Last week Czech researchers released information on a new worm which exploits CPE devices (broadband routers) by means such as default passwords, constructing a large DDoS botnet. Today this story hit international news. Original Czech: http://praguemonitor.com/2010/02/16/czech-experts-uncover-global-virus-netwo... English: http://www.pcworld.com/businesscenter/article/189868/chuck_norris_botnet_kar... When I raised this issue before in 2007 on NANOG, some other vetted mailing lists and on CircleID, the consensus was that the vendors will not change their position on default settings unless "something happens", I guess this is it, but I am not optimistic on seeing activity from vendors on this now, either. CircleID story 1: http://www.circleid.com/posts/broadband_routers_botnets/ CircleID story 2: http://www.circleid.com/posts/broadband_router_insecurity/ The spread of insecure broadband modems (DSL and Cable) is extremely wide-spread, with numerous ISPs, large and small, whose entire (read significant portions of) broadband population is vulnerable. In tests Prof. Randy Vaughn and I conducted with some ISPs in 2007-8 the results have not been promising. Further, many of these devices world wide serve as infection mechanisms for the computers behind them, with hijacked DNS that points end-users to malicious web sites. On the ISPs end, much like in the early days of botnets, many service providers did not see these devices as their responsibility -- even though in many cases they are the providers of the systems, and these posed a potential DDoS threat to their networks. As a mind-set, operationally taking responsibility for devices located at the homes of end users made no sense, and therefore the stance ISPs took on this issue was understandable, if irresponsible. As we can't rely on the vendors, ISPs should step up, and at the very least ensure that devices they provide to their end users are properly set up (a significant number of iSPs already pre-configure them for support purposes). The Czech researchers have done a good job and I'd like to thank them for sharing their research with us. In this article by Robert McMillan, some details are shared in English: ---------- Discovered by Czech researchers, the botnet has been spreading by taking advantage of poorly configured routers and DSL modems, according to Jan Vykopal, the head of the network security department with Masaryk University's Institute of Computer Science in Brno, Czech Republic. The malware got the Chuck Norris moniker from a programmer's Italian comment in its source code: "in nome di Chuck Norris," which means "in the name of Chuck Norris." Norris is a U.S. actor best known for his martial arts films such as "The Way of the Dragon" and "Missing in Action." Security experts say that various types of botnets have infected millions of computers worldwide to date, but Chuck Norris is unusual in that it infects DSL modems and routers rather than PCs. It installs itself on routers and modems by guessing default administrative passwords and taking advantage of the fact that many devices are configured to allow remote access. It also exploits a known vulnerability in D-Link Systems devices, Vykopal said in an e-mail interview. A D-Link spokesman said he was not aware of the botnet, and the company did not immediately have any comment on the issue. Like an earlier router-infecting botnet called Psyb0t, Chuck Norris can infect an MIPS-based device running the Linux operating system if its administration interface has a weak username and password, he said. This MIPS/Linux combination is widely used in routers and DSL modems, but the botnet also attacks satellite TV receivers. ---------- Read more here: http://www.pcworld.com/businesscenter/article/189868/chuck_norris_botnet_kar... I will post updates on this as I discover them on my blog, under this same post, here: http://gadievron.blogspot.com/2010/02/chuck-norris-botnet-and-broadband.html Gadi.
On Mon, 2010-02-22 at 16:21 +0200, Gadi Evron wrote:
Last week Czech researchers released information on a new worm which exploits CPE devices (broadband routers) by means such as default passwords, constructing a large DDoS botnet. Today this story hit international news.
What makes this any different than psyb0t, which was discovered in the wild last year? William
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Mon, Feb 22, 2010 at 7:17 AM, William Pitcock <nenolod@systeminplace.net> wrote:
On Mon, 2010-02-22 at 16:21 +0200, Gadi Evron wrote:
Last week Czech researchers released information on a new worm which exploits CPE devices (broadband routers) by means such as default passwords, constructing a large DDoS botnet. Today this story hit international news.
What makes this any different than psyb0t, which was discovered in the wild last year?
Nothing. Good point. :-) - - ferg -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.5.3 (Build 5003) wj8DBQFLgqQKq1pz9mNUZTMRAsH7AKDoL9/RLSDAslAcJtHDnPk7iiVoawCffSgq gMZWi47oFDmp595zfX/HZ9U= =6FLZ -----END PGP SIGNATURE----- -- "Fergie", a.k.a. Paul Ferguson Engineering Architecture for the Internet fergdawgster(at)gmail.com ferg's tech blog: http://fergdawg.blogspot.com/
Hi, team. William Pitcock wrote:
On Mon, 2010-02-22 at 16:21 +0200, Gadi Evron wrote:
Last week Czech researchers released information on a new worm which exploits CPE devices (broadband routers) by means such as default passwords, constructing a large DDoS botnet. Today this story hit international news.
What makes this any different than psyb0t, which was discovered in the wild last year?
Or Coldlife aka Coldbot, which dates back to circa 2004 (at least)? It came bundled with a list of 2K+ compromised routers. Secure your routers, folks! This includes D-Link, Juniper, and Cisco. They're all targets, and regularly exploited. Juniper: SSH brute force, some telnet (ugh!) brute force. Cisco: telnet and SSH brute force, some old web bugs. <http://www.cisco.com/en/US/tech/tk648/tk361/technologies_tech_note09186a0080120f48.shtml> <http://www.cymru.com/Documents/secure-ios-template.html> <http://www.cymru.com/gillsr/documents/junos-template.pdf> Updates and suggestions welcome! Compromised routers are useful for DoS, sure, but more useful as proxies and IRC bounces. Remember the first big wave of DNS amplification attacks against Stormpay, et al.? That same perp built a large overlay network of tunnels between compromised routers (most of which spoke eBGP). Concerned that your routers might be compromised? Send us a note at team-cymru@cymru.com and we'll let you know what we've seen. We'll need your ASN(s) or CIDR block(s). Thanks, Rob. -- Rob Thomas Team Cymru https://www.team-cymru.org/ ASSERT(coffee != empty);
On 2/22/10 5:17 PM, William Pitcock wrote:
On Mon, 2010-02-22 at 16:21 +0200, Gadi Evron wrote:
Last week Czech researchers released information on a new worm which exploits CPE devices (broadband routers) by means such as default passwords, constructing a large DDoS botnet. Today this story hit international news.
What makes this any different than psyb0t, which was discovered in the wild last year?
Absolutely nothing. I think it is mentioned in the PC World story though. Thanks for bringing it up. Gadi.
William
participants (4)
-
Gadi Evron
-
Paul Ferguson
-
Rob Thomas
-
William Pitcock