Advertisement
UK markets open in 27 minutes
  • NIKKEI 225

    37,068.35
    -1,011.35 (-2.66%)
     
  • HANG SENG

    16,187.04
    -198.83 (-1.21%)
     
  • CRUDE OIL

    83.87
    +1.14 (+1.38%)
     
  • GOLD FUTURES

    2,396.80
    -1.20 (-0.05%)
     
  • DOW

    37,775.38
    +22.07 (+0.06%)
     
  • Bitcoin GBP

    50,079.89
    +797.47 (+1.62%)
     
  • CMC Crypto 200

    1,281.18
    -31.44 (-2.40%)
     
  • NASDAQ Composite

    15,601.50
    -81.87 (-0.52%)
     
  • UK FTSE All Share

    4,290.02
    +17.00 (+0.40%)
     

UPDATE 2-Cisco router break-ins bypass cyber defences

(Company corrects the 15th paragraph beginning "The malicious programme..." to clarify that the nickname SYNful refers to the signal routers sent to open up communication with other routers, rather than how the implanted software jumps between routers.)

By Eric Auchard

FRANKFURT, Sept 15 (Reuters) - Security researchers say they have uncovered clandestine attacks across three continents on the routers that direct traffic around the Internet, potentially allowing suspected cyberspies to harvest vast amounts of data while going undetected.

In the attacks, a highly sophisticated form of malicious software, dubbed SYNful Knock, has been implanted in routers made by Cisco, the world's top supplier, U.S (Other OTC: UBGXF - news) . security research firm FireEye (NasdaqGS: FEYE - news) said on Tuesday.

ADVERTISEMENT

Routers are attractive to hackers because they operate outside the perimeter of firewalls, anti-virus, behavioural detection software and other security tools that organisations use to safeguard data traffic. Until now, they were considered vulnerable to sustained denial-of-service attacks using barrages of millions of packets of data, but not outright takeover.

"If you own (seize control of) the router, you own the data of all the companies and government organisations that sit behind that router," FireEye Chief Executive Dave DeWalt told Reuters of his company's discovery.

"This is the ultimate spying tool, the ultimate corporate espionage tool, the ultimate cybercrime tool," DeWalt said.

The attacks have hit multiple industries and government agencies, he said.

Cisco confirmed it had alerted customers to the attacks in August and said they were not due to any vulnerability in its own software. Instead, the attackers stole valid network administration credentials from targeted organisations or managed to gain for themselves physical access to the routers.

"We've shared guidance on how customers can harden their network, and prevent, detect and remediate this type of attack," Cisco said in a statement.

CYBERSPIES SEEN RESPONSIBLE

Altogether FireEye's computer forensic arm Mandiant has so far found 14 instances of the router implants in India, Mexico, Philippines and Ukraine, the company said in a blog post at http://bit.ly/1ObMm7u. It (Other OTC: ITGL - news) added that this may be just the tip of the iceberg in terms of yet-to-be-discovered attacks.

Because the attacks actually replace the basic software controlling the routers, infections persist when devices are shut off and restarted. If found to be infected, FireEye said basic software used to control those routers would have to be re-imaged, a time-consuming task for technicians.

Hitherto, infections of commercial routers, while not unknown, have largely remained theoretical threats, DeWalt said, as distinct from routers consumers use at home, which according to media reports have been hit by malware in recent years.

Experts reckon there are only a small number of nations with cyber intelligence services which are capable of such attacks on network equipment, including those of Britain, China, Israel, Russia and the United States.

"That feat is only able to be obtained by a handful of nation-state actors," DeWalt said, while declining to name which countries he suspected might be behind the Cisco router attacks.

The malicious programme has been nicknamed "SYNful," a reference to SYN, the signal a router sends when it starts to communicate with another router, a process which the implant exploited, according to FireEye.

Network logs from infected routers suggest the attacks have been taking place for at least a year, FireEye's CEO said.

The implanted software, which duplicates normal router functions, could also potentially affect routers from other makers, DeWalt said.

Infected hardware devices include Cisco routers 1841, 2811 and 3825, FireEye said. Cisco had discontinued selling the products but still supports customers using them.

FireEye said it was only announcing its discovery after working with Cisco to quietly notify governments and affected parties. "We thought it was best to release this so everyone can fix their routers as fast as possible," DeWalt said. (Additional reporting by Joseph Menn in San Francisco; Editing by Louise Heavens and Greg Mahlich)