Slo-Tech - Po internetu se je začel širiti zelo nenavaden črv, ki cilja na Linksysove usmerjevalnike in za zdaj ne počne nič drugega, razen da se širi karseda hitro. Črv napada številne modele Linksysovih usmerjevalnikov (potrjeno E4200, E3200, E3000, E2500, E2100L, E2000, E1550, E1500, E1200, E1000, E900 ter nekateri WRT in Valet), pri čemer pa so usmerjevalniki z najnovejšo strojno programsko opremo (firmware) varni (različica 2.0.06). Nekateri modeli so sicer že tako stari, da niso več podprti in morajo uporabljati starejše, ranljive verzije.
Črva so odkrili pri ponudniki dostopa do interneta v Wyomingu, ker je črv zasedel vse razpoložljive kapacitete in upočasnil njihovo omrežje. Ko črv okuži usmerjevalnik, začne prek vrat 8080 in 80 preverjati, ali so na internetu drugi usmerjevalniki, ki bi jih lahko okužil. Nanje se priključi z zlorabo HNAP (Home Network Administration Protocol), ki je namenjen oddaljenim posodobitvam in konfiguriranju usmerjevlaniku, ki jih izvaja lokalni ponudnik dostopa do interneta. Črv s preverjanjem, na katerih naslovih dobi odgovor na zahtevke po povezavi HNAP, ugotovi, kje so še ostali usmerjevalniki. Nanje se potem poveže prek ranljivosti v eni izmed CGI-skript.
Ko črv okuži usmerjevalnik, za zdaj nima zločestih namenov, čeprav ima nekaj vnosov, ki bi lahko kazali na klicanje krmilno-nadzornih strežnikov. Večino svojega časa preživi v iskanju drugih usmerjevalnikov (išče v 670 omrežjih, ki pripadajo ISP-jem v več državah), ki bi jih še lahko okužil. Sicer pa nastavi DNS-strežnike na 8.8.8.8 in 8.8.4.4. To so IP-ji Googlovih javnih DNS-strežnikov. Zakaj to stori, ni jasno. Ker črv vsebuje nekaj slik iz filma The Moon, se ga je prijelo isto ime. Ponovni zagon usmerjevalnika okužbo odstrani. Raziskovalci si še belijo glavo z vprašanjem, čemu služi ta črv in kaj se z njim preizkuša. Morebiti gre namreč za generalko pred resnim napadom.
Da je vaš usmerjevalnik okužen, lahko spoznate po visokem izhodnem prometu na vratih 8080 in 80 ter nenavadnih vhodnih povezavah na vratih, ki so manjša od 1024. Ranljivost pa lahko preverite s spodnjim ukazom. Če vrne ustrezen odziv v formatu XML, je usmerjevalnik potencialno ranljiv.
The worm only scans port 80 and 8080 (http and https). Changing the port will prevent this attack. Restricting access to the admin interface by IP address will help as well.
Mirno gledamo, kako naš svet propada,
saj za časa našega življenja ne bo popolnoma propadel.
Različica firmwara navedenega v novici (2.0.06) je tako poimenovana samo za router E1200. Za druge so zadnje različice poimenovane z drugimi številkami, kolikor sem zdajle preletel.
Jaz imam E3200 z zadnjim firmwarom, ampak je bil izdan maja 2012, tako da najbrž ni črv-proof. Je pa Remote admin že od vedno izklopljen.
Zanimivo. V soboto sem imel problem z dvema routerjema istega slo ponudnika interneta. http ni delal drugo pa je nekako delovalo. Po resetu vse normalno.
Sicer pa že dlje časa vsak dan v LOG-ih berem te zadeve...
