Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Botnet Bug Communications Wireless Networking Technology

A 100,000-Router Botnet Is Feeding On a 5-Year-Old UPnP Bug In Broadcom Chips (arstechnica.com) 39

An anonymous reader quotes a report from Ars Technica: A recently discovered botnet has taken control of an eye-popping 100,000 home and small-office routers made from a range of manufacturers, mainly by exploiting a critical vulnerability that has remained unaddressed on infected devices more than five years after it came to light. Researchers from Netlab 360, who reported the mass infection late last week, have dubbed the botnet BCMUPnP_Hunter. The name is a reference to a buggy implementation of the Universal Plug and Play protocol built into Broadcom chipsets used in vulnerable devices. An advisory released in January 2013 warned that the critical flaw affected routers from a raft of manufacturers, including Broadcom, Asus, Cisco, TP-Link, Zyxel, D-Link, Netgear, and US Robotics. The finding from Netlab 360 suggests that many vulnerable devices were allowed to run without ever being patched or locked down through other means. Last week's report documents 116 different types of devices that make up the botnet from a diverse group of manufacturers. Once under the attackers' control, the routers connect to a variety of well-known email services. This is a strong indication that the infected devices are being used to send spam or other types of malicious mail.
This discussion has been archived. No new comments can be posted.

A 100,000-Router Botnet Is Feeding On a 5-Year-Old UPnP Bug In Broadcom Chips

Comments Filter:
  • by Anonymous Coward on Tuesday November 13, 2018 @08:11AM (#57636490)

    no remembrance day/legitimate reparation scheduled yet? cease fire stand down.. 'whims of tyrants' game show being cancelled prior to airing? starvation & deception (our real enemies, increasing our spiritual paralysis) remain as leading killers of us with the 'weather' catching up fast.. in the moms we trust.. going to party like it's 1929? nearly all guy actors sporting recently unshaven look? just don't call it morgellons, or /. censorial?

  • by Anonymous Coward on Tuesday November 13, 2018 @08:15AM (#57636498)

    In other news, water is wet.

    Unless you want to follow that up with an article about a major ISP trying to pawn vulnerabilities in its own hardware off on its consumers, it isn't news.

    • by Anonymous Coward on Tuesday November 13, 2018 @08:26AM (#57636552)

      Why do they call it universal? Itâ(TM)s never truly universal. Sure, a major brand supports it and it seems universal. Sometimes you spend an inordinate amount of time trying to cancel the pnp wizard so you can just download drivers. Up to half of my device have zero support from pnp but the rest work as advertised. I feel bad for the average user who may not figure it out. A little expertise goes a long way. As far as botnets go, I seriously doubt they counted right. That net could be anywhere. The fixation on hacking with bots too shrill. A good router will keep all the nasty stuff away better than any antivirus even though they can seem pricy

      • by Z00L00K ( 682162 ) on Tuesday November 13, 2018 @10:10AM (#57637040) Homepage Journal

        The only way to use UPnP - turn it off! It's a security hole the size of Grand Canyon.

      • by shaitand ( 626655 ) on Tuesday November 13, 2018 @10:10AM (#57637046) Journal
        In case you aren't joking, upnp is "Universal Plug and Play (UPnP) is a set of networking protocols that permits networked devices, such as personal computers, printers, Internet gateways, Wi-Fi access points and mobile devices to seamlessly discover each other's presence on the network and establish functional network services"

        It is completely different from plug and play discover of devices within your machine. It is basically a protocol that lets malware, worms, etc forward ports for themselves in your router. The entire protocol is a massive security bug implemented across pretty much all consumer routers because of a combination of software vendors not bothering to document needed ports, being too lazy to actually maintain consistency and a small footprint on ports, and people being too dumb to educate themselves on how to open ports.

        Sadly, many console gaming systems just assume you are running it and play fast and loose on ports, requiring people to run completely unsecured or not fully enjoy their console.

        For those of us who don't game, the choice has always been simple, just say no to upnp.
  • by Anonymous Coward on Tuesday November 13, 2018 @08:24AM (#57636540)

    How can I know if my router is one of them?

    • by Anonymous Coward on Tuesday November 13, 2018 @08:31AM (#57636570)

      Email the manufacturer

    • by ledow ( 319597 ) on Tuesday November 13, 2018 @08:50AM (#57636676) Homepage

      A) Do you have UPnP enabled.
      B) If yes, turn it off.

      UPnP is an *UTTERLY UNNECESSARY* service (speaking as an IT Manager, gamer, and someone who hosts gaming servers etc.), that when exposed to the Internet allows ANY local device to forward ANY network port to ANY IP/port combination with NO authentication whatsoever.

      Even privileged ports and local ports.

