[LINK] Wired: 'Typhoon Spies Hack Cisco Routers'
Roger Clarke
Roger.Clarke at xamax.com.au
Fri Feb 14 08:41:56 AEDT 2025
China’s Salt Typhoon Spies Are Still Hacking Telecoms—Now by Exploiting
Cisco Routers
ANDY GREENBERG
Wired
FEB 13, 2025 12:00 AM
https://www.wired.com/story/chinas-salt-typhoon-spies-are-still-hacking-telecoms-now-by-exploiting-cisco-routers/
...
> To carry out this latest campaign of intrusions, Salt Typhoon—which
Recorded Future tracks under its own name, RedMike, rather than the
Typhoon handle created by Microsoft—has targeted the internet-exposed
web interfaces of Cisco's IOS software, which runs on the networking
giant's routers and switches. The hackers exploited two different
vulnerabilities in those devices' code, one of which grants initial
access, and another that provides root privileges, giving the hackers
full control of an often powerful piece of equipment with access to a
victim's network.
>
> “Any time you're embedded in communication networks on infrastructure
like routers, you have the keys to the kingdom in what you're able to
access and observe and exfiltrate,” Gundert says.
>
> Recorded Future found more than 12,000 Cisco devices whose web
interfaces were exposed online, and says that the hackers targeted more
than a thousand of those devices installed in networks worldwide. Of
those, they appear to have focused on a smaller subset of telecoms and
university networks whose Cisco devices they successfully exploited. For
those selected targets, Salt Typhoon configured the hacked Cisco devices
to connect to the hackers' own command-and-control servers via generic
routing encapsulation, or GRE tunnels—a protocol used to set up private
communications channels—then used those connections to maintain their
access and steal data.
>
> When WIRED reached out to Cisco for comment, the company pointed to a
security advisory it published about vulnerabilities in the web
interface of its IOS software in 2023. “We continue to strongly urge
customers to follow recommendations outlined in the advisory and upgrade
to the available fixed software release,” a spokesperson wrote in a
statement.
______
That range a bell.
In an interview with IEEE Spectrum, many years ago, I speculated that
not only would Chinese-manufactured backbone routers contain trapdoors
for the PRC to exploit, but that Cisco and Juniper would have no
alternative but to comply with the same requirement.
I expressed concern that normal economic path-of-least-resistance would
mean that those trapdoors would end up in the backbone routers sold
everywhere else in the world, with or without any intent on the part of
Cisco, Juniper or the NSA.
Ah, I archived the article. Steven Cherry wrote on 1 Jun 2005:
http://www.rogerclarke.com/II/Cherry-2005.pdf
> ... The issue of how China continues to censor its Internet, even as
its infrastructure becomes vastly more sophisticated, has implications
beyond what ideas China’s populace—almost one-fifth of humanity—will be
allowed to tap into. For one thing, if censorship technology flourishes
in China, it will be easier and cheaper for it to also take root
elsewhere. “The concern I have is that this is laying the foundation for
a much more intrusive and censorship-friendly Internet infrastructure
for all countries,” says Roger Clarke, a consultant in Canberra,
Australia, affiliated with the Australian National University. “The
features that China wants installed in intermediating devices and
software will gradually find their way into all of the suppliers’
products, if only because it’s cheaper that way.”
...
> In an interview, [journalist Ethan] Gutmann reiterated a charge
documented in his book that China “could not have controlled this
radical new means of communication without overwhelming technical
assistance from North American corporations.” In his book he quotes,
among other sources, unnamed Cisco representatives and a non-Cisco
Internet engineer, identified only as Wen, who all claim that Cisco
modified its equipment and software at the censors’ bidding.
(I wasn't aware of Gutmann's book at the time. ]
--
Roger Clarke mailto:Roger.Clarke at xamax.com.au
T: +61 2 6288 6916 http://www.xamax.com.au http://www.rogerclarke.com
Xamax Consultancy Pty Ltd 78 Sidaway St, Chapman ACT 2611 AUSTRALIA
Visiting Professorial Fellow UNSW Law & Justice
Visiting Professor in Computer Science Australian National University
More information about the Link
mailing list