Story image

ACSC confirms backdoor attacks on Aussie firms through Cisco switches & routers

18 Aug 2017

Hackers may be collecting configuration files from routers and switches used by a number of Australian organisations, but the threat doesn’t appear to be affecting home users yet.

The Australian Cyber Security Centre (ACSC) issued an alert this week which says that switches with Cisco Smart Install that are accessible from the internet, as well as switches or routers with Simple Network Management Protocol (SNMP) enabled and exposed to the internet are at risk of being hacked.

ACSC says that the configuration files could contain device administrator credentials and other information, which could then be used to attack the router or switch and then compromise any other devices using the network.

If attackers compromise devices, they could potentially gain access to information sent from and to those devices.

ACSC suggests that administrators who know devices can be directly managed from the internet should review logs for any suspicious activities.

In Febuary this year, security research firm Talos found evidence that attackers were scanning infrastructure with the aim of finding Cisco Smart Install clients and using them to uncover customer configurations.

“We are aware that a tool to scan for affected systems, called the Smart Install Exploitation Tool (SIET), has been publicly released and is available here. This tool may be being used in these attacks,” Talos said in its blog.

Cisco added that if customers find devices that have Smart Install enabled, they should disable the software immediately through the no vstack configuration command.

Those activities could include:

  • configurations or command output obtained by external sources via TFTP
  • SNMP queries from unexpected sources
  • configuration of unexpected GRE tunnels.

While ACSC did not explicitly state which Australian organisations have been affected by the attacks, it has provided a list of tips to minimise threats to individuals and their organisations:

  • Disable SNMP Read/Write if not strictly required (consider disabling SNMP entirely if not required). If SNMP Read/Write is required, then at least one of the following two options should be put in place: EITHER ensure the SNMP service cannot be connected to untrusted sources OR upgrade to SNMPv3 and change all community strings.
  • Implement Access Control Lists (ACL) to restrict SNMP access to your network management platform AND configure anti-spoofing at the edge of your network so that spoofed packets claiming to be sent from your network management platform are dropped.
  • Disable Cisco Smart Install if not strictly required. Cisco has published advice to prevent misuse of the Smart Install feature.
GitHub launches fund to sponsor open source developers
In addition to GitHub Sponsors, GitHub is launching the GitHub Sponsors, GitHub will match all contributions up to $5,000 during a developer’s first year in GitHub Sponsors.
Check Point announces integration with Microsoft Azure
The integration of Check Point’s advanced policy enforcement capabilities with Microsoft AIP’s file classification and protection features enables enterprises to keep their business data and IP secure, irrespective of how it is shared. 
Why AI will be procurement’s greatest ally
"AI can help identify emerging suppliers, technologies and products in specific categories."
Are AI assistants teaching girls to be servants?
Have you ever interacted with a virtual assistant that has a female-based voice or look, and wondered whether there are implicitly harmful gender biases built into its code?
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
Data#3 to exclusively provide MS licences to WA Government
The technology services provider has won two contracts with the Western Australia Government, becoming its sole Microsoft licence provider.
Why cash is no longer king in Australia
Australia is leading the way in APAC for granting credit on B2B transactions.