      I can literally redirect your port 139 (e.g. CIFS/SMB) to a host on the Internet if I wanted, or open command/control ports and punch holes through your firewall wherever I want.

      All this is is a UPnP flaw that allows you to do the same remotely, but literally any device on your local network can already do it without any logs, authentication, or notification that they are doing so (e.g. your ChromeCast / laptop / Amazon Echo / Nest doorbell could be opening up your telnet port and sending it to themselves once every hour, and you'd pretty much never know anything about it).

      Turn it off. Watch how nothing changes and all your systems still work as intended.

      And, if you absolutely, 100% must host servers on your own connection (not just "play games" but literally host servers with no matchmaking servers present) then you add a single port-forward yourself and job-done.

      P.S. No, this does not affect local device discovery, etc. so your Chromecast etc. will still work perfectly fine on your home network anyway.

      Case in point: I've never had UPnP turned on on anything, I have 1000 Steam games that play just fine, plus ChromeCasts and all kinds of kit. Not a single problem.

      • by Woldscum ( 1267136 ) on Tuesday November 13, 2018 @09:02AM (#57636722)

        Quite a few wireless inkjet printers need it and WPS to connect to a network. Cannons for instance.

        • by King_TJ ( 85913 ) on Tuesday November 13, 2018 @09:35AM (#57636854) Journal

          Quite frankly, the inexpensive consumer-grade inkjet printers do a generally awful job of networking, across the board.

          One of the big issues I've encountered is that almost all of the wi-fi enabled printers still only support the 2.4Ghz band, which tends to become very crowded with SSIDs if you're in a multi-story office or apartment complex. So not only can you struggle to get a wireless frequency that's usable and reliable, but often, the number of SSIDs exceeds the memory allocated to display them in a scrolling list on the printer's front panel! I've had HP DeskJet printers that would only let you select your own wireless SSID one out of every 2 or 3 times you did a scan for them, because there were too many in the list and it truncated a bunch of them.

          I'm not sure why a wireless printer would require uPnP support enabled on a router though? As far as I've ever seen, the uPnP thing on the router only exists as an attempt to automate the process of opening firewall ports for applications that require them. With it disabled, you should still be able to get anything to work on your LAN by finding out what ports it actually uses to communicate with the outside world and manually port forwarding them to those devices, in your router.

          (Disabling it doesn't stop your devices on your local network from doing automatic searches or scans. So for example, a printer driver should be able to auto-detect a new inkjet printer you connected to your LAN by probing for its MAC address, regardless of uPnP being enabled.)

          • by Anonymous Coward on Tuesday November 13, 2018 @11:45AM (#57637640)

            To support printing from mobile devices while away from home. Lets you print while on the go and grab it off your printer when you return home

            • by Anonymous Coward on Tuesday November 13, 2018 @12:20PM (#57637876)

              To support printing from mobile devices while away from home. Lets you print while on the go and grab it off your printer when you return home

              You are willing to expose yourself to a serious security hole because you are unwilling to wait 5 minutes inside your own home for something to print?

              How selfishly "I WANT IT NOW!" can you get?

              • by Anonymous Coward on Wednesday November 14, 2018 @01:22AM (#57640838)

                I don't worry about that cause i use google print services which doesn't do this lame UPnP bullshit. It creates a tunnel out to google's print services, your mobile device then connects to google's print services and pushes the print job though the tunnel.

                And yes this kind of stuff does come in handy sometimes. Lets say you're mobile and purchase something and want a hard copy receipt or a printed ticket. You may or may not be able to go back at a later time and bring up that page to print it out. But with these mobile print services you just hit print, your job fires off though the internet back to your printer at home and your hard copy awaits your return be it hours or days later.

                Yes of course you have to trust that your print job is passing though googles services, if you want to accept that, its up to you. But google's print services are just about the only way to get seamless OS wide printing on Android. You cannot map SMB shared printers to an android device, whats more such a setup would also require you to establish a VPN connection back to your home to talk to the SMB shared printer, something the average joe doesn't have the knowledge or care to do.

        • by ledow ( 319597 ) on Tuesday November 13, 2018 @09:44AM (#57636906) Homepage

          No.

          They don't.

          And if they do, stop buying them.

          But they don't.

          Literally, it's "auto-port-forwarding". Any printer that NEEDS that, you don't want. Not even Google Cloud Print requires that.

          WPS is entirely unrelated.
          UPnP "Discovery" over the local network is entirely unrelated (and not affected by turning off UPnP on the router) - that's the only mention of UPnP that I can find on any of Canon's sites... they are talking about allowing UPnP through the software firewall on a client machine so it can talk over the local network - NOT on the router at all.

