Kitz ADSL Broadband Information
adsl spacer  
Support this site
Home Broadband ISPs Tech Routers Wiki Forum
 
     
   Compare ISP   Rate your ISP
   Glossary   Glossary
 
Please login or register.

Login with username, password and session length
Advanced search  

News:

Pages: [1] 2

Author Topic: TalkTalk and Post Office routers hit by cyber-attack  (Read 5168 times)

broadstairs

  • Kitizen
  • ****
  • Posts: 3700
TalkTalk and Post Office routers hit by cyber-attack
« on: December 01, 2016, 05:46:26 PM »

See BBC news website at http://www.bbc.co.uk/news/technology-38167453. Apparently some end user routers have been hacked including some ZyXEL and D-Link models according to this story.

Stuart
Logged
ISP:Vodafone Router:Vodafone Wi-Fi hub FTTP

sevenlayermuddle

  • Helpful
  • Addicted Kitizen
  • *
  • Posts: 5369
Re: TalkTalk and Post Office routers hit by cyber-attack
« Reply #1 on: December 01, 2016, 08:40:57 PM »

I'll be interested to hear the detail behind this one.  Something about the Beeb's report just doesn't sound convincing.

Is it only affecting those who allow remote admin, and do so without a password?
Logged

ejs

  • Kitizen
  • ****
  • Posts: 2078
Re: TalkTalk and Post Office routers hit by cyber-attack
« Reply #2 on: December 01, 2016, 08:48:29 PM »

There's more detail in The Register article linked in the BBC report.

Some routers have a flaw in that the port that's open for TR-069 also accepts other commands (TR-064), which it shouldn't. These can then be used to take control of the router.
Logged

kitz

  • Administrator
  • Senior Kitizen
  • *
  • Posts: 33884
  • Trinity: Most guys do.
    • http://www.kitz.co.uk
Re: TalkTalk and Post Office routers hit by cyber-attack
« Reply #3 on: December 01, 2016, 10:14:12 PM »

I'm led to believe that this does not affect the VMG series.
Logged
Please do not PM me with queries for broadband help as I may not be able to respond.
-----
How to get your router line stats :: ADSL Exchange Checker

NewtronStar

  • Kitizen
  • ****
  • Posts: 4898
Re: TalkTalk and Post Office routers hit by cyber-attack
« Reply #4 on: December 01, 2016, 10:28:29 PM »

Test your routers with ShieldsUP if the scan comes back with anything other than all ports are stealth you may have hole in the router that can be used for hackers of course ISP modem/routers will have the TR-069 port open for diagnostic reasons  :-\
« Last Edit: December 01, 2016, 10:32:32 PM by NewtronStar »
Logged

broadstairs

  • Kitizen
  • ****
  • Posts: 3700
Re: TalkTalk and Post Office routers hit by cyber-attack
« Reply #5 on: December 01, 2016, 10:39:14 PM »

I'm led to believe that this does not affect the VMG series.

Well I checked mine anyway and both tr064 and tr069 are disabled. Ages ago I did a ShieldsUP and it came back stealth anyway.

Stuart
Logged
ISP:Vodafone Router:Vodafone Wi-Fi hub FTTP

Weaver

  • Senior Kitizen
  • ******
  • Posts: 11459
  • Retd s/w dev; A&A; 4x7km ADSL2 lines; Firebrick
Re: TalkTalk and Post Office routers hit by cyber-attack
« Reply #6 on: December 01, 2016, 11:06:03 PM »

Can you specify a target address for testing with Shields Up? Or is it always only your own machine, that is, the one browsing the site?

pentest-tools can test a specified target address iirc. Does an nmap and various other options.
Logged

sevenlayermuddle

  • Helpful
  • Addicted Kitizen
  • *
  • Posts: 5369
Re: TalkTalk and Post Office routers hit by cyber-attack
« Reply #7 on: December 01, 2016, 11:06:55 PM »

Agreed, shields up is good reassurance.

But for zen users, maybe others too, be aware that certain ports are reported as 'closed' when you might have expected 'stealth'.  When I tried some time ago, it took me longer than I care to admit to satisfy myself all was well.   Certainly, went without any lunch that day :-[

And after I did get to the bottom of it, I discovered it was already well documented on one of the world's best forums...

http://forum.kitz.co.uk/index.php?topic=15193.0
Logged

Chrysalis

  • Content Team
  • Addicted Kitizen
  • *
  • Posts: 7405
  • VM Gig1 - AAISP CF
Re: TalkTalk and Post Office routers hit by cyber-attack
« Reply #8 on: December 02, 2016, 07:13:55 AM »

This is no surprise, the vast majority of consumer routers on the market have lots of flaws, mainly due that many use ancient versions of code and they are barely maintained if at all post release.
Logged

kitz

  • Administrator
  • Senior Kitizen
  • *
  • Posts: 33884
  • Trinity: Most guys do.
    • http://www.kitz.co.uk
Re: TalkTalk and Post Office routers hit by cyber-attack
« Reply #9 on: December 02, 2016, 01:32:53 PM »

>> I'll be interested to hear the detail behind this one.

