[wsfii-discuss] Researchers have found a new way for attackers to change critical settings on home routers.

Tracey P. Lauriault tlauriau at magma.ca
Mon Feb 26 12:30:45 UTC 2007


(osf folks please move to the new ogwifi list - 
http://list.flora.ca/mailman/listinfo/ogwifi)

Monday, February 26, 2007
Rerouting the Router
*Researchers have found a new way for attackers to change critical 
settings on home routers.*
By Rachel Ross
MIT Technology Review
http://www.technologyreview.com/printer_friendly_article.aspx?id=18231

Security experts have discovered a new kind of computer attack that 
could affect millions around the world. A simple website can be made to 
manipulate household routers--used to connect multiple home computers to 
the Internet--so that scammers can gather personal information and 
passwords.

According to researchers from _Indiana University_ 
<http://www.indiana.edu/> and the antivirus software company _Symantec_ 
<http://www.symantec.com/>, anyone with a little skill can search for 
vulnerable home routers and change critical settings so that real 
websites are secretly replaced with bogus pages asking for log-in 
information.

"The big problem is that you can't immediately see that there is a 
problem," says _Sid Stamm_ <http://www.cs.indiana.edu/%7Esstamm/>, a 
Ph.D. candidate at Indiana University's School of Informatics and one of 
the researchers on the project.

For example, an unknowing victim who types in the domain name of his or 
her bank might be greeted by a page that looks legitimate. But any 
log-in and password information that is entered on that page would go 
straight to the scammer.

At its core, the attack is an old ploy called pharming. But Stamm and 
his colleagues found a new twist: a Web page, they say, can be used to 
launch an attack against home routers and manipulate domain-name server 
settings. (There has been previous speculation that this kind of attack 
might be possible, but the researchers say they are the first to prove 
that a Web page can be used to reconfigure these particular settings on 
the router.) All the attacker needs is the user's internal Internet 
Protocol (IP) address and the password for the configuration settings on 
the router. Both, Stamm says, can often be easily acquired in a remote, 
automated attack.

First, the attacker sets up a Web page to lure victims with popular 
content, such as celebrity photos, says _Zulfikar Ramzan_ 
<http://theory.lcs.mit.edu/%7Ezulfikar/>, a senior principal researcher 
at Symantec who also worked on the router project. While the victim 
views the pictures, unseen code nabs the user's IP address and probes 
the router, looking for clues that might reveal its brand. A picture of 
the company's logo, for example, is usually saved on the router. All 
this poking around doesn't raise any red flags because the router thinks 
it's all just legitimate requests for information from the victim's home 
computer.

Once the attacker determines the router's brand, he or she can often 
guess the configuration password because many people use the 
manufacturer's default, Stamm says. While it's not known exactly how 
many routers lack adequate configuration passwords, an informal study 
published last year in the /_Journal of Digital Forensic Practice_ 
<http://www.tandf.co.uk/journals/titles/15567281.asp>/ found that 50 
percent of home users with a broadband Internet router either opted for 
the default or didn't have a password at all. (Routers have another 
optional password to stop outsiders from using a wireless network, and 
people frequently don't employ that password system either. But it is 
the configuration password specifically that is used in this attack.)

With the configuration password and IP address, the attacker can easily 
change which domain-name server the victim uses as an Internet 
directory. "It's like the attacker has replaced your phone book with a 
new one," Ramzan says. "So now you're getting addresses from the 
attacker's phone book."

The next time the victim goes to his or her bank's website, for example, 
the Web browser might be redirected to an imitation site. This fake 
site, run by the attacker, is used to capture the victim's log-in and 
password information.

Ramzan insists that this wouldn't take a lot of skill. "This particular 
attack is very powerful in that regard. The attacker doesn't have to be 
that technically sophisticated to mount it."

Fortunately, fixing the problem is also simple. "The easiest way to 
defend against this kind of attack is to change your [router's 
configuration] password," says Ramzan. Unfortunately, router 
manufacturers don't require users to establish new passwords because 
they want their software to be easy to use.

"They wanted to simplify the process, so they made it so that people 
weren't really prompted or encouraged to change the password," Ramzan 
says. "My feeling is that it's a pretty easy change [for the router 
companies] to make."

Another easy fix: make the default password unique. The password could, 
for example, be set initially to the product's serial number. While the 
attacker could still attempt to guess at the serial number, each failed 
log-in attempt would alert the user with an error message.

But Ramzan says the root of the problem isn't the configuration 
password. The real issue is that a Web page can be used to reconfigure a 
router's settings at all. That, he says, is what security experts will 
need to address going forward.

The router researchers say that they haven't yet seen anyone actually 
launch such an attack, and they hope their work will raise awareness so 
that people change their passwords before it becomes a real issue.

"It's an interesting discovery," says Jeff Gennari, an Internet security 
analyst with _CERT_ <http://www.cert.org/>, a computer-security 
coordination center established by various U.S. federal agencies, 
including the U.S. Department of Defense, and run by Carnegie Mellon 
University's Software Engineering Institute. "Uncovering these types of 
configuration problems brings to light how complicated security can be."

Copyright Technology Review 2007.




More information about the wsfii-discuss mailing list