Russian Hackers Are Inside American Home Routers. The FBI Has a 5-Step Fix


Most home routers sit in a corner, ignored, and that’s exactly what Russia’s military intelligence unit was counting on. The GRU group known as APT28, responsible for some of the most significant state-sponsored hacks of the past decade, spent years exploiting that neglect, working its way into thousands of home and small office routers across 23 US states and using the access to intercept traffic, steal credentials and build a shadow network of compromised devices. A joint federal advisory issued April 7 outlined the scope of the attack and the court-authorized operation that disrupted it. It also came with a clear instruction: There are five steps every router owner should take immediately.

The attack targeted small-office/home-office routers, also known as SOHO routers, and was carried out by a unit in the Russian military intelligence agency, the GRU. Government agencies are urging people to follow basic router hygiene steps, such as updating to the latest firmware and changing default login credentials. The UK’s National Cyber Security Centre includes a number of TP-Link routers specifically targeted by the hackers.

While that news sounds pretty alarming, it’s worth keeping in mind that the attack compromised enterprise routers specifically, so your home Wi-Fi router likely isn’t at risk. That said, some of the affected routers can be used as standard home routers, so it’s worth checking whether your model was exploited in the attack.

“There is a big trend of exploiting routers these days, and that goes both for the consumer and enterprise or corporate routers,” Daniel Dos Santos, vice president of research at the cybersecurity company Forescout, told CNET.

What type of attack is this?

A news release from the NSA notes that the attack indiscriminately targeted a wide pool of routers, with the goal of gathering information on “military, government, and critical infrastructure.”

This attack is linked to threat actors within the Russian GRU — which go by APT28, Fancy Bear, Forest Blizzard and other names — and has been ongoing since at least 2024, according to the FBI. 

It’s known as a Domain Name System hijacking operation, in which DNS requests are intercepted by changing the default network configurations on SOHO routers, allowing the actors to see a user’s traffic unencrypted. 

“For nation-state actors like Forest Blizzard, DNS hijacking enables persistent, passive visibility and reconnaissance at scale,” says a Microsoft Threat Intelligence report on the attack. 

Microsoft identified more than 200 organizations and 5,000 consumer devices impacted by the GRU’s attack. 

Which routers were affected?

The FBI’s announcement refers to one router specifically, the TP-Link TL-WR841N, a Wi-Fi 4 model that was originally released in 2007. The UK’s National Cyber Security Centre lists 23 TP-Link models that were targeted, but notes that it is likely not exhaustive.

Here is the list of affected devices:

  • TP-Link LTE Wireless N Router MR6400
  • TP-Link Wireless Dual Band Gigabit Router Archer C5
  • TP-Link Wireless Dual Band Gigabit Router Archer C7
  • TP-Link Wireless Dual Band Gigabit Router WDR3600
  • TP-Link Wireless Dual Band Gigabit Router WDR4300
  • TP-Link Wireless Dual Band Router WDR3500
  • TP-Link Wireless Lite N Router WR740N
  • TP-Link Wireless Lite N Router WR740N/WR741ND
  • TP-Link Wireless Lite N Router WR749N
  • TP-Link Wireless N 3G/4G Router MR3420
  • TP-Link Wireless N Access Point WA801ND
  • TP-Link Wireless N Access Point WA901ND
  • TP-Link Wireless N Gigabit Router WR1043ND
  • TP-Link Wireless N Gigabit Router WR1045ND
  • TP-Link Wireless N Router WR840N
  • TP-Link Wireless N Router WR841HP
  • TP-Link Wireless N Router WR841N
  • TP-Link Wireless N Router WR841N/WR841ND
  • TP-Link Wireless N Router WR842N
  • TP-Link Wireless N Router WR842ND
  • TP-Link Wireless N Router WR845N
  • TP-Link Wireless N Router WR941ND
  • TP-Link Wireless N Router WR945N

A TP-Link Systems spokesperson told CNET in a statement that the affected models all reached End of Service and Life status several years ago.

“While these products are outside our standard maintenance lifecycle, TP‑Link has developed security updates for select legacy models where technically feasible,” the spokesperson said. 

TP-Link is urging people with these outdated routers to upgrade to a newer device if possible. You can find a list of available security patches on its security advisory page addressing the recent attack. 

How to keep your router safe

The NSA referred organizations to a list of best practices for securing your home network. The most important thing you can do if you’re using one of the impacted devices is to upgrade your router as soon as possible. It likely hasn’t received firmware updates in years, which is like leaving the door to your network unlocked. 

“The longer you carry on doing that, the greater the risk,” said Rik Ferguson, vice president of security intelligence at Forescout. “The router sits in such a privileged position within any network. All of your communication, all of your traffic, has to pass through that device.”

In addition to using a newer device that’s still getting security updates, there are a few other steps you can take to lock down your network: 

  • Update your firmware regularly: Many networking devices allow you to enable automatic firmware updates in the settings. If this is an option, I’d highly recommend doing it. If it’s not, you can find updates for your router by logging into its web interface or using its app.
  • Reboot your router: The NSA’s guidance recommends rebooting your router, smartphone and computers at least once a week. “Regular reboots help to remove implants and ensure security,” the agency says. 
  • Change default usernames and passwords: One of the most common ways hackers gain access is by trying default, manufacturer-set login credentials. “There’s a whole underground economy that underlies all of that,” says Ferguson. “Basically, they just harvest credentials, either through attacks of their own, or by stockpiling them from other sources and buying them.” This username and password combination is different from your Wi-Fi login, which should also be changed every six months or so. The longer and more random your password, the better
  • Disable remote management: Most regular users don’t need to remotely manage their Wi-Fi router, and this is one of the primary ways threat actors can change your router’s settings without your knowledge. You can typically find this option in your router’s admin settings
  • Use a VPN: The FBI’s announcement on the attack specifically recommends that organizations with remote workers use a VPN when accessing sensitive data. These services encrypt your traffic as it passes through a remote server, keeping it safe from hackers.





Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews


Cyberark PAM – Table of Content

Examples of Privileged Access

Privileged access can be related with human clients just as non-human clients, for example, apps and machine characters. 

By humans

Super client account:

An incredible record utilized by IT framework heads which could be utilized to make designs to a framework or app, to add or to eliminate clients or erase information.

Domain authoritative account:

A record that gives privileged regulatory access over all workstations and the connected servers inside an organization area. The records are basically less, however they give the most broad access over the organization. The expression “Keys to the IT Kingdom” is frequently utilized when alluding to the special idea of administrator accounts and frameworks. 

Local regulatory account:

The account is situated at a workstation and utilizes a blend of username and secret password. It assists individuals in availing  and making changes to their nearby machines or gadgets.

SSH key:

Secure socket shell keys are intensely utilized for admittance control concords that give direct root availability to basic frameworks. Root can be considered as the username or record that, naturally, approaches all orders and documents on Linux or different Unix-like operating systems. 

Emergency account:

It gives clients authoritative permission to protect frameworks on account of a crisis. It is in some cases alluded to as a firecall.

Become a CyberArk Certified professional  by learning this HKR CyberArk Training!

Privileged business client:

Is somebody that works outside the IT, however approaches subtle frameworks. It could also incorporate somebody who requires permission to finance, HR or trading the systems.

CyberArk Training

  • Master Your Craft
  • Lifetime LMS & Faculty Access
  • 24/7 online expert support
  • Real-world & Project Based Learning

By non-humans

Application account: 

Privileged account that is explicit to the application programming and is used to manage, design or administer entry to the application programming. 

Service account: 

A record that an administration or app utilizes to cooperate with the functioning system. Administrations utilize these records to avail and make alterations to the configuration.

Secret: 

Used by DevOps group as a collective term that alludes to SSH keys, API keys and different certifications utilized by DevOps groups to give privileged  admittance.

SSH key: 

SSH keys are utilized via robotized measures. 

CyberArk Privileged Access Management (PAM)

Associations execute PAM to secure against the dangers presented by certification theft alongwith its misuse. PAM alludes to an exhaustive network safety methodology including individuals, methods, and technological innovation to command, screen, protect and review all the human and non human methods over a venture IT domains. 

PAM is alluded to as PIM (Privileged Identity Management) or Privileged Access Security (PAS). PAM is based on the standard of least privilege, where the clients get the base degrees of availability needed to execute  their employment capacities. It’s rule is broadly viewed as a network safety best practice and is a major advance in ensuring availability  to high esteem information and resources. By upholding this rule, associations can diminish the assault surface and moderate the danger from malignant insiders or outside digital assaults that can prompt expensive information breaches.

Want to know more about CyberArk , visit here CyberArk Tutorial.

Cyber Security & SIEM Tools, cyberark-pam-description-0, Cyber Security & SIEM Tools, cyberark-pam-description-1

Subscribe to our YouTube channel to get new updates..!

PAM Challenges

Companies face various difficulties safeguarding, commanding and observing privileged access like,

Dealing with account credentials: Different IT associations depend on mistake inclined authoritative methods to turn and refresh privileged certifications. It can be a wasteful and exorbitant methodology. 

Tracking the privileged activity: Many ventures can’t observe and control privileged meetings, presenting the business to network safety dangers and infringement. 
Observing and analyzing the threats: Associations require exhaustive danger analysis instruments and can’t proactively distinguish dubious functions and repair security issues. 
Controlling Privileged User Access: Organizations frequently battle to adequately command privilege client access to cloud platforms, SaaS apps, web-based media and taking consistent chances and making use of operational multifaceted nature. 

Safeguarding Windows domain regulators: Cyber attackers can abuse weaknesses in the Kerberos authentication domain to imitate approved clients and access basic IT assets and the confidential information.

Interested in learning Cyberark Join HKR Cyberark Training in Hyderabad!

Relevance of Privileged Access Management (PAM) for your Association

  • Ranging from inward privileged clients mishandling their degree of access, or outer cyber assailants focusing on and taking advantages from clients to function subtly as privileged insiders, people are consistently the most vulnerable connection in the cyber protection chain. PAM assists associations ensuring that individuals have just the fundamental degrees of admittance to manage their responsibilities. PAM empowers security groups to distinguish malevolent exercises connected to privilege misuse and make a quick move to remediate hazard. 
  • Frameworks must have the option to avail and speak with one another to cooperate. As associations grasp cloud, DevOps, mechanical process automation, IoT and the quantity of machines and apps which need privilege admittance has flooded and the assault surface has developed. These non-human substances immeasurably dwarf the individuals in a regular association and are harder to observe and handle or even to recognize by any means. COTS applications normally expect admittance to different parts of the organization, which the assailants can misuse. 
  • Each and every endpoint contains privilege in an undertaking. Built in accounts empower IT groups to fix issues locally, however they present extraordinary danger. Assailants can abuse administrator accounts, at that point hop from one workstation to workstation, take extra qualifications, hoist privileges and move through the organization till they arrive at what they’re searching for. 
  • The capacity to observe and distinguish dubious occasions in a situation is significant, yet without a reasonable spotlight on what presents the most measure of danger, the business can stay helpless. Executing PAM as a feature of a thorough security and danger management procedure empowers associations to document and log of all exercises that identify with basic IT foundation and delicate data aiding them disentangle review and consistency prerequisites. 
     

Best Practices for Privileged Access Management

The accompanying advances give a system to build up basic PAM controls to reinforce an association’s security act. Actualizing a program that uses these measures can assist associations with accomplishing more serious danger decrease in less time, ensure their image reputation and administrative goals with less inside assets.

  • Dispense with irreversible organization takeover assaults.
  • Command and safeguard the framework accounts.
  • Cutoff lateral development. 
  • Ensure certifications for outsider applications. 
  • Handle SSH keys. 
  • Safeguard DevOps secrets. 
  • Protect SaaS administrators along with the privileged trade clients.
  • Put resources into occasional Red Team activities to test guards.

Prepare for CyberArk  Interview? Here Are Top CyberArk Interview Questions and Answers!

CyberArk Training

Weekday / Weekend Batches

Conclusion

Associations that organize PAM programs as a component of their bigger network safety methodology can encounter various hierarchical advantages, for example, relieving security dangers and lessening the general cyber assault surface, decreasing operational expenses and multifaceted nature, upgrading perceivability and situational mindfulness over the undertaking and improving administrative consistency. In computerized business, privileges are all over the place. PAM program should represent the complete evacuation of managerial rights on workstations to decrease hazard.

Related Articles:



Source link