
by mavamaarten on 6/4/24, 7:41 AM
by underlogic on 6/4/24, 6:36 PM
by mannyv on 6/4/24, 3:04 PM
Some CPEs have a cloud Wireshark-like capability for debugging. I'm not sure if those are even on the Cox production firmware images. Usually there's a set of firmware for production and a set for test (which obviously makes it hard to test for problems in production).
I suppose Cox could do a check to see what firmware versions are out there. ISPs can auto-upgrade firmware that doesn't match a specific firmware revision, and this was a Cox modem so they probably have firmware for it. So if it was a debug firmware how did it get there and survive?
by megous on 6/4/24, 7:43 AM
I just put it in bridge mode, disable wifi, and all network functionality is served by my own devices.
The last modem I rented from ISP, the ISP didn't bother with any firmware updates for ~10 years. It was rock stable because of that, though. :)
by cdaringe on 6/4/24, 3:44 PM
by lanrat on 6/5/24, 3:48 PM
We also initially thought we were the subject of a breach, but after the investigation we determined that the network's IDS was monitoring all traffic, and upon certain triggers, would make identical requests from external networks.
We found a way to identify all other similar IDSs across the internet and even "weaponize" this behavior. We ended up writing a paper on it: https://ian.ucsd.edu/papers/cset2023_fireye.pdf
by peter_d_sherman on 6/4/24, 1:04 PM
Although, in fairness to Cox, this Information Asymmetry -- also exists between most companies that produce tech consumer goods and most tech consumers (i.e., is it really a big deal if most other big tech companies engage in the same practices?), with the occasional exception of the truly rare, completely transparent, 100% Open Source Hardware, 100% Open Source Software company...
https://en.wikipedia.org/wiki/Information_asymmetry
Anyway, a very interesting article!
by mrbluecoat on 6/4/24, 2:19 PM
by fellerts on 6/4/24, 7:31 AM
At what point did you inform Cox about your findings? It doesn't sound like you were ever given the green light to poke at their management platform. Isn't work like this legally dubious, even if it is done purely in white-hat fashion?
by zaptrem on 6/4/24, 8:51 AM
by goshx on 6/4/24, 4:18 PM
by biosboiii on 6/4/24, 9:38 AM
In Germany you would get minimum 3 years in jail for this, people got in front of court for way way way way less.
by TeMPOraL on 6/4/24, 8:46 PM
I struggle to think of anything, short of auth handling being a separate service injected between a load balancer and the API servers, and someone somehow forgot to include that in autoscaling config; but surely this is not how you do things, is it?
by mannyv on 6/4/24, 2:45 PM
Also, it looks like he hit a front-end API that drives the TR-069 backend. Changing the WiFi SSID is a long way from being able to "...execute commands on the device"
by longsword on 6/4/24, 12:21 PM
by psd1 on 6/4/24, 10:57 AM
by wouldbecouldbe on 6/4/24, 8:49 AM
by taink on 6/4/24, 12:44 PM
One of the things I'll never understand was why the attacker was replaying my traffic? They were clearly in my network and could access everything without being detected, why replay all the HTTP requests? So odd.
I was thinking about this while reading. My guess is that the vulnerability was limited to reading incoming requests (to the modem) or something along those lines, not full control of the network. Replaying the requests is a good way to get both ends of the traffic if you can only access one. For instance, a login + password being authenticated. Just a thought!EDIT: I'd be hard-pressed to know how one could exploit this, given TLS would encrypt the requests. Maybe they're counting on using badly encrypted requests, encrypted with e.g. TLSv1.0?
by thecodemonkey on 6/4/24, 7:29 AM
by arrty88 on 6/4/24, 12:30 PM
Did you determine if POSTs were replayed? As in, logging into accounts and sending payment info and account info?
by Namidairo on 6/5/24, 2:27 PM
Normally I'd laugh and assume device compromise but...
The largest ISP in Australia (Telstra) got caught doing exactly this over a decade ago. People got extra paranoid when they noticed the originating IP was from Rackspace as opposed to within Telstra. Turned out to be a filter vendor scraping with dubious acceptance from customers. The ToS was quietly and promptly updated.
by EligibleDecoy on 6/4/24, 2:27 PM
by gianpaj on 6/5/24, 9:39 AM
by jokoon on 6/4/24, 8:46 AM
Also, my wifi firmware occasionally crashes and needs to be restarted.
I don't work in cyber security or on anything sensitive, but if I was told I'm under surveillance by some government or some criminal, I would not be surprised.
by __turbobrew__ on 6/4/24, 8:41 PM
by Heidaradar on 6/4/24, 11:07 AM
by metadat on 6/5/24, 1:13 AM
That's more API endpoints than some first tier public clouds, wow. For a modem.
Somebody wanted (and sorta deserves) promo..
But also not, because the whole platform turned out to be incredibly insecure! Egregious!!!
by _benj on 6/4/24, 7:52 PM
I wonder if it’s a mix of exhilaration and being terrified!
by webninja on 6/5/24, 1:54 AM
by worewood on 6/4/24, 5:00 PM
by amluto on 6/4/24, 2:11 PM
by codedokode on 6/4/24, 6:42 PM
by system2 on 6/5/24, 12:37 AM
by kernal on 6/4/24, 3:37 PM
by jokoon on 6/4/24, 8:47 AM
by andrewstuart on 6/4/24, 12:31 PM
What does this mean?
by sammy2255 on 6/4/24, 2:41 PM
by syngrog66 on 6/4/24, 2:44 PM
by wiz21c on 6/4/24, 9:21 AM