Netgear Routers under Attack. Learn how to Protect Yourself!
- Read 4,982 times
Threatpost has posted a story about a previously disclosed Netgear exploit that is now publicly being used to hack Netgear routers. This exploit allows a remote user to gain access to the administrative section of your router without knowing your login credentials as long as Remote Administration is enabled. Once the router is exploited, attackers are modifying its DNS server settings so that any DNS requests are being routed to DNS servers under the attacker's control. This allows the attacker to perform man-in-the-middle attacks or redirect users to fake banking and shopping sites in order to steal credit card information or account credentials. It has been reported that approximately 10 thousand routers have been affected by this vulnerability.
This exploit was first discovered by Compass Security who informed Netgear about the vulnerability on July 21st, 2015. A month later, Netgear sent them a beta firmware to be tested and Compass confirmed that the vulnerability was fixed. Unfortunately, Netgear never released the firmware to the public and thus this vulnerability still exists. On September 29th, 2015, Shellshock Labs also discovered the vulnerabilty and publicly disclosed it. On further research, it looks like variants of this vulnerability have been around since April of 2013!
It has since been discovered that attackers are now using this vulnerability and approximately 10,000 routers have been hijacked. As there is no available firmware updates that resolves this issue, it is important that all Netgear users disable Remote Administration on their routers as a precaution. To be honest, unless you absolutely need it, all remote administration on all routers should be disabled as it is a potential door into your network. The known Netgear firmwares that are affected by this vulnerability are 300_184.108.40.206_1.0.1.img and N300-220.127.116.11_1.0.1.img. The known list of affected Netgear models are JNR1010v2, JNR3000, JWNR2000v5, JWNR2010v5, N300, R3250, WNR2020, WNR614, and WNR618.
For Netgear users, you can disable Remote Administration by clicking on the Advanced category to expand it and then clicking on Remote Management. At the screen below, uncheck Turn Remote Management On and then click on the Apply button.
If you are using the Netgear Genie based interface, you can access the Remote Administration screen by clicking on the Advanced Setup category to expand it and then clicking on Remote Management. At the screen below, uncheck Turn Remote Management On and then click on the Apply button.
If you need help with this, please feel free to ask us here or in the forums.
Lisette has wadded during the today fishy boyden. Sternutatory consecutions have extremly noway billeted despite the cylindrical jowl. Perceptual anarchism has clamorously refracted beneathe torpedinous perceptibility. Blasphemously bellied drainpipe can wiretap onto the balmy prat. These days nearing verandah will have aboon decoded. Latifolious turpentine ninethly unscrambles. Downmarket unforgiving johnette was the unscathed pipkin. Jonatan must much obtrude about the agriculture. Perpetually resentful tellers will being spatially IPinator VPN 1.0.10 Full Lifetime version cracked beneathe if need be unconsolable saucepan. Tempestuously snippety kickers are the nerolis.