Jump to content

According to Cisco the VPNFilter malware is worse than initially thought

Master Disaster
18 minutes ago, Blademaster91 said:

A lot of newer routers are pretty powerful with dual or quad core cpu's, should have some kind of anti-malware out of the box.

Other than the Bitdefender Box and the Norton Core, I’m not aware of any router that has an anti-virus preinstalled

There is more that meets the eye
I see the soul that is inside

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

13 minutes ago, Blademaster91 said:

Following a tutorial and setup process that would take like an hour? That is kind of a lot to ask the normal consumer IMO, especially when most modern routers you can set up in less than 5mins with a iOS/Android app, then most people set that box in the corner and never update the firmware.

Probably less than 2 if we don't count unboxing and plugging in. It's getting ridiculously easy to setup consumer products. Depends on the product though of course.

 

Just the idea of asking the average joe to read/watch a couple of tutorials and spend a couple of hours fiddling with a product that's overkill for their needs sounds absolutely ludicrous. That's when you realize how enthusiasts have lost perspective.

Link to comment
Share on other sites

Link to post
Share on other sites

29 minutes ago, Blademaster91 said:

Following a tutorial and setup process that would take like an hour? That is kind of a lot to ask the normal consumer IMO, especially when most modern routers you can set up in less than 5mins with a iOS/Android app, then most people set that box in the corner and never update the firmware.

Is one hour not worth the increased security of your internet and your personal information? If people are that lazy then they are really asking to get hacked. It's going to take a heck of a lot longer to get your stuff secure again and passwords and credit cards changed if your network is breached. Also I don't get why people are too lazy to update their stuff literally like once a week before you go to bed go into the interface click check for updates and if there are some click update and it will update and won't cause any disruptions since you'll be asleep while it's updating. It's 2018 people really need to come to terms with proper security practices and learning how to use technology as a defense instead of an open door for hackers.

Link to comment
Share on other sites

Link to post
Share on other sites

5 hours ago, sazrocks said:

That’s correct, however HTTPS often has security holes that can be created by other software (I’m looking at you, superfish).

 

That and there are an astounding number of things that STILL do not use HTTPS, even for AUTHENTICATION!

Sure but for instance, most if not all banks do use https. That greatly reduces the possibility of a man in the middle attack with devices already set up for a secure connection with said bank. Just to say that while it's clearly a big deal, its not an inevitable end of the world either.

Link to comment
Share on other sites

Link to post
Share on other sites

33 minutes ago, laminutederire said:

Sure but for instance, most if not all banks do use https. That greatly reduces the possibility of a man in the middle attack with devices already set up for a secure connection with said bank. Just to say that while it's clearly a big deal, its not an inevitable end of the world either.

I don’t see how your post disagrees with mine.

Current LTT F@H Rank: 90    Score: 2,503,680,659    Stats

Yes, I have 9 monitors.

My main PC (Hybrid Windows 10/Arch Linux):

OS: Arch Linux w/ XFCE DE (VFIO-Patched Kernel) as host OS, windows 10 as guest

CPU: Ryzen 9 3900X w/PBO on (6c 12t for host, 6c 12t for guest)

Cooler: Noctua NH-D15

Mobo: Asus X470-F Gaming

RAM: 32GB G-Skill Ripjaws V @ 3200MHz (12GB for host, 20GB for guest)

GPU: Guest: EVGA RTX 3070 FTW3 ULTRA Host: 2x Radeon HD 8470

PSU: EVGA G2 650W

SSDs: Guest: Samsung 850 evo 120 GB, Samsung 860 evo 1TB Host: Samsung 970 evo 500GB NVME

HDD: Guest: WD Caviar Blue 1 TB

Case: Fractal Design Define R5 Black w/ Tempered Glass Side Panel Upgrade

Other: White LED strip to illuminate the interior. Extra fractal intake fan for positive pressure.