Feb 13 04:39:56 unknown authpriv.info dropbear[1610]: Child connection from 222.186.62.71:3654 Feb 13 04:40:22 unknown authpriv.warn dropbear[1610]: Bad password attempt for 'root' from 222.186.62.71:3654 Feb 13 04:40:26 unknown authpriv.warn dropbear[1610]: Bad password attempt for 'root' from 222.186.62.71:3654 Feb 13 04:41:05 unknown authpriv.warn dropbear[1610]: Bad password attempt for 'root' from 222.186.62.71:3654 Feb 13 04:41:49 unknown authpriv.warn dropbear[1610]: Bad password attempt for 'root' from 222.186.62.71:3654 Feb 13 04:41:49 unknown authpriv.warn dropbear[1610]: Bad password attempt for 'root' from 222.186.62.71:3654 Feb 13 04:41:54 unknown authpriv.warn dropbear[1610]: Bad password attempt for 'root' from 222.186.62.71:3654 Feb 13 04:41:55 unknown authpriv.warn dropbear[1610]: Bad password attempt for 'root' from 222.186.62.71:3654 Feb 13 04:41:56 unknown authpriv.warn dropbear[1610]: Bad password attempt for 'root' from 222.186.62.71:3654 Feb 13 04:41:58 unknown authpriv.warn dropbear[1610]: Bad password attempt for 'root' from 222.186.62.71:3654 Feb 13 04:41:59 unknown authpriv.warn dropbear[1610]: Bad password attempt for 'root' from 222.186.62.71:3654 Feb 13 04:41:59 unknown authpriv.info dropbear[1610]: Exit before auth (user 'root', 10 fails): Max auth tries reached - user 'root' from 222.186.62.71:3654 Feb 13 04:42:00 unknown authpriv.info dropbear[1611]: Child connection from 222.186.62.71:1488 Feb 13 04:42:11 unknown authpriv.warn dropbear[1611]: Bad password attempt for 'root' from 222.186.62.71:1488 Feb 13 04:42:11 unknown authpriv.warn dropbear[1611]: Bad password attempt for 'root' from 222.186.62.71:1488 Feb 13 04:42:12 unknown authpriv.warn dropbear[1611]: Bad password attempt for 'root' from 222.186.62.71:1488 Feb 13 04:42:13 unknown authpriv.warn dropbear[1611]: Bad password attempt for 'root' from 222.186.62.71:1488 Feb 13 04:42:16 unknown authpriv.warn dropbear[1611]: Bad password attempt for 'root' from 222.186.62.71:1488 Feb 13 04:42:17 unknown authpriv.warn dropbear[1611]: Bad password attempt for 'root' from 222.186.62.71:1488 Feb 13 04:42:18 unknown authpriv.warn dropbear[1611]: Bad password attempt for 'root' from 222.186.62.71:1488 Feb 13 04:42:19 unknown authpriv.warn dropbear[1611]: Bad password attempt for 'root' from 222.186.62.71:1488 Feb 13 04:42:22 unknown authpriv.warn dropbear[1611]: Bad password attempt for 'root' from 222.186.62.71:1488 Feb 13 04:42:26 unknown authpriv.warn dropbear[1611]: Bad password attempt for 'root' from 222.186.62.71:1488 Feb 13 04:42:26 unknown authpriv.info dropbear[1611]: Exit before auth (user 'root', 10 fails): Max auth tries reached - user 'root' from 222.186.62.71:1488 Feb 13 04:42:34 unknown authpriv.info dropbear[1612]: Child connection from 222.186.62.71:1935 Feb 13 04:43:45 unknown authpriv.warn dropbear[1612]: Bad password attempt for 'root' from 222.186.62.71:1935 Feb 13 04:43:46 unknown authpriv.warn dropbear[1612]: Bad password attempt for 'root' from 222.186.62.71:1935 Feb 13 04:43:47 unknown authpriv.warn dropbear[1612]: Bad password attempt for 'root' from 222.186.62.71:1935 Feb 13 04:43:48 unknown authpriv.warn dropbear[1612]: Bad password attempt for 'root' from 222.186.62.71:1935 Feb 13 04:43:49 unknown authpriv.warn dropbear[1612]: Bad password attempt for 'root' from 222.186.62.71:1935 Feb 13 04:43:49 unknown authpriv.warn dropbear[1612]: Bad password attempt for 'root' from 222.186.62.71:1935 Feb 13 04:43:50 unknown authpriv.warn dropbear[1612]: Bad password attempt for 'root' from 222.186.62.71:1935 Feb 13 04:43:51 unknown authpriv.warn dropbear[1612]: Bad password attempt for 'root' from 222.186.62.71:1935 Feb 13 04:43:52 unknown authpriv.warn dropbear[1612]: Bad password attempt for 'root' from 222.186.62.71:1935 Feb 13 04:43:53 unknown authpriv.warn dropbear[1612]: Bad password attempt for 'root' from 222.186.62.71:1935 Feb 13 04:43:53 unknown authpriv.info dropbear[1612]: Exit before auth (user 'root', 10 fails): Max auth tries reached - user 'root' from 222.186.62.71:1935 Feb 13 04:43:54 unknown authpriv.info dropbear[1613]: Child connection from 222.186.62.71:1471 Feb 13 04:44:02 unknown authpriv.warn dropbear[1613]: Bad password attempt for 'root' from 222.186.62.71:1471 Feb 13 04:44:03 unknown authpriv.warn dropbear[1613]: Bad password attempt for 'root' from 222.186.62.71:1471 Feb 13 04:44:03 unknown authpriv.warn dropbear[1613]: Bad password attempt for 'root' from 222.186.62.71:1471 Feb 13 04:44:04 unknown authpriv.warn dropbear[1613]: Bad password attempt for 'root' from 222.186.62.71:1471 Feb 13 04:44:05 unknown authpriv.warn dropbear[1613]: Bad password attempt for 'root' from 222.186.62.71:1471 Feb 13 04:44:06 unknown authpriv.warn dropbear[1613]: Bad password attempt for 'root' from 222.186.62.71:1471 Feb 13 04:44:07 unknown authpriv.warn dropbear[1613]: Bad password attempt for 'root' from 222.186.62.71:1471 Feb 13 04:44:08 unknown authpriv.warn dropbear[1613]: Bad password attempt for 'root' from 222.186.62.71:1471 Feb 13 04:44:09 unknown authpriv.warn dropbear[1613]: Bad password attempt for 'root' from 222.186.62.71:1471 Feb 13 04:44:10 unknown authpriv.warn dropbear[1613]: Bad password attempt for 'root' from 222.186.62.71:1471 Feb 13 04:44:10 unknown authpriv.info dropbear[1613]: Exit before auth (user 'root', 10 fails): Max auth tries reached - user 'root' from 222.186.62.71:1471 Feb 13 04:44:11 unknown authpriv.info dropbear[1614]: Child connection from 222.186.62.71:3208 Feb 13 04:44:16 unknown authpriv.warn dropbear[1614]: Bad password attempt for 'root' from 222.186.62.71:3208 Feb 13 04:44:17 unknown authpriv.warn dropbear[1614]: Bad password attempt for 'root' from 222.186.62.71:3208 Feb 13 04:44:18 unknown authpriv.warn dropbear[1614]: Bad password attempt for 'root' from 222.186.62.71:3208 Feb 13 04:44:19 unknown authpriv.warn dropbear[1614]: Bad password attempt for 'root' from 222.186.62.71:3208 Feb 13 04:44:20 unknown authpriv.warn dropbear[1614]: Bad password attempt for 'root' from 222.186.62.71:3208 Feb 13 04:44:22 unknown authpriv.warn dropbear[1614]: Bad password attempt for 'root' from 222.186.62.71:3208 Feb 13 04:44:23 unknown authpriv.warn dropbear[1614]: Bad password attempt for 'root' from 222.186.62.71:3208 Feb 13 04:44:24 unknown authpriv.warn dropbear[1614]: Bad password attempt for 'root' from 222.186.62.71:3208 Feb 13 04:44:25 unknown authpriv.warn dropbear[1614]: Bad password attempt for 'root' from 222.186.62.71:3208 Feb 13 04:44:25 unknown authpriv.warn dropbear[1614]: Bad password attempt for 'root' from 222.186.62.71:3208 Feb 13 04:44:26 unknown authpriv.info dropbear[1614]: Exit before auth (user 'root', 10 fails): Max auth tries reached - user 'root' from 222.186.62.71:3208 Feb 13 04:44:26 unknown authpriv.info dropbear[1615]: Child connection from 222.186.62.71:1589 Feb 13 04:44:36 unknown authpriv.warn dropbear[1615]: Bad password attempt for 'root' from 222.186.62.71:1589 Feb 13 04:44:37 unknown authpriv.warn dropbear[1615]: Bad password attempt for 'root' from 222.186.62.71:1589 Feb 13 04:44:38 unknown authpriv.warn dropbear[1615]: Bad password attempt for 'root' from 222.186.62.71:1589 Feb 13 04:44:39 unknown authpriv.warn dropbear[1615]: Bad password attempt for 'root' from 222.186.62.71:1589 Feb 13 04:44:40 unknown authpriv.warn dropbear[1615]: Bad password attempt for 'root' from 222.186.62.71:1589 Feb 13 04:44:41 unknown authpriv.warn dropbear[1615]: Bad password attempt for 'root' from 222.186.62.71:1589 Feb 13 04:44:41 unknown authpriv.warn dropbear[1615]: Bad password attempt for 'root' from 222.186.62.71:1589 Feb 13 04:44:44 unknown authpriv.warn dropbear[1615]: Bad password attempt for 'root' from 222.186.62.71:1589 Feb 13 04:44:45 unknown authpriv.warn dropbear[1615]: Bad password attempt for 'root' from 222.186.62.71:1589 Feb 13 04:44:46 unknown authpriv.warn dropbear[1615]: Bad password attempt for 'root' from 222.186.62.71:1589 Feb 13 04:44:46 unknown authpriv.info dropbear[1615]: Exit before auth (user 'root', 10 fails): Max auth tries reached - user 'root' from 222.186.62.71:1589 Feb 13 05:00:01 unknown syslog.info root: -- MARK -- Feb 13 05:02:00 unknown authpriv.info dropbear[1618]: Child connection from 94.22.138.62:38783 Feb 13 05:02:01 unknown authpriv.warn dropbear[1618]: Login attempt for nonexistent user from 94.22.138.62:38783 Feb 13 05:02:02 unknown authpriv.info dropbear[1618]: Exit before auth: Disconnect received Feb 13 05:02:02 unknown authpriv.info dropbear[1619]: Child connection from 94.22.138.62:38855 Feb 13 05:02:03 unknown authpriv.warn dropbear[1619]: Login attempt for nonexistent user from 94.22.138.62:38855 Feb 13 05:02:03 unknown authpriv.info dropbear[1619]: Exit before auth: Disconnect received Feb 13 05:02:04 unknown authpriv.info dropbear[1620]: Child connection from 94.22.138.62:38931 Feb 13 05:02:04 unknown authpriv.warn dropbear[1620]: Login attempt for nonexistent user from 94.22.138.62:38931 Feb 13 05:02:05 unknown authpriv.info dropbear[1620]: Exit before auth: Disconnect received Feb 13 05:49:00 unknown authpriv.info dropbear[1621]: Child connection from 125.65.165.235:44080 Feb 13 05:49:02 unknown authpriv.warn dropbear[1621]: Bad password attempt for 'root' from 125.65.165.235:44080 Feb 13 05:49:03 unknown authpriv.info dropbear[1621]: Exit before auth (user 'root', 1 fails): Disconnect received Feb 13 05:49:03 unknown authpriv.info dropbear[1622]: Child connection from 125.65.165.235:45193 Feb 13 05:49:06 unknown authpriv.warn dropbear[1622]: Bad password attempt for 'root' from 125.65.165.235:45193 Feb 13 05:49:06 unknown authpriv.info dropbear[1622]: Exit before auth (user 'root', 1 fails): Disconnect received Feb 13 05:49:06 unknown authpriv.info dropbear[1623]: Child connection from 125.65.165.235:46301 Feb 13 05:49:09 unknown authpriv.warn dropbear[1623]: Bad password attempt for 'root' from 125.65.165.235:46301 Feb 13 05:49:09 unknown authpriv.info dropbear[1623]: Exit before auth (user 'root', 1 fails): Disconnect received Feb 13 06:00:01 unknown syslog.info root: -- MARK -- Feb 13 06:22:03 unknown authpriv.info dropbear[1626]: Child connection from 222.186.62.42:4530 Feb 13 06:22:07 unknown authpriv.warn dropbear[1626]: Bad password attempt for 'root' from 222.186.62.42:4530 Feb 13 06:22:08 unknown authpriv.warn dropbear[1626]: Bad password attempt for 'root' from 222.186.62.42:4530 Feb 13 06:22:09 unknown authpriv.warn dropbear[1626]: Bad password attempt for 'root' from 222.186.62.42:4530 Feb 13 06:22:09 unknown authpriv.warn dropbear[1626]: Bad password attempt for 'root' from 222.186.62.42:4530 Feb 13 06:22:10 unknown authpriv.warn dropbear[1626]: Bad password attempt for 'root' from 222.186.62.42:4530 Feb 13 06:22:11 unknown authpriv.warn dropbear[1626]: Bad password attempt for 'root' from 222.186.62.42:4530 Feb 13 06:22:11 unknown authpriv.warn dropbear[1626]: Bad password attempt for 'root' from 222.186.62.42:4530 Feb 13 06:22:12 unknown authpriv.warn dropbear[1626]: Bad password attempt for 'root' from 222.186.62.42:4530 Feb 13 06:22:13 unknown authpriv.warn dropbear[1626]: Bad password attempt for 'root' from 222.186.62.42:4530 Feb 13 06:22:14 unknown authpriv.warn dropbear[1626]: Bad password attempt for 'root' from 222.186.62.42:4530 Feb 13 06:22:14 unknown authpriv.info dropbear[1626]: Exit before auth (user 'root', 10 fails): Max auth tries reached - user 'root' from 222.186.62.42:4530
Router je na statičnem Ip-ju in ne vem, ali se sploh da kako znebiti teh poskusov logiranja.
Žal zadevo rabim. Sedaj se, izklopil SSH in zaenkrat pustil Remote Acess do routerja preko brskalnika, če to ne bo pomagalo, pa bom izklopil še remote acess in uporabil VPN za dostop.
Ne moreš na Remote Acessu dovoliti prijavo samo iz določenega ipja (white listanega)? Da za ostale sploh ne dovoli vnosa up.imena & gesla . Upam da nimaš sshja na portu 22.
Vem, da tudi to gre, vendar ne dostopam zmeraj od doma, kjer imam tako dinamičen ip, včasih tudi iz 3G omrežja, pri tastu, tujina itd. Bi kar težko vpisal vse razpone IP-naslovov.
V ta namen imaš knockd. Sam si izmisliš nek "password" v obliki zaporedja poslanih paketov, na podlagi katerega ti odpre firewall recimo za nadaljne 3 minute.