this post was submitted on 01 Feb 2024
255 points (100.0% liked)

Technology

70048 readers
3751 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
top 44 comments
sorted by: hot top controversial new old
[–] [email protected] 176 points 1 year ago* (last edited 1 year ago) (5 children)

creepy: a buttload of out-of-date routers were infected with chinese malware and unknowingly used as a botnet in a cyberattack

creepier: the fbi was able to take control of all of the routers and wipe the malware

creepiest: the router owners were unaware anything had happened

[–] [email protected] 49 points 1 year ago (3 children)

I'm curious as to whether the router manufacturer included a back door or if the FBI used the same exploit that was used to infect the routers in the first place.

[–] [email protected] 41 points 1 year ago* (last edited 1 year ago) (1 children)

probably the latter, since all of these routers were unpatched, out-of-date routers, and that's how they were exploited in the first place.

however, the article specifically states that the court documents are all redacted when it comes to the details

[–] [email protected] 4 points 1 year ago

Secrets for me but not for thee.

[–] [email protected] 11 points 1 year ago

It's not entirely uncommon for the latter to happen. Some greyhats have done similar things to clear out botnets in the past. It still counts as unauthorized access to a system though so most avoid doing so even if the intended result is beneficial

[–] [email protected] 3 points 1 year ago

The U.S. has a very robust hacking capability, we just don’t advertise it and we concentrate on shutting down or infiltrating critical infrastructure in times of war or espionage.

Instead of hacking China to steal industrial secrets, we hack them to see if we could say open or close all the floodgates at the 3 Gorges Damn… China hacks us to steal state and industrial secrets, though they are now starting to focus on infrastructure.

[–] [email protected] 9 points 1 year ago (2 children)

How would you like the router owners to have been alerted?

[–] [email protected] 21 points 1 year ago (2 children)

Perhaps via the contact information they provided to their ISP?

[–] [email protected] 9 points 1 year ago

I suspect it might have been problematic to tip off the malware operators that the network was about to be shut down. Apparently customers are going to be informed via their ISPs now. I guess some if them may decide to junk the routers.

[–] [email protected] 3 points 1 year ago (5 children)

My ISP has never had info on my router, for 20+ years. Was there something in the story I missed about these being ISP issued routers?

[–] [email protected] 28 points 1 year ago

The ISPs don't need info on the routers...

The FBI has identified the routers; if they're able to connect to them and issue commands, they clearly know the IPs of those routers and thus the ISP servicing that IP. The ISP knows which of their customers is/was assigned a particular IP.

[–] [email protected] 21 points 1 year ago* (last edited 1 year ago) (2 children)

Your ISP knows the Mac address of your router since it requests a public IP from them using DHCP. That's why if you contact support they usually can confirm the brand of your router by doing an oui lookup.

In theory the FBI could have collected a list of MACs and optionally used an ASN lookup on the public IP and then handed each ISP their list of MACs, which the ISP could associate back to customers to contact. It would only not work for customers who spoof their router WANs ethernet mac.

But I think just patching it is a normal and fine solution imo.

[–] [email protected] 2 points 1 year ago (1 children)

Do you work in networking? How did you learn the magicks of the computer tongue?

[–] [email protected] 2 points 1 year ago* (last edited 1 year ago)

I only do web development, but my networking knowledge mostly comes from being the designated person to call the ISP for tech support and being in charge of setting up the WiFi in every place that I've lived, in addition to participating and running community scale mesh wifi tech meetups for many years (think NYCMesh except just 4 guys who never accomplished much aside from buying and flashing lots of routers with openwrt lmao)

I also ran 12Us of homelab for a few years in my basement, which was powered by an overkill fiber to the home setup (courtesy of tricking Comcast into undercharging me for gigabit pro) that necessitated a 10G switch and firewall.

[–] Case 1 points 11 months ago

Or I mean, Shodan exists. I'm sure the gov has better.

A theoretical botnet I was looking at on github used shodan to identify possible targets to infect.

[–] [email protected] 11 points 1 year ago

Oh, sweet Summer child

[–] [email protected] 5 points 1 year ago

Probably works the other way around - FBI detects the problem at various IP addresses, patches them, then contacts the iISP and asks them to contact the customer who had x.y.z IP address

[–] [email protected] 2 points 1 year ago

I would imagine you are in the vast minority :)

[–] [email protected] 8 points 1 year ago (2 children)

How would you like the router owners to have been alerted?

By two men in black showing up at their doors, of course.

:-)

[–] [email protected] 3 points 1 year ago

"We're musicians maam"

[–] [email protected] 2 points 1 year ago* (last edited 1 year ago)

We are here to help.