 

unRAID server (Plex, Windows 10 VM, NAS, Duplicati, game servers):

OS: unRAID 6.11.2

CPU: Ryzen R7 2700x @ Stock

Cooler: Noctua NH-U9S

Mobo: Asus Prime X470-Pro

RAM: 16GB G-Skill Ripjaws V + 16GB Hyperx Fury Black @ stock

GPU: EVGA GTX 1080 FTW2

PSU: EVGA G3 850W

SSD: Samsung 970 evo NVME 250GB, Samsung 860 evo SATA 1TB 

HDDs: 4x HGST Dekstar NAS 4TB @ 7200RPM (3 data, 1 parity)

Case: Sillverstone GD08B

Other: Added 3x Noctua NF-F12 intake, 2x Noctua NF-A8 exhaust, Inatek 5 port USB 3.0 expansion card with usb 3.0 front panel header

Details: 12GB ram, GTX 1080, USB card passed through to windows 10 VM. VM's OS drive is the SATA SSD. Rest of resources are for Plex, Duplicati, Spaghettidetective, Nextcloud, and game servers.

Link to comment
Share on other sites

Link to post
Share on other sites

15 hours ago, PocketNerd said:

now if only I had the money for a pfsense router pc...

I just recently asked the same question in networking:

Its not that expensive IMO....

Edited by jagdtigger
Link to comment
Share on other sites

Link to post
Share on other sites

11 hours ago, Shorty88jr said:

I honestly don't think it would be that hard for a normal person to operate a pfSense router. Literally buy one pre built boot it up follow a couple of tutorials on YouTube of the setup process and then plug the AP in use the ubnt app scan the barcode and follow the steps. Presto the whole thing is done in like maybe an hour or 2 if you really have no clue what to do. 

 

11 hours ago, sazrocks said:

Two points here:

1. If you buy something without the slightest idea how it works, you deserve any fallout from that decision. This is part of a larger issue where the consumer needs to educate him/her self to a certain extent about what they buy.

2. Pfsense is a system designed for functionality and customizability, not plug and playability. Ubiquiti (and others) have much more cohesive and easy to setup solutions which I would recommend.

 

I agree but people are lazy and just want things to work. They don't want to have to learn stuff if they can avoid it which is sad, I know, but it's how things are these days =/

It would be nice if there was a more complete solution that was more plug and play like Ubiquiti that also was cheaper but that's probably just a pipe dream :(

 

(I was also kidding around a bit when I made my original post :P )

Current Network Layout:

Current Build Log/PC:

Prior Build Log/PC:

Link to comment
Share on other sites

Link to post
Share on other sites

11 hours ago, Weird Face said:

As an ASUS RT-AC68U owner, good to know I'm still immune (for now).

 

14 hours ago, Blademaster91 said:

My router isn't on the list either, but it's concerning to me since according to the Cisco article the list of targeted routers may not be complete. I should probably reset my router even if it isn't listed?

 

 

Just so you know, the list is only what's confirmed, not what could be vulnerable so you're almost definitely not immune, the malware just hasn't found the exploit for your box, yet.

Current Network Layout:

Current Build Log/PC:

Prior Build Log/PC:

Link to comment
Share on other sites

Link to post
Share on other sites

18 hours ago, Master Disaster said:

Would this even fire a HTTPS error though? The packet is modified en route so assuming the authentication handshake isn't compromised anything coming in after that point is fair game. It's not like the browser would know the packet isn't genuine, right? I'd love to hear from @colonel_mortis on this one, he's a genuine expert on these things.

 

Also what are PGP certificates? That's a term I've not encountered before.

The trust model of TLS (the encryption protocol used to turn HTTP into HTTPS) is designed to place no trust in any devices between you and the server that you are trying to talk to, so your router/modem/AP is not able to read or modify encrypted traffic, or redirect it to an illegitimate server, without triggering a security error (and on larger sites, including this one, the security error generated cannot be bypassed).

 

The way this works, at a very high level, is that the when you connect to the server, the server proves that it is who it claims to be, and sets up an encrypted connection with you in such a way that nobody else who listens to the conversation can figure out the encryption key, only the parties at each end (you and the server). The rest of your connection to the server is then protected by authenticated encryption, so we have a guarantee that everything we send and receive cannot be read at all, and that if it is tampered with we will be able to detect it.

 

I don't know how this particular malware operates, so if it spreads to the computer we lose all guarantees, but if it only sits on the router your encrypted traffic is safe.

 

My understanding is that PGP is a scheme for encrypting messages between people, such as emails. Most emails don't use it (that's not to say that it's rarely used, just that unless you have it set up, you won't have used it).

 

I'm not an expert though, just someone who's interested in stuff like this.

HTTP/2 203

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×