iTnews Asia
  • Home
  • News
  • Security

APT28 is recruiting Ubiquiti EdgeRouters into botnets

APT28 is recruiting Ubiquiti EdgeRouters into botnets

Russian actors spread malware via compromised routers.

By Richard Chirgwin on Feb 28, 2024 11:47AM

Security agencies led by the FBI, the National Security Agency, and the US Cyber Command are warning that state-sponsored Russian actors are leading coordinated attacks on Ubiquiti’s EdgeRouter products.

The APT28 (aka Fancy Bear, Forest Blizzard or Strontium) attackers exploit EdgeRouters all over the world to harvest credentials, collect NTLMv2 digests, proxy network traffic, and host spear-phishing landing pages and custom tools, an advisory [pdf] warns.

The advisory notes the global popularity of the EdgeRouter device.

EdgeRouters, it said, "are often shipped with default credentials and limited to no firewall protections to accommodate wireless internet service providers (WISPs)."

“Additionally, EdgeRouters do not automatically update firmware unless a consumer configures them to do so.”

APT28 has been using exploited devices since at least early 2022, the advisory stated.

In their attacks, APT28 uses trojanised OpenSSH server processes typically associated with the Mirai-based Moobot botnet, with infection via vulnerabilities such as default credentials.

The attackers install custom Python scripts on compromised devices, to “collect and validate stolen webmail account credentials”, the advisory said.

Some of the compromised EdgeRouters are also recruited to form a command-and-control infrastructure to distribute MASEPIE backdoors.

MASEPIE is a small Python backdoor that can also execute commands on victim machines. APT28 wrote it in December 2023.

Mitigations listed in the advisory include a factory reset to the affected router, upgrading to the latest firmware version, changing all default credentials, and using firewall rules to block protect management services.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
apt28 fbi nsa security ubiquiti

Related Articles

  • The best way to outsmart your threat actors is to think like one
  • How cybercriminals are exploiting LLMs to harm your business
  • Is identity now the next parameter of cybersecurity breaches?
  • Cybersecurity threats CISOs should be most worried about in 2025
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

The best way to outsmart your threat actors is to think like one

The best way to outsmart your threat actors is to think like one

What are the most pressing cyber security concerns going into 2025?

What are the most pressing cyber security concerns going into 2025?

Malaysia ramps up cyber security defense to stem rising fraud and ransomware attacks

Malaysia ramps up cyber security defense to stem rising fraud and ransomware attacks

How cybercriminals are exploiting LLMs to harm your business

How cybercriminals are exploiting LLMs to harm your business

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.