Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Home Routers Under Attack by NSA-Spawned Malware: What to D
tomsguide.com ^ | 11/29/2018 | Marshall Honorof · Editor

Posted on 11/30/2018 6:44:46 AM PST by BenLurkin

What you should do is factory-reset your router, disable UPnP, then check for firmware updates, since some companies have patched the vulnerability out. This won’t fix any other compromised systems, but it’s a necessary first step.

After that, you can factory-reset any other internet-connected device that you’re concerned about. You might also want to just buy a new router, as recent models do not appear to be susceptible to this type of attack.

This information comes from a blog post entitled "UPnProxy: EternalSilence" penned by researchers at Cambridge, Massachusetts-based data management firm Akamai.

Cybercriminals have learned how to take advantage of the UPnP protocols on older routers and get past the routers to directly attack Windows PCs on home and small-business networks. Akamai has dubbed this flaw “UPnProxy.” The most recent slew of attacks comes from an exploit that Akamai calls “EternalSilence” in a nod to the NSA-developed “Eternal” family of malicious code injections.

The bottom line is clear enough: Your router is the gateway to every connected device in your home, from your computer, to your phone, to your smart TV, to your smart light bulbs. If your router has been compromised, it’s possible that every other device in your home has followed suit.

Unfortunately, checking to see if you’ve been infected is hard, as antivirus software doesn’t normally scan routers. (A few products have begun to do so.) If malware makes it as far as your computer or game console, though, it’ll be easier to notice.

Dozens of routers could fall prey to this scheme, including models from Asus, D-Link and Netgear. The majority of models listed, though, are business-oriented devices that are popular in Europe and Asia, such as those from Axler, EFM, Netis and Ubiquiti.

(Excerpt) Read more at tomsguide.com ...


TOPICS: Computers/Internet
KEYWORDS: kmg; malware; routers; spyware; tomsguide
Navigation: use the links below to view more comments.
first 1-2021-4041-50 next last

1 posted on 11/30/2018 6:44:46 AM PST by BenLurkin
[ Post Reply | Private Reply | View Replies]

To: KC_Lion; Lazamataz

Of possible interests.


2 posted on 11/30/2018 6:45:34 AM PST by BenLurkin (The above is not a statement of fact. It is either satire or opinion. Or both.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: BenLurkin

Your Tax Dollars once again at work.


3 posted on 11/30/2018 6:50:47 AM PST by Buckeye McFrog
[ Post Reply | Private Reply | To 2 | View Replies]

To: BenLurkin

My Netgear router is 3 or so years old, so I guess it’s vulnerable. We have to get the enclosed, boxy wi-fi routers with the hidden antennas because the cat chews up the antennas if they are exposed.


4 posted on 11/30/2018 6:51:31 AM PST by Stevenc131
[ Post Reply | Private Reply | To 1 | View Replies]

To: BenLurkin

The most recent slew of attacks comes from an exploit that Akamai calls “EternalSilence” in a nod to the NSA-developed “Eternal” family of malicious code injections.

- -

Yet another case where a U.S. spy agency is hurting its own citizens. Between outright incompetence, such as ignoring warnings about the Boston Marathon bomber, to culpability, like the Las Vagas mass shooting, our spy agencies are a clear and present danger to the public.


5 posted on 11/30/2018 6:53:45 AM PST by Flick Lives
[ Post Reply | Private Reply | To 1 | View Replies]

To: Stevenc131

6 posted on 11/30/2018 6:55:40 AM PST by BenLurkin (The above is not a statement of fact. It is either satire or opinion. Or both.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: BenLurkin

It’s impossible to tell if you’re infected - but the answer is to go out, spend $100 and buy a new router.

Lemme think....

Nah.


7 posted on 11/30/2018 6:57:12 AM PST by Pravious
[ Post Reply | Private Reply | To 1 | View Replies]

To: BenLurkin

bookmark


8 posted on 11/30/2018 7:04:01 AM PST by sjm_888
[ Post Reply | Private Reply | To 1 | View Replies]

To: BenLurkin; Army Air Corps
Oh Great.

Nothing is safe.

9 posted on 11/30/2018 7:06:18 AM PST by KC_Lion (If you want on First Lady Melania's, Ivanka Trump's or Sarah Palin's Ping Lists, just let me know.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: BenLurkin

Heh, another Windows problem eh? Don’t see any Apple products listed in the article.


10 posted on 11/30/2018 7:08:27 AM PST by Afterguard (Deplorable me!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Flick Lives

Agency executives and their sycophant bureaucrats put their interests and careers first. They don’t have much fear or incentive to do otherwise.