OK since this has now hit the media and the affected ISPs have had chance to start rolling out the fixes I guess it should now be ok to say the following with regards to the ISPs using the affected Zyxel modems.

The issue was with the TR-064 stack not properly checking which interface HTTP requests came from.  TR-064 is only supposed to accept LAN side requests.  The bug allowed TR-064 requests to be injected into TR-069 (WAN) HTTP requests.  The device then assumed that the request was coming come the LAN HTTP server.  In summary, these requests had the ability to open [http] port 80 on the firewall,  thereby exposing the web administration GUI to the WAN side.

I can confirm Zyxel has stated that it does not affect their VMG series which we usually recommend on here.
It is worrying though, that there are probably lots of routers out there (not just Zyxel) using the same code in their firmware.

---

There's bits I dont quite get - this is more ejs's domain -  with regard to port 7547 & TR069.   What I dont understand, nor have time to look further into, but from memory I thought the TR-069 standard either specified or recommends that requests are only supposed to connect to an authorised server, so in the case of these ISP based modems are they not being configured properly in the first place so that TR-069 requests can only come from their own servers?
Logged
Please do not PM me with queries for broadband help as I may not be able to respond.
-----
How to get your router line stats :: ADSL Exchange Checker

ejs

  • Kitizen
  • ****
  • Posts: 2078
Re: TalkTalk and Post Office routers hit by cyber-attack
« Reply #10 on: December 02, 2016, 02:36:34 PM »

The open port used for TR-069 has only a single purpose. It's used when the ACS server wants the CPE device to initiate a connection to the ACS server. The ACS server sends a HTTP GET request to the port (often 7547). If the URL and username and password sent in the request are correct, then the CPE device will connect to the pre-configured ACS server address in its config. There aren't any other commands that can be sent to this port, it deliberately has a very limited function.

It would be good security practice to have some firewall rules that restricted access to port 7547 (or other port used for that TR-069 purpose) to the specific range of IP addresses that belonged to the ISP's servers, but I don't think it's part for the TR-069 specification itself.

It isn't only that the TR-064 commands can open access to the web interface. They also try to inject commands into the config in an attempt to make the router download and execute the malware, by putting the commands into `backticks` and setting the NTP server address to contain those commands.
Logged

sevenlayermuddle

  • Helpful
  • Addicted Kitizen
  • *
  • Posts: 5369
Re: TalkTalk and Post Office routers hit by cyber-attack
« Reply #11 on: December 02, 2016, 03:55:45 PM »

Now, maybe I should be worried.

My billion 7800dxl, which was not supplied by ISP, seems to be factory configured for TR 069 on port 30005.  Shields up identified 30005 as open, even though remote access is set to 'disable'.  :o

Then I did a fw update, and now port 30005 is 'stealth'.  :-\

Firmware release notes said, under Mods and bug fixes,   "1. Support TR069 WAN port modification."

Happy to talk more about other parameters if anybody interested.   But maybe one of the Gurus can advise....  should I (and other Billion users) be worried, and should any further testing be in order. 
Logged

Chrysalis

  • Content Team
  • Addicted Kitizen
  • *
  • Posts: 7405
  • VM Gig1 - AAISP CF
Re: TalkTalk and Post Office routers hit by cyber-attack
« Reply #12 on: December 02, 2016, 04:47:31 PM »

Also the web interface daemon should be configured to not even listen on the WAN interface if properly and securely configured.

e.g. asuswrt used to listen on * even when was set to lan only in the options.
Logged

sevenlayermuddle

  • Helpful
  • Addicted Kitizen
  • *
  • Posts: 5369
Re: TalkTalk and Post Office routers hit by cyber-attack
« Reply #13 on: December 02, 2016, 05:10:14 PM »

On the Billion, there's an option 'Wan interface used by TR-069 client'.

It had been factory set to 'Any_WAN'.  With the old firmware, setting it to LAN made no difference, shields up still said 'open'.   With the new firmware it still defaults to 'Any_WAN', but show up as stealth.

Apols if I'm talking twaddle, I confess I'm way out of my depth.   Conversely, if I'm posting detail that I shouldn't, let me know and I'll edit & remove.
« Last Edit: December 02, 2016, 05:12:27 PM by sevenlayermuddle »
Logged

Chrysalis

  • Content Team
  • Addicted Kitizen
  • *
  • Posts: 7405
  • VM Gig1 - AAISP CF
Re: TalkTalk and Post Office routers hit by cyber-attack
« Reply #14 on: December 02, 2016, 05:12:55 PM »

Well it shows you cannot trust what the UI tells you, consumer routers are built with cheap in mind, which includes cheap software development and security auditing.
Logged
Pages: [1] 2