Hackers Are Targeting Cisco Network Switch [HACKERS ON FIRE]

Hackers Are Targeting Cisco Network Switch

Since yesterday, a new hacking group, calling itself ‘JHT,’ hijacked a significant number of Cisco devices belonging to organizations in Russia and Iran, and left a message that reads—”Do not mess with our elections” with an American flag (in ASCII art).

Dangers of the Cisco smart installation customer flaw

The flaw in Cisco smart install consumer allows attackers to run arbitrary code on vulnerable switches. Kaspersky Lab saidthe assault hit data centers and net providers throughout the globe; the attackers might “rewrite the Cisco IOS image on theswitches and trade the configuration report, leaving a message that reads ‘Do no longer mess with our elections’ there. The transfer then turns into unavailable.”

Cisco switch flaw led to attacks on critical infrastructure in several countries

Kaspersky Lab brought that the assault changed into “basically concentrated on the Russian-speaking phase of the netbutdifferent segments are clearly more or less affected as well.”
MJ Azari Jahromi, Iranian Communication and Information Technology Minister, said the campaign impacted approximately 3,500 network switches in Iran, though a majority of them were already restored.

The hacking group is reportedly targeting vulnerable installations of Cisco Smart Install Client, a legacy plug-and-play utility designed to help administrators configure and deploy Cisco equipments remotely, which is enabled by default on Cisco IOS and IOS XE switches and runs over TCP port 4786.

Some researchers believe the attack involves a recently disclosed remote code execution vulnerability (CVE-2018-0171) in Cisco Smart Install Client that could allow attackers to take full control of the network equipment.

Nation-state hackers hit Cisco switches

Hackers, some of them backed by a nation-state, have attacked Cisco switches in multiple countries, the tech giant’s cyberthreat intelligence division has revealed.

Some of the attacks “are believed to be associated with nation-state actors, such as those described” in a recent Department of Homeland Security report that said Russian government hackers were targeting multiple U.S. industries, Cisco said.

The campaign disclosed by Cisco exploits a protocol in a tool called Cisco Smart Install Client that installs switches. The protocol can be abused to conduct a series of actions, including modifying a server setting, to let an attacker execute Cisco networking software commands. Cisco used the scanning tool Shodan to identify more than 168,000 systems that could be vulnerable to this attack.

However, since the hack apparently resets the targeted devices, making them unavailable, Cisco believes hackers have been merely misusing the Smart Install protocol itself to overwrite the device configuration, instead of exploiting a vulnerability.

How to Hack your school Server to download Final Exam Answers

“The Cisco Smart Install protocol can be abused to modify the TFTP server setting, exfiltrate configuration files via TFTP, modify the configuration file, replace the IOS image, and set up accounts, allowing for the execution of IOS commands,” the company explains.

Chinese security firm Qihoo 360’s Netlab also confirms that that hacking campaign launched by JHT group doesn’t involve the recently disclosed code execution vulnerability; instead, the attack is caused due to the lack of any authentication in the Cisco smart install protocol, reported in March last year.

According to Internet scanning engine Shodan, more than 165,000 systems are still exposed on the Internet running Cisco Smart Install Client over TCP port 4786.

Since Smart Install Client has been designed to allow remote management on Cisco switches, system administrators need to enable it but should limit its access using Interface access control lists (ACLs).

Administrators who do not use the Cisco Smart Install feature at all should disable it entirely with the configuration command—”no vstack.”

Although recent attacks have nothing to do with CVE-2018-0171, admins are still highly recommended to install patches to address the vulnerability, as with technical details and proof-of-concept (PoC) already available on the Internet, hackers could easily launch their next attack leveraging this flaw.

 

 

Leave a Reply

Your email address will not be published. Required fields are marked *