170
submitted 9 months ago by L4s@lemmy.world to c/technology@lemmy.world

Backdoored firmware lets China state hackers control routers with “magic packets”::The modified firmware used by BlackTech is hard to detect.

all 11 comments
sorted by: hot top controversial new old
[-] homesweethomeMrL@lemmy.world 17 points 9 months ago

Cisco also said that the hacker’s ability to install malicious firmware exists only for older company products. Newer ones are equipped with secure boot capabilities that prevent them from running unauthorized firmware, the company said.

To install their modified bootloader, the US and Japanese advisory said, the threat actors install an older version of the legitimate firmware and then modify it as it runs in memory. The technique overrides signature checks in the Cisco ROM monitor signature validation functions, specifically functions of Cisco’s IOS Image Load test and the Field Upgradeable ROMMON Integrity test. The modified firmware, which consists of a Cisco IOS loader that installs an embedded IOS image, allows the compromised routers to make connections over SSH without being recorded in event logs.

[-] spacecadet@lemm.ee 12 points 9 months ago

In an advisory of its own, Cisco said the threat actors are compromising the devices after acquiring administrative credentials and that there’s no indication they are exploiting vulnerabilities.

If they aren’t exploiting vulnerabilities (and this is all because of mishandling of admin creds) then why are only Cisco routers being targeted?

[-] Darkard@lemmy.world 14 points 9 months ago

They are loadi g in modified firmware apparently. Will be specific to Cisco hardware.

It's all kinda irrelevant though. If they managed to figure out your weak ass admin creds and you left your router open to access with no ACLs then installing some sneaky firmware is the least of your worries

[-] spacecadet@lemm.ee 2 points 9 months ago

True, I wonder how many of these admin creds were on internal wikis or something like user: admin password: admin123

[-] naticus@lemmy.world 3 points 9 months ago

How did you get my password? Please delete this.

[-] spacecadet@lemm.ee 3 points 9 months ago

12345? That’s the combination to my luggage

[-] PlexSheep@feddit.de 8 points 9 months ago

I suppose magic packets are not the packets for wake over lan, right? Because wol packages are commonly called magic packages too.

[-] cheet@infosec.pub 3 points 9 months ago

From what I gather it's closer to a port knock than magic packets

[-] autotldr@lemmings.world 4 points 9 months ago

This is the best summary I could come up with:


The threat actor is somehow gaining administrator credentials to network devices used by subsidiaries and using that control to install malicious firmware that can be triggered with “magic packets” to perform specific tasks.

In an advisory of its own, Cisco said the threat actors are compromising the devices after acquiring administrative credentials and that there’s no indication they are exploiting vulnerabilities.

Cisco also said that the hacker’s ability to install malicious firmware exists only for older company products.

Newer ones are equipped with secure boot capabilities that prevent them from running unauthorized firmware, the company said.

BlackTech members use the modified firmware to override code in the legitimate firmware to add the SSH backdoor, bypass logging, and monitor incoming traffic for “magic packets.” The term refers to small chunks of data the attackers send to the infected routers.

While they appear random and innocuous in system logs, these packets allow the attackers to surreptitiously enable or disable the backdoor functionality.


The original article contains 522 words, the summary contains 160 words. Saved 69%. I'm a bot and I'm open source!

this post was submitted on 28 Sep 2023
170 points (97.8% liked)

Technology

55692 readers
4065 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS