Author Topic: Tomato routers under attack  (Read 124 times)

Offline splerdu

  • Veterans
  • Member
  • ***
  • Posts: 7758
Tomato routers under attack
« on: January 22, 2020, 10:36:22 AM »
https://arstechnica.com/information-technology/2020/01/internet-routers-running-tomato-are-under-attack-by-notorious-crime-gang/
"Internet routers running the Tomato alternative firmware are under active attack by a self-propagating exploit that searches for devices using default credentials. When credentials are found and remote administration has been turned on, the exploit then makes the routers part of a botnet thatís used in a host of online attacks, researchers said on Tuesday."
fhtagn

Offline Mr. Bungle

  • Member
  • **
  • Posts: 1011
Re: Tomato routers under attack
« Reply #1 on: January 22, 2020, 08:28:24 PM »
^ That's exactly one of the reasons why I stopped flashing my router and smartphone with custom firmware and custom ROMs respectively. While those do enable more functionality than stock, I'm not so sure about how the security of the device is being handled.

Manufacturers tend to address critical security holes in their own firmware more proactively, at least with the brands I use.

Offline jeremypv

  • Member
  • **
  • Posts: 1034
    • jeremypv.net
Re: Tomato routers under attack
« Reply #2 on: January 23, 2020, 04:34:43 AM »
huh? you don't need to stop flashing thirdparty router with 'more' functionality with the default firmware, what you need to stop is /not/ change the default password, as that was the attack -- if you have a sensible mind, you'd change the password of anything with a password...

that article is quite misleading (misleading in a sense that this is not the norm), as very few in their right mind would not change the default password *AND* open turn on remote management... that actually would difficult to do both for novices, so it must be intentional (or some youtube tutorial instructs users to do this)

I think most (if not all) users that flash thirdparty firmware are competent enough to change the default password.


EDIT:
Now that I think about it, most likely these routers are sold as is (remember those Tomato-based routers from CDR-King?), then the one scanning for these routers are the one that sold them... (conspiracy theory mode activated  :wacko: )
jeremypv

Offline splerdu

  • Veterans
  • Member
  • ***
  • Posts: 7758
Re: Tomato routers under attack
« Reply #3 on: January 23, 2020, 03:02:02 PM »
The article was pretty detailed, the headline (and my thread title) are clickbait.

I'd actually like to see their infection stats. Can't imagine the intersection between the sets of A) people who know how to flash third-party firmware and B ) people who leave the default password on while C) turning on remote administration (which is off by default) is going to be very large.
fhtagn

Offline jeremypv

  • Member
  • **
  • Posts: 1034
    • jeremypv.net
Re: Tomato routers under attack
« Reply #4 on: January 23, 2020, 06:23:08 PM »
It's very detailed, to quote:
Quote
thereís no indication the new variants are using any flaws in Tomato. That suggests that weak passwords are the sole means the botnet has for taking control of routers.
...
Post updated to note remote administration is turned off by default.

so that's quite indicative of what you wanna see...
and it's not going to be very large, since A alone are very small, couple that with B which is if you know how to install a third party firmware, you will be keen on security (and besides, if you are the one who installed the firmware, you will be asked to change the password upon first boot -- so for those routers with default credentials, most likely they are not the one who installed it...), and C will be idiotic, so that will be (contrary to your conclusion) will be very, very, very small, unless it is within what my conspiracy theory above suggests.
jeremypv