        • by Anonymous Coward on Tuesday November 13, 2018 @05:01PM (#57639408)

          I was very unhappy to discover this. The drivers won't even allow you to configure network settings manually. I ended up turning it on long enough to get the printer set up and then turned all that crap off and the printer continues working....

      • by gweihir ( 88907 ) on Tuesday November 13, 2018 @09:42AM (#57636892)

        Also, UPnP is just another extreme fuckup by Microsoft.

      • by drinkypoo ( 153816 ) <drink@hyperlogos.org> on Tuesday November 13, 2018 @10:19AM (#57637094) Homepage Journal

        "Case in point: I've never had UPnP turned on on anything, I have 1000 Steam games that play just fine, plus ChromeCasts and all kinds of kit. Not a single problem."

        This is probably true today. Games are now designed to work without it. However, back when upnp was introduced it was the only reasonable way for non-network admins to get a hole through their firewall. And yes, it was necessary just to play online, not only for hosting.

        As an it manager, you probably ought to know this already. Some legacy software won't work without it.

      • by Anonymous Coward on Tuesday November 13, 2018 @02:41PM (#57638704)

        Ffs.

        You do realise most attacks these days don't need ports open to work.

        Its really not as much a security risk as people claim honestly

  • by Anonymous Coward on Tuesday November 13, 2018 @08:28AM (#57636556)

    Suprise !

    =insert maniacal laughter here=

  • by Anonymous Coward on Tuesday November 13, 2018 @08:53AM (#57636692)

    My router is so old nobody has the instruction manual for it anymore.

    • by Anonymous Coward on Tuesday November 13, 2018 @10:17AM (#57637080)
      Two soup cans and some twine? It's important to keep the data pipeline tensioned on those, otherwise you get low SNR and packet loss.
    • by Anonymous Coward on Tuesday November 13, 2018 @10:31AM (#57637178)

      Nobody keeps instruction manuals for networking equipment, those are always available as PDFs from the vendor. Surely no still functioning Internet equipment is too old for that?

  • by 140Mandak262Jamuna ( 970587 ) on Tuesday November 13, 2018 @09:26AM (#57636820) Journal
    Spokesman for Broadcom, Corpor Atethief has responded to these news reports:

    "The botnet is run by criminals and instead of blaming the criminals, and the ineptitude of the law enforcement, the narrative has been to attack the job creators and the legitimate businesses. Broadcom has created thousands of jobs and has created millions of dollars for its shareholders. It would be really unfortunate if such stellar corporate performance is undone due to onerous job killing regulations by the Washington bureaucrats. We call for the government to catch the criminals and bring them to justice.

    We also take this time to announce our new great business venture. We are getting into home building. We hope to make homes more affordable by removing useless things like locks and latches. They interfere with the aesthetics of the homes without significantly adding to the comfort and the utility of the home. Being the job creators, we implore the municipalities to do their job of law enforcement, so that we dont need these locks and latches and other security devices. As a publicly traded company, it is our mission to use other people's money to make huge load of profits, take as much as possible as executive compensation, throw some bones to the wall street and externalize as much of our costs as possible, because we are job creators."

  • by Anonymous Coward on Tuesday November 13, 2018 @09:47AM (#57636918)

    2 years ago I switch my home network to ubiquity. So far.. no problems.

  • by foxalopex ( 522681 ) on Tuesday November 13, 2018 @12:01PM (#57637752)

    uPnP is almost useless in that it automatically allows your OS that supports it to crack a hole into the real world right through your NAT firewall. I've always disabled it because it sounds like a security risk and ontop of that in many cases it was pretty buggy.

  • by Anonymous Coward on Tuesday November 13, 2018 @12:50PM (#57638044)

    This is old news. Right? I've been disabling this function on every router I've owned since reading that it is a security risk in 2008 or 2009.

  • by RoadKill ( 9645 ) on Tuesday November 13, 2018 @09:45PM (#57640458)

    Read the security report carefully. This is *not* a bug in "Broadcom chips". It is a bug that exists in an open-source package (miniupnp) that was used by certain vendors for their wireless routers. Please fight the FUD.

  • by Anonymous Coward on Wednesday November 14, 2018 @06:37AM (#57641456)

    I transfered residence 3 years ago and naturally applied for a new Fibre connection, was suprised when I discovered that the new router freely supplied by the ISP had so many opened ports including UPnP port. I emailed my ISP on why this is open by default and how I can close it because there's no kill command on the shell console of the router, the usual answer is that this is beyond the job of the technician and I need to contact the programmers who built the router. The company who built this router is on the same region but different country. What's the best course of action now, whith this new UPnP issue popped up in tech news sites. I can probably buy a new router but there seems to be some hard coded keys and router MAC address which is related to my current ISP subscription.

"To take a significant step forward, you must make a series of finite improvements." -- Donald J. Atwood, General Motors

Working...