Gateway For Hackers

The device that connects us to the Internet is dangerously vulnerable, security experts say. And while there are some signs of impending improvements, not much has happened in the past several years, while the threats have grown

It is generally accepted in IT that the weakest link in the security chain is the fallible and frequently careless human.

But a close second, many experts say, is the router – the device that connects people to the Web, sometimes called “the backbone of the Internet”, which is dangerously vulnerable to skilled hackers.

Those experts have been issuing alarms for some time, but they say that, so far, things have not changed much. Dan Geer, chief information security officer at the venture capital firm In-Q-Tel and an adviser to US intelligence agencies, speaking to a conference in Cambridge, Mass., more than a year ago, said most routers are almost comically insecure, given that they have, “drivers and operating systems amounting to snapshots of the state of Linux, plus the lowest-end commodity chips extant at the time of the router’s design.”

The only way to fix the problem, he said, would be to, “unplug all the devices, throw them in the dumpster and install all new ones.” Even that wouldn’t fix it either, because the new ones are, “likely to have the same vulnerability spectrum that made this possible in the first place,” he said.

Jim Gettys, a systems architect, said last year that he had inventoried the age of the packages inside a number of routers, “and they are three to four years old on Day One. And without an update stream, you start with existing vulnerabilities, and it just gets worse from there.”

Bruce Schneier, encryption guru and CTO at Resilient Systems, wrote more than a year ago in a blog post that, “the computers in our routers and modems are much more powerful than the PCs of the mid-1990s,” and warned that if security vulnerabilities in them are not fixed soon, “we're in for a security disaster, as hackers figure out that it's easier to hack routers than computers.”

Such security holes can allow hackers to access files, install malware on a network or use a victim’s security cameras to spy on him, without needing access to the computer hardware.
In a more recent interview with Network World this past April, Schneier said basically the same thing Geer had said a year earlier: “Do you know the way you patch your home router? You throw it away and buy a new one. And that is going to be a freakin' disaster … Low cost, binary blobs, no one knows how they work, there's no one to update them, lots of vulnerabilities, and we're just stuck with it.”
And even if updates are available, they are too difficult to install for the average user, said Lawrence Munro, director at Trustwave.
“The key issue is that upgrading is almost always a manual process that is likely beyond the skill level of a home-user,” he said, “and patches aren’t available quickly in many cases.”
“The key issue is that upgrading is almost always a manual process that is likely beyond the skill level of a home-user.”
Indeed, last December, US-CERT, part of the Department of Homeland Security, warned broadband router manufacturers about a vulnerability called “Misfortune Cookie” that been patched more than 10 years ago, but was still present on many deployed devices.

Researchers at Check Point’s malware and vulnerability group, who came up with the name, noted that, “if your gateway device is vulnerable, then any device connected to your network – including computers, phones, tablets, printers, security cameras, refrigerators, toasters or any other networked device in your home or office network – may have increased risk of compromise.”

Mark Stanislav, senior security consultant at Rapid7, noted this week that in a contest at last year’s Def Con, hackers were able to demonstrate 15 zero-day vulnerabilities in more than a half-dozen of the most common Small Office/Home Office (SOHO) routers, including models from Asus, Netgear, DLink, Belkin, Linksys, Actiontec and Trendnet.
Not surprisingly, the contest was titled, “SOHOpelessly Broken.”
If it really is this bad, however, it would seem there would be more stories about disastrous takeovers of networks. Yet while mainstream media regularly report on major hacks, there are few, if any, headlines about router compromises.
“(Automatic firmware updates) can create new problems, especially if the user is unaware of the firmware being updated.”
That, Stanislav said, is probably in part because the average consumer may not even know what a router is. And, “the impact to an individual or their home network isn't necessarily easy to determine without a very specific review of how their device was configured, what vendor it's from, and what firmware it's running,” he said.
“It’s a much more layered and nuanced story than, ‘Company X was hacked, your data is now a risk.’”
Robert Siciliano, online safety expert for Intel Security, agreed. “If the flaw is too complicated for mass media to break down for the general public, they avoid discussing it,” he said.
Munro agreed, but said it is also because the media don’t find it that exciting – at least yet. Remotely hacking a car and causing it to crash catches public attention much more than explaining how a router is vulnerable.
Gettys said he thinks it is because, “it hasn't yet hurt in the pocket book at sufficient scale in the US,” but warns that the hurt is coming.
“People have not realized just how insecure these devices are, or what mischief this can cause for the customers and others – they are being increasingly used as part of botnets to attack others,” he said.
“People have not realized just how insecure these devices are, or what mischief this can cause for the customers and others.”

If there is any promising news to report, it is that there seems to be a growing awareness among developers and manufacturers that there is a problem.
“IoT (Internet of Things) devices in general are starting to focus more on easy firmware updates – automated processes that don't require user intervention, and overall longevity of hardware updates,” Stanislav said.
“This will, ideally, trickle down into the SOHO router market eventually. As design patterns and technical challenges are overcome, disseminating updates quickly will become easier for manufacturers.”
Gettys said he is hearing behind the scenes that there may be some improvements, “in not-yet-announced products; but I leave that to the manufacturers and service providers announcements to come.
“But even with these glimmers of hope, I'm discouraged, as the economic foundation of the problem has not changed,” he said, adding that changes in the law making the manufacturers of routers liable for security breaches is the only solution.

“The idea that someone can ship a product and not have any liability for even basic maintenance and upgrade of the software it contains for its expected lifetime must change,” he said. Without it, “new entrants who do a better job won't see a reward, and will have higher costs”
Stanislav said he has seen some vendors, “take a more cloud-based approach, where updates are an ongoing process that require less user intervention. But that can create new problems, especially if the user is unaware of the firmware being updated.
“We saw some outrage in 2012 for this type of auto-upgraded firmware from Linksys. This is a balancing act that vendors are still figuring out how to weigh,” he said.
Until major improvements occur, experts collectively recommend a number of steps consumers can take that won’t solve the problem entirely, but will make them less of a target than the average user:
•    Change the default password to one that is unique, long and complex.
•    If it is impossible to upgrade your router, buy a new one that does allow it. According to Munro, “the open-source community has offered alternatives for users by creating projects such as OpenWRT and Tomato, which provide open-source firmware to replace the vendor’s on common hardware platforms.” But, implementing them, “requires a reasonable level of IT skill,” he said.
•    Make sure that uPnP (Universal Plug and Play) is off.
•    Read the manual, and turn off or disable other features you may not need.
•    If your Internet service provider offers a combined router/modem, this could pass some of the responsibility for hardware updates onto it.
If you have the expertise, install OpenWRT. “But that’s not something grandma and grandpa will be capable of,” Gettys said.

CSO Online

 

« Has The US Become Complacent About Resisting Cyber Attacks?
Cyber War Pre-emption Is The Key to Defense »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CW Jobs

CW Jobs

CWJobs.co.uk is a leading specialist IT recruitment website covering all areas of IT including Cyber Security.

Skurio

Skurio

Skurio create cost-effective, intuitive and powerful Cloud based solutions to identify threats, detect data breaches outside the network and automate the response.

SynerComm

SynerComm

SynerComm is an IT solution provider specializing in network and security infrastructure, enterprise mobility, remote access, wireless solutions, audit, pentesting and information assurance.

Bottomline Technologies

Bottomline Technologies

Bottomline Technologies is an innovator in business payment automation technology, helping companies make complex business payments simple, smart and secure.

Anglo African

Anglo African

Anglo African is an information technology firm providing end-to-end solutions to different industries, from IT Infrastructure to DataCom as well as Cloud & InfoSec services.

Advens

Advens

Advens is a company specializing in information security management. We provide Consultancy, Security Audits and Technology Solutions.

ZeroNorth

ZeroNorth

ZeroNorth provides a new approach to improve software and infrastructure security, simplify continuous compliance reporting and to create more cost-effective risk management programs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Micro Strategies Inc.

Micro Strategies Inc.

Micro Strategies provides IT solutions that help businesses tackle digital transformation in style.

Carbonite

Carbonite

Carbonite offers all the tools necessary for protecting data from the most common forms of data loss, including ransomware, accidental deletions, hardware failures and natural disasters.

Scout Ventures

Scout Ventures

Scout Ventures is an early stage venture capital firm that is making the world a better, safer place by cultivating standout frontier technologies.

Ackcent Cybersecurity

Ackcent Cybersecurity

Ackcent's mission is to help our clients to protect their critical digital assets by providing them with a portfolio of specialised professional services.

drie

drie

drie is an end-to-end cloud services company based in Bahrain, Dubai and London. We enable businesses to adopt, scale on and build for cloud.

Spohn Solutions

Spohn Solutions

Spohn combines highly-experienced staff with a vendor neutral approach to deliver optimal solutions for IT Security and Compliance.

RiskOptics

RiskOptics

RiskOptics (formerly Reciprocity) equips organizations with one of the most intuitive and powerful information security and cyber risk management solutions in the market.

EK3 Technologies

EK3 Technologies

EK3 Technologies mission is to provide comprehensive cybersecurity and IT solutions that allow our clients to focus on sustaining their business.