Standards for accountability, professional integrity and performance expectations have to start at the top and be enforced down through the cabinet members and be driven into the executive branch bureaucracies. The problem is, no one in government is ever held accountable for anything.


11 posted on 11/30/2018 7:14:06 AM PST by Starboard
[ Post Reply | Private Reply | To 5 | View Replies]

To: BenLurkin
Yet another reason that I won't own a rooter* that can't be flashed with one of the high-zoot third-party firmware alternatives, such as DD-WRT or Tomato.

My personal favorite is DD-WRT but their price of admission is pretty dear because their user forum is famously caustic (but they seem to be getting less belligerent), which can make getting your foot in the door exasperating.


* "router" as pronounced by the typical Bangalorean tech support agent.

12 posted on 11/30/2018 7:14:16 AM PST by Paal Gulli
[ Post Reply | Private Reply | To 1 | View Replies]

To: Afterguard

“Heh, another Windows problem eh? Don’t see any Apple products listed in the article.”

Perhaps it’s because Apple does not make routers anymore...


13 posted on 11/30/2018 7:18:38 AM PST by BBB333 (The Power Of Trump Compels You!)
[ Post Reply | Private Reply | To 10 | View Replies]

To: Afterguard

> Heh, another Windows problem eh? Don’t see any Apple
> products listed in the article.

I don’t see linux listed, either, and you can get a linux device for a LOT less than an aplle anything.


14 posted on 11/30/2018 7:19:24 AM PST by Westbrook (Children do not divide your love, they multiply it)
[ Post Reply | Private Reply | To 10 | View Replies]

To: BenLurkin
UPnp was an attempt by M$ to make networking easier. Which it did. For the bad guys.

For your computer, go here:

https://www.grc.com/unpnp/unpnp.htm

Download and run the tiny program and secure your computer.

Securing the router is a bit harder but the theory is the same.

Here is another link to test UPnP on your network:

https://www.grc.com/x/ne.dll?bh0bkyd2

For the old timers here, this is all Steve Gibson stuff, maker of SpinRite.

And it is all free.

15 posted on 11/30/2018 7:22:00 AM PST by texas booster (Join FreeRepublic's Folding@Home team (Team # 36120) Cure Alzheimer's!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Pravious
I also should note that several of the newer rooters come from the factory with a derivative of the DD-WRT or Tomato third-party firmwares pre-installed. My main WiFi rooter at the moment is an ASUS that came with Tomato installed (which I have updated with a 'fork' of that firmware that takes me still a little further off the beaten path).


"It’s impossible to tell if you’re infected - but the answer is to go out, spend $100 and buy a new router...."

That is nowhere stated. The article further states that a "factory reset" will remove the infection. So easy a cave man could do it.

16 posted on 11/30/2018 7:29:13 AM PST by Paal Gulli
[ Post Reply | Private Reply | To 7 | View Replies]

To: texas booster

Bkmrk.


17 posted on 11/30/2018 7:31:24 AM PST by RushIsMyTeddyBear (:¬| Beep beep....boop boop)
[ Post Reply | Private Reply | To 15 | View Replies]

To: Afterguard
disable UPnP

Or...disable Windows. Get Linux. The ultimate Windows Service Pack.

18 posted on 11/30/2018 7:34:50 AM PST by Bloody Sam Roberts (Perhaps we should be less concerned about who we might offend and more concerned with who we inspire)
[ Post Reply | Private Reply | To 10 | View Replies]

To: dayglored

Fyi


19 posted on 11/30/2018 7:36:28 AM PST by House Atreides (BOYCOTT the NFL, its products and players 100% - PERMANENTLY)
[ Post Reply | Private Reply | To 1 | View Replies]

To: texas booster

I got:

Your Internet port 139 does not appear to exist!
One or more ports on this system are operating in FULL STEALTH MODE! Standard Internet behavior requires port connection attempts to be answered with a success or refusal response. Therefore, only an attempt to connect to a nonexistent computer results in no response of either kind. But YOUR computer has DELIBERATELY CHOSEN NOT TO RESPOND (that’s very cool!) which represents advanced computer and port stealthing capabilities. A machine configured in this fashion is well hardened to Internet NetBIOS attack and intrusion.
Unable to connect with NetBIOS to your computer.
All attempts to get any information from your computer have FAILED. (This is very uncommon for a Windows networking-based PC.) Relative to vulnerabilities from Windows networking, this computer appears to be VERY SECURE since it is NOT exposing ANY of its internal NetBIOS networking protocol over the Internet.

And the other tests had everything “stealth”.


20 posted on 11/30/2018 7:38:12 AM PST by Salamander (My Soul's On Fire...)
[ Post Reply | Private Reply | To 15 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-50 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson