Connect with us

Published

on

PUMPKIN ECLIPSE — Mystery malware destroys 600,000 routers from a single ISP during 72-hour span An unknown threat actor with equally unknown motives forces ISP to replace routers.

Dan Goodin – May 30, 2024 2:00 pm UTC EnlargeGetty Images reader comments 0

One day last October, subscribers to an ISP known as Windstream began flooding message boards with reports their routers had suddenly stopped working and remained unresponsive to reboots and all other attempts to revive them.

The routers now just sit there with a steady red light on the front, one user wrote, referring to the ActionTec T3200 router models Windstream provided to both them and a next door neighbor. They won’t even respond to a RESET.

In the messageswhich appeared over a few days beginning on October 25many Windstream users blamed the ISP for the mass bricking. They said it was the result of the company pushing updates that poisoned the devices. Windstreams Kinetic broadband service has about 1.6 million subscribers in 18 states, including Iowa, Alabama, Arkansas, Georgia, and Kentucky. For many customers, Kinetic provides an essential link to the outside world.

We have 3 kids and both work from home, another subscriber wrote in the same forum. This has easily cost us $1,500+ in lost business, no tv, WiFi, hours on the phone, etc. So sad that a company can treat customers like this and not care.

After eventually determining that the routers were permanently unusable, Windstream sent new routers to affected customers. Black Lotus has named the event Pumpkin Eclipse. A deliberate act

A report published Thursday by security firm Lumen Technologies Black Lotus Labs may shed new light on the incident, which Windstream has yet to explain. Black Lotus Labs researchers said that over a 72-hour period beginning on October 25, malware took out more than 600,000 routers connected to a single autonomous system number belonging to an unnamed ISP.

While the researchers arent identifying the ISP, the particulars they report match almost perfectly with those detailed in the October messages from Windstream subscribers. Specifically, the date the mass bricking started, the router models affected, the description of the ISP, and the displaying of a static red light by the out-of-commission ActionTec routers. Windstream representatives declined to answer questions sent by email.

According to Black Lotus, the routersconservatively estimated at a minimum of 600,000were taken out by an unknown threat actor with equally unknown motivations. The actor took deliberate steps to cover their tracks by using commodity malware known as Chalubo, rather than a custom-developed toolkit. A feature built into Chalubo allowed the actor to execute custom Lua scripts on the infected devices. The researchers believe the malware downloaded and ran code that permanently overwrote the router firmware. Advertisement

We assess with high confidence that the malicious firmware update was a deliberate act intended to cause an outage, and though we expected to see a number of router make and models affected across the internet, this event was confined to the single ASN, Thursdays report stated before going on to note the troubling implications of a single piece of malware suddenly severing the connections of 600,000 routers.

The researchers wrote:

Destructive attacks of this nature are highly concerning, especially so in this case. A sizeable portion of this ISPs service area covers rural or underserved communities; places where residents may have lost access to emergency services, farming concerns may have lost critical information from remote monitoring of crops during the harvest, and health care providers cut off from telehealth or patients records. Needless to say, recovery from any supply chain disruption takes longer in isolated or vulnerable communities.

After learning of the mass router outage, Black Lotus began querying the Censys search engine for the affected router models. A one-week snapshot soon revealed that one specific ASN experienced a 49 percent drop in those models just as the reports began. This amounted to the disconnection of at least 179,000 ActionTec routers and more than 480,000 routers sold by Sagemcom. EnlargeBlack Lotus Labs

The constant connecting and disconnecting of routers to any ISP complicates the tracking process, because its impossible to know if a disappearance is the result of the normal churn or something more complicated. Black Lotus said that a conservative estimate is that at least 600,000 of the disconnections it tracked were the result of Chaluba infecting the devices and, from there, permanently wiping the firmware they ran on.

After identifying the ASN, Black Lotus discovered a complex multi-path infection mechanism for installing Chaluba on the routers. The following graphic provides a logical overview. EnlargeBlack Lotus Labs

Further ReadingMystery solved in destructive attack that knocked out >10k Viasat modemsThere aren’t many known precedents for malware that wipes routers en masse in the way witnessed by the researchers. Perhaps the closest was the discovery in 2022 of AcidRain, the name given to malware that knocked out 10,000 modems for satellite Internet provider Viasat. The outage, hitting Ukraine and other parts of Europe, was timed to Russia’s invasion of the smaller neighboring country.

A Black Lotus representative said in an interview that researchers can’t rule out that a nation-state is behind the router-wiping incident affecting the ISP. But so far, the researchers say they aren’t aware of any overlap between the attacks and any known nation-state groups they track. Advertisement

The researchers have yet to determine the initial means of infecting the routers. It’s possible the threat actors exploited a vulnerability, although the researchers said they aren’t aware of any known vulnerabilities in the affected routers. Other possibilities are the threat actor abused weak credentials or accessed an exposed administrative panel. An attack unlike any other

While the researchers have analyzed attacks on home and small office routers before, they said two things make this latest one stand out. They explained:

First, this campaign resulted in a hardware-based replacement of the affected devices, which likely indicates that the attacker corrupted the firmware on specific models. The event was unprecedented due to the number of units affectedno attack that we can recall has required the replacement of over 600,000 devices. In addition, this type of attack has only ever happened once before, with AcidRain used as a precursor to an active military invasion.

They continued:

The second unique aspect is that this campaign was confined to a particular ASN. Most previous campaigns weve seen target a specific router model or common vulnerability and have effects across multiple providers networks. In this instance, we observed that both Sagemcom and ActionTec devices were impacted at the same time, both within the same providers network.This led us to assess it was not the result of a faulty firmware update by a single manufacturer, which would normally be confined to one device model or models from a given company. Our analysis of the Censys data shows the impact was only for the two in question. This combination of factors led us to conclude the event was likely a deliberate action taken by an unattributed malicious cyber actor, even if we were not able to recover the destructive module.

With no clear idea how the routers came to be infected, the researchers can only offer the usual generic advice for keeping such devices free of malware. That includes installing security updates, replacing default passwords with strong ones, and regular rebooting. ISPs and other organizations that manage routers should follow additional advice for securing the management interfaces or administering the devices.

Thursday’s report includes IP addresses, domain names, and other indicators that people can use to determine if their devices have been targeted or compromised in the attacks. reader comments 0 Dan Goodin Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords. In his spare time, he enjoys gardening, cooking, and following the independent music scene. Advertisement Channel Ars Technica ← Previous story Related Stories Today on Ars

Continue Reading

Sports

Heavy rain helps Elliott to pole for Dover Cup race

Published

on

By

Heavy rain helps Elliott to pole for Dover Cup race

DOVER, Del. — Chase Elliott took advantage of heavy rain at Dover Motor Speedway to earn the pole for Sunday’s NASCAR Cup Series race.

Elliott and the rest of the field never got to turn a scheduled practice or qualifying lap on Saturday because of rain that pounded the concrete mile track. Dover is scheduled to hold its first July race since the track’s first one in 1969.

Elliott has two wins and 10 top-five finishes in 14 career races at Dover.

Chase Briscoe starts second, followed by Christopher Bell, Tyler Reddick and William Byron. Shane van Gisbergen, last week’s winner at Sonoma Raceway, Michael McDowell, Joey Logano, Ty Gibbs and Kyle Busch complete the top 10.

Logano is set to become the youngest driver in NASCAR history with 600 career starts.

Logano will be 35 years, 1 month, 26 days old when he hits No. 600 on Sunday at Dover Motor Speedway. He will top seven-time NASCAR champion and Hall of Famer Richard Petty by six months.

The midseason tournament that pays $1 million to the winner pits Ty Dillon vs. John Hunter Nemechek and Reddick vs. Gibbs in the head-to-head challenge at Dover.

The winners face off next week at Indianapolis. Reddick is the betting favorite to win it all, according to Sportsbook.

All four drivers are winless this season.

Continue Reading

Sports

Hamlin on 23XI trial: ‘All will be exposed’

Published

on

By

Hamlin on 23XI trial: 'All will be exposed'

DOVER, Del. — NASCAR race team owner Denny Hamlin remained undeterred in the wake of another setback in court, vowing “all will be exposed” in the scheduled December trial as part of 23XI Racing’s federal antitrust suit against the auto racing series.

A federal judge on Thursday rejected a request from 23XI Racing and Front Row Motorsports to continue racing with charters while they battle NASCAR in court, meaning their six cars will race as open entries this weekend at Dover, next week at Indianapolis and perhaps longer than that in a move the teams say would put them at risk of going out of business.

U.S. District Judge Kenneth Bell denied the teams’ bid for a temporary restraining order, saying they will make races over the next couple of weeks and they won’t lose their drivers or sponsors before his decision on a preliminary injunction.

Bell left open the possibility of reconsidering his decision if things change over the next two weeks.

After this weekend, the cars affected may need to qualify on speed if 41 entries are listed – a possibility now that starting spots have opened.

The case has a Dec. 1 trial date, but the two teams are fighting to be recognized as chartered for the current season, which has 16 races left. A charter guarantees one of the 40 spots in the field each week, but also a base amount of money paid out each week.

“If you want answers, you want to understand why all this is happening, come Dec. 1, you’ll get the answers that you’re looking for,” Hamlin said Saturday at Dover Motor Speedway. “All will be exposed.”

23XI, which is co-owned by retired NBA great Michael Jordan, and FRM filed their federal suit against NASCAR last year after they were the only two organizations out of 15 to reject NASCAR’s extension offer on charters.

Jordan and FRM owner Bob Jenkins won an injunction to recognize 23XI and FRM as chartered for the season, but the ruling was overturned on appeal earlier this month, sending the case back to Bell.

Hamlin, a three-time Daytona 500 winner driving for Joe Gibbs Racing, co-owns 23XI with Jordan and