[–] [email protected] 8 points 1 year ago (1 children)

I would assume they used the same exploit as the botnet because only the NSA gets to use the fancy secret backdoors and secret list of vulnerabilities.

Unless the routers were also managed by ISPs in which case they might have just had builtin remote access/remote commands

[–] [email protected] 4 points 1 year ago (1 children)

if the routers were managed by ISPs, the ISPs would have kept them up-to-date. these were not home users, but small business users, and a standard service contract would have covered that sort of thing. considering the issue was so widespread and over several different ISPs and different devices, the most likely explanation is that they were owned and managed by the user.

[–] [email protected] 2 points 1 year ago (1 children)

I used to fall for that logic that an ISP would keep my router up to date. It doesn’t happen.

In my case I had the same ISP router for over four years and there was a known bug streaming video. I didn’t have privileges to update and they refused to. Nor would they replace my router with a current one because “it’s not broken and hasn’t yet reached the age we switch them out”.

My solution was to stop renting the router. Also stop renting set top boxes and drop phone and cable service. I’m much happier with only internet for however many years that’s been and I have more control over keeping my network up to date and configured properly

[–] [email protected] 1 points 1 year ago

ymmv, but most ISPs do actually push updates to their hardware. i'm not surprised to hear that some don't, however.

of course, you're right that the best option is to bring your own hardware. not only is it safer, but, in the long run, you save a ton of money.

[–] [email protected] 2 points 1 year ago

That's very creepy

[–] [email protected] 1 points 1 year ago

"Computer Sabotage" crime in Germany, no?

[–] [email protected] 38 points 1 year ago

That's basically how the Sasser worm came to be. A hacker found a buffer overflow in the LSASS service, used that to replicate and then shut down the vulnerable service. But apparently he failed to account for Windows shutting down when LSASS was stopped, leading to a bootloop.

In the end it lead to massive damages when it actually was supposed to be a cure.

[–] [email protected] 12 points 1 year ago (4 children)

Chinese malware is probably preferable to whatever the FBI did with their access, and you'll never find out exactly what it was.

[–] [email protected] 54 points 1 year ago (2 children)

Hot take. They're both bad and you should use open source router firmware.

[–] [email protected] 12 points 1 year ago (2 children)

It's not even that hard to run OpenWRT or buy boxes with it on it already.

[–] [email protected] 4 points 1 year ago

Just bought a new asus router. Planning on putting openwrt on it.

[–] [email protected] 2 points 1 year ago

Was interested in OpenWRT until I realised its not supported on my router (its reasonably new model (2022) maybe thats why)

[–] [email protected] 9 points 1 year ago (1 children)

Even better: build your own router with OPNsense.

[–] [email protected] 10 points 1 year ago (1 children)

Even better: keep your shit up to date regardless of what you use

[–] [email protected] 3 points 1 year ago (1 children)

Even better: let the FBI patch yo shit for you.

[–] [email protected] 3 points 1 year ago

make your tax dollars work for you

[–] [email protected] 13 points 1 year ago

So, are you implying that the malware wasn’t involved in an attempted attack on critical infrastructure? Or do you seriously think the FBI persuaded a judge to let them go this as a front for doing something worse? Or are you just being edgy for the LOLs?

[–] [email protected] 6 points 1 year ago* (last edited 1 year ago) (1 children)

move to China if you really feel that way.. live a real Chinese malware life..

[–] [email protected] 2 points 1 year ago

At least he couldn't post this bullshit from the concentration camp.

[–] [email protected] 4 points 1 year ago

I would bet money that whatever the FBI is up to is less visible to the end user, and that is all anyone cares about anyway.

[–] [email protected] 9 points 1 year ago

This is the best summary I could come up with:


The routers—mainly Cisco and Netgear devices that had reached their end of life—were infected with what’s known as KV Botnet malware, Justice Department officials said.

From there, the campaign operators connected to the networks of US critical infrastructure organizations to establish posts that could be used in future cyberattacks.

Before the takedown could be conducted legally, FBI agents had to receive authority—technically for what’s called a seizure of infected routers or "target devices"—from a federal judge.

"To effect these seizures, the FBI will issue a command to each Target Device to stop it from running the KV Botnet VPN process," an agency special agent wrote in an affidavit dated January 9.

Wednesday’s Justice Department statement said authorities had followed through on the takedown, which disinfected "hundreds" of infected routers and removed them from the botnet.

To effect these seizures, the FBI will issue a command to each Target Device to stop it from running the KV Botnet VPN process.


The original article contains 560 words, the summary contains 159 words. Saved 72%. I'm a bot and I'm open source!

[–] [email protected] 7 points 1 year ago (1 children)

In other news, "fbi installed mallard on your router"

[–] [email protected] 4 points 1 year ago

I would also like a mallard