silv
29-11-2016, 02:22 PM
What do these have in common?
- 900.000 German Telekom customers,
- Valartis Bank Liechtenstein,
- Austrian Foreign Affairs Office and Army,
- EU Commission and
- San Francisco Transport system?
All had hacker attacks this weekend:
Ransomware (only 65,000€ in Frisco) ,
DoS (army and foreign affairs office of Austria, EU Commission),
tweaked DNS router settings (Telekom customers),
stolen financial data and a 10% ransom to prevent leaks to Fiscal prosecutors (bank)
Finger pointing either to Russia or Turkey.
Although I do think, the Frisco hacker attack was more of a warning gesture... 70,000 USD is not much ransom. (maybe a gay hacker in love with the city :) )
Same goes for the German Telekom outage. Telekom (and other internet providers) knew about this exact vulnerability in the modem routers they shipped to their customers. They knew it since 2014 and did not do anything about it. Until last night. By now, all routers of the Speedport model have their exploit closed off.
It's port 7547 and concerning the remote support protocol TR-069.
German Office for IT Security has issued a warning for global home router attacks.
Quick explanation: The port and protocol enable the internet provider (and the hacker) to download and execute a file on the router. In case of the hacker, potentially re-directing DNS queries to malicious servers.
Firmware branded routers shipped to customers often have this open vulnerability, I bet that goes for AUS and NZ, too.
If you feel concerned because your phone line goes over your router as well - or you just need stable internet access -
you could contact your provider and give them this official report to read and let them check your router.
https://isc.sans.edu/diary/Port+7547+SOAP+Remote+Code+Executio n+Attack+Against+DSL+Modems/21759
- 900.000 German Telekom customers,
- Valartis Bank Liechtenstein,
- Austrian Foreign Affairs Office and Army,
- EU Commission and
- San Francisco Transport system?
All had hacker attacks this weekend:
Ransomware (only 65,000€ in Frisco) ,
DoS (army and foreign affairs office of Austria, EU Commission),
tweaked DNS router settings (Telekom customers),
stolen financial data and a 10% ransom to prevent leaks to Fiscal prosecutors (bank)
Finger pointing either to Russia or Turkey.
Although I do think, the Frisco hacker attack was more of a warning gesture... 70,000 USD is not much ransom. (maybe a gay hacker in love with the city :) )
Same goes for the German Telekom outage. Telekom (and other internet providers) knew about this exact vulnerability in the modem routers they shipped to their customers. They knew it since 2014 and did not do anything about it. Until last night. By now, all routers of the Speedport model have their exploit closed off.
It's port 7547 and concerning the remote support protocol TR-069.
German Office for IT Security has issued a warning for global home router attacks.
Quick explanation: The port and protocol enable the internet provider (and the hacker) to download and execute a file on the router. In case of the hacker, potentially re-directing DNS queries to malicious servers.
Firmware branded routers shipped to customers often have this open vulnerability, I bet that goes for AUS and NZ, too.
If you feel concerned because your phone line goes over your router as well - or you just need stable internet access -
you could contact your provider and give them this official report to read and let them check your router.
https://isc.sans.edu/diary/Port+7547+SOAP+Remote+Code+Executio n+Attack+Against+DSL+Modems/21759