Story image

ACSC confirms backdoor attacks on Aussie firms through Cisco switches & routers

18 Aug 17

Hackers may be collecting configuration files from routers and switches used by a number of Australian organisations, but the threat doesn’t appear to be affecting home users yet.

The Australian Cyber Security Centre (ACSC) issued an alert this week which says that switches with Cisco Smart Install that are accessible from the internet, as well as switches or routers with Simple Network Management Protocol (SNMP) enabled and exposed to the internet are at risk of being hacked.

ACSC says that the configuration files could contain device administrator credentials and other information, which could then be used to attack the router or switch and then compromise any other devices using the network.

If attackers compromise devices, they could potentially gain access to information sent from and to those devices.

ACSC suggests that administrators who know devices can be directly managed from the internet should review logs for any suspicious activities.

In Febuary this year, security research firm Talos found evidence that attackers were scanning infrastructure with the aim of finding Cisco Smart Install clients and using them to uncover customer configurations.

“We are aware that a tool to scan for affected systems, called the Smart Install Exploitation Tool (SIET), has been publicly released and is available here. This tool may be being used in these attacks,” Talos said in its blog.

Cisco added that if customers find devices that have Smart Install enabled, they should disable the software immediately through the no vstack configuration command.

Those activities could include:

  • configurations or command output obtained by external sources via TFTP
  • SNMP queries from unexpected sources
  • configuration of unexpected GRE tunnels.

While ACSC did not explicitly state which Australian organisations have been affected by the attacks, it has provided a list of tips to minimise threats to individuals and their organisations:

  • Disable SNMP Read/Write if not strictly required (consider disabling SNMP entirely if not required). If SNMP Read/Write is required, then at least one of the following two options should be put in place: EITHER ensure the SNMP service cannot be connected to untrusted sources OR upgrade to SNMPv3 and change all community strings.
  • Implement Access Control Lists (ACL) to restrict SNMP access to your network management platform AND configure anti-spoofing at the edge of your network so that spoofed packets claiming to be sent from your network management platform are dropped.
  • Disable Cisco Smart Install if not strictly required. Cisco has published advice to prevent misuse of the Smart Install feature.
Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.
What disaster recovery will look like in 2019
“With nearly half of all businesses experiencing an unrecoverable data event in the last three years, current backup solutions are no longer fit for purpose."
Proofpoint launches feature to identify most targeted users
“One of the largest security industry misconceptions is that most cyberattacks target top executives and management.”
McAfee named Leader in Magic Quadrant an eighth time
The company has been once again named as a Leader in the Gartner Magic Quadrant for Security Information and Event Management.
Symantec and Fortinet partner for integration
The partnership will deliver essential security controls across endpoint, network, and cloud environments.
Is Supermicro innocent? 3rd party test finds no malicious hardware
One of the larger scandals within IT circles took place this year with Bloomberg firing shots at Supermicro - now Supermicro is firing back.
25% of malicious emails still make it through to recipients
Popular email security programmes may fail to detect as much as 25% of all emails with malicious or dangerous attachments, a study from Mimecast says.