Home
 » ISP News » 
Sponsored Links

More Broadband Routers Exposed to NSA Based UPnP Exploit

Friday, Nov 30th, 2018 (10:50 am) - Score 5,042

A new report from internet content network Akamai has warned that broadband routers from many different manufacturers (e.g. Asus, NETGEAR, D-Link, Ubiquiti etc.), specifically those that haven’t patched some old Universal Plug and Play (UPnP) vulnerabilities, are being targeted in order to spread the EternalBlue malware.

Weak or un-patched implementations of UPnP have long been a thorn in the side of many routers. The protocol was essentially designed to enable home networks to seamlessly connect with other devices, which makes the end-users life a lot easier and avoids much of the fiddly network setups that were previously only familiar to more advanced users.

Earlier this year, Akamai researchers noted how UPnP was being abused by attackers to conceal traffic (see the white paper), which infected and hijacked routers in order to create a malicious proxy system called UPnProxy. The new system could then be abused to support mass email SPAM, DDoS attacks and related botnets.

The CDN provider claims that there are currently 277,000 devices, out of a pool of 3.5 million, running vulnerable implementations of UPnP. Unfortunately the latest report notes that a new variant of UPnProxy has been spotted, which is helping to spread the EternalBlue (aka – EternalRed on Linux) malware. So far some 45,113 devices have been compromised by the widely distributed UPnP NAT injection campaign.

EternalBlue was originally developed in the USA by the National Security Agency (NSA), but the code was later stolen and leaked to the internet. All of this is bad news for anybody who is running a vulnerable router (once this is compromised, so too is your whole network and everything it connects to), particularly if it’s no longer supported or hasn’t been patched with updated firmware to fix the UPnP flaws.

Akamai Statement

These numbers are subject to change as the attackers continue to scan for new machines to compromise. While some of the campaigns observed in the original research have since disappeared, a new campaign of injections has been discovered.

In Akamai’s previous research, we highlighted the possibility that attackers could leverage UPnProxy to exploit systems living behind the compromised router. Unfortunately, data from this recent batch of injections suggests this is exactly what’s happening.

For home users, these attacks can lead to a number of complications, such as degraded service, malware infections, ransomware, and fraud. But for business users, these recent developments could mean systems that were never supposed to exist on the internet in the first place, could now be living there unknowingly, greatly increasing their chances of being compromised.

Even more concerning, the services being exposed by this particular campaign have a history of exploitation related to crippling worms and ransomware campaigns targeting both Windows and Linux platforms.

Normally, the NewPortMappingDescription field on your router would state something like “Skype” for legitimate injections, but in UPnProxy campaigns this field is also attacker controlled. The new rulesets discovered by Akamai all contain “galleta silenciosa” (silent cookie/cracker) in Spanish. These sets of injections attempt to expose the TCP ports 139 and 445 on devices behind the router.

What’s the Solution?

Obviously it’s wise to disable UPnP, although this could cause some connectivity problems with devices in your network (experiences will vary as not all UPnP implementations are the same), although this might be the best option if you own one of the devices noted in Akamai’s white paper – linked above (the list is too long to paste here). After that you should check if a new firmware is available from the manufacturer’s website and update.

On the other hand if you’ve already been infected then simply disabling UPnP won’t be enough, you’ll need to consider doing a factory (hardware) reset and then updating the firmware. If at this point you find that no new firmware is available then you’ll have no option but to leave UPnP permanently disabled (or buy a new / modern router).

Unfortunately all of this will become rather more complex if the malware has managed to spread on to other computers/devices within your network. Hopefully you’ll be running up-to-date anti-virus software and firewalls on those to help prevent such an outcome (you could also block TCP ports 139 and 445) but many modern “smart” devices are rather lacklustre in this department.

Tags:
Mark-Jackson
By Mark Jackson
Mark is a professional technology writer, IT consultant and computer engineer from Dorset (England), he also founded ISPreview in 1999 and enjoys analysing the latest telecoms and broadband developments. Find me on X (Twitter), Mastodon, Facebook and .
Search ISP News
Search ISP Listings
Search ISP Reviews
Comments
3 Responses
  1. Avatar photo Martin O'Donnell says:

    Linksys hasnt updated my top of the range EA9500 for over a year now, very disapointed, wont buy Linksys again!

    1. Avatar photo Simon says:

      Most Cisco and Cisco Linksys routers are riddled with NSA backdoors in any case. EA9500 is currently WIP for DD-WRT, personally, I’d flash it with that as soon as its available.

    2. Avatar photo S Wakeman says:

      It doesn’t seem acceptable that a high-end consumer networking product can have a bevy of known security issues and the only solution be the user flashing it with an open source firmware. Most consumers of even high end products are not technically savvy enough to even be aware of the vulnerabilities, let alone flash their device.

      There surely needs to be some kind of industry-wide legislation that mandates companies provide, at the very minimum, security patches for all products a same family chipset varients of products currently offered plus minimum 5 years of updates for discontinued and EOL products.

      Some of these devices cost hundreds. For them to be sold with critical security vulnerabilities is unacceptable and bordering on immoral.

Comments are closed

Cheap BIG ISPs for 100Mbps+
Community Fibre UK ISP Logo
150Mbps
Gift: None
Virgin Media UK ISP Logo
Virgin Media £26.00
132Mbps
Gift: None
Shell Energy UK ISP Logo
Shell Energy £26.99
109Mbps
Gift: None
Plusnet UK ISP Logo
Plusnet £27.99
145Mbps
Gift: None
Zen Internet UK ISP Logo
Zen Internet £28.00 - 35.00
100Mbps
Gift: None
Large Availability | View All
New Forum Topics
Cheapest ISPs for 100Mbps+
Gigaclear UK ISP Logo
Gigaclear £17.00
200Mbps
Gift: None
YouFibre UK ISP Logo
YouFibre £19.99
150Mbps
Gift: None
Community Fibre UK ISP Logo
150Mbps
Gift: None
BeFibre UK ISP Logo
BeFibre £21.00
150Mbps
Gift: £25 Love2Shop Card
Hey! Broadband UK ISP Logo
150Mbps
Gift: None
Large Availability | View All
The Top 15 Category Tags
  1. FTTP (5515)
  2. BT (3514)
  3. Politics (2537)
  4. Openreach (2297)
  5. Business (2262)
  6. Building Digital UK (2244)
  7. FTTC (2043)
  8. Mobile Broadband (1973)
  9. Statistics (1788)
  10. 4G (1664)
  11. Virgin Media (1619)
  12. Ofcom Regulation (1461)
  13. Fibre Optic (1395)
  14. Wireless Internet (1389)
  15. FTTH (1381)

Helpful ISP Guides and Tips

Promotion
Sponsored

Copyright © 1999 to Present - ISPreview.co.uk - All Rights Reserved - Terms , Privacy and Cookie Policy , Links , Website Rules , Contact
Mastodon