The router of all evil: more than just default passwords and silly scripts

By Himanshu Anand , Chastine Menrige on 05 Oct 2017 @ Virus Bulletin
📊 Presentation 📄 Whitepaper 📹 Video 🔗 Link
vulnerability-management reverse-engineering pentesting firmware-analysis
Focus Areas: Hardware Security , IoT Security , Malware Analysis , Penetration Testing , Reverse Engineering , Vulnerability Management

Presentation Material

Abstract

In the last couple of years, we have seen a few highly sophisticated router attacks and malware, the most famous of which are the Cisco exploit (CVE-2016-6366), found among the data dump released by the Shadow Brokers hacking group, and the zero-day exploit in networking devices that took down the Italian Hacking Team. While working on router exploits and malware, we came across some very interesting router malware and malicious firmware. This paper will look at two case studies: * The Netgear router attack (CVE-2016-6277) and the analysis of malicious firmware associated with it, which was flashed remotely, as well as the use of the Firmware Mod Kit (FMK) for the development of malicious firmware. * Shellshock exploitation (CVE-2014-6277, CVE-2014-6278, CVE-2014-7169, CVE-2014-7186 and CVE-2014-7187), which was used to compromise routers and infect them with .ELF malware, as well as infect them using Perl-based IRC bots. This paper will discuss the objectives of Internet of Things (IoT) malware which are primarily associated with distributed denial of service (DDoS) attacks and information stealers. A few such attacks involved man-in-the-middle (MitM) threats and Domain Name System (DNS) changers. The paper will also discuss the future of router exploits, how attackers can exploit networks, and how such attacks could be very dangerous for both corporate and home users.