iTnews Asia
  • Home
  • News
  • Security

Fancy Bear used old SNMP bug to infect routers

Fancy Bear used old SNMP bug to infect routers

Cisco vuln from 2017 exploited in malware campaign, UK and US warn.

By Richard Chirgwin on Apr 19, 2023 10:28AM

Since 2021, Russia’s APT28 hackers – also known as Fancy Bear and other names – have been recruiting older, unpatched Cisco routers into a malware operation.

In a joint advisory, the UK National Cyber Security Centre (NCSC), and the US' National Security Agency, Cybersecurity and Infrastructure Security Agency and the FBI have laid out the APT28 exploitation tactics.

The vulnerability exploited by the attackers was CVE-2017-6742, a bug in the Simple Network Management Protocol (SNMP) implementation shipping with the then-current version of Cisco’s IOS XE software.

Once a vulnerable router was compromised, SNMP also let the attackers obtain sensitive information about the network behind the router.

“A number of software tools can scan the entire network using SNMP, meaning that poor configuration such as using default or easy-to-guess community strings, can make a network susceptible to attacks”, the UK advisory said.

“Weak SNMP community strings, including the default ‘public’, allowed APT28 to gain access to router information. APT28 sent additional SNMP commands to enumerate router interfaces.”

The attackers also reconfigured compromised units to use the SNMP v2 protocol, which doesn’t support encryption.

The attackers then deployed to the router malware called Jaguar Tooth, which the agencies said collects device information, exfiltrates data using the Trivial File Transfer Protocol, and enables unauthenticated backdoor access.

Once in control of the router, attackers were also able to use the compromised device's command line interface to discover other devices on the network, using the Address Resolution Protocol (ARP).

Cisco’s 2017 advisory did not nominate hardware devices subject to the vulnerability, but rather listed nine vulnerable SNMP Management Information Bases (MIBs), and told users disabling those MIBs would protect the routers.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
apt28 cisco fancy bear security

Related Articles

  • The best way to outsmart your threat actors is to think like one
  • How cybercriminals are exploiting LLMs to harm your business
  • Is identity now the next parameter of cybersecurity breaches?
  • Cybersecurity threats CISOs should be most worried about in 2025
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

The best way to outsmart your threat actors is to think like one

The best way to outsmart your threat actors is to think like one

What are the most pressing cyber security concerns going into 2025?

What are the most pressing cyber security concerns going into 2025?

Malaysia ramps up cyber security defense to stem rising fraud and ransomware attacks

Malaysia ramps up cyber security defense to stem rising fraud and ransomware attacks

How cybercriminals are exploiting LLMs to harm your business

How cybercriminals are exploiting LLMs to harm your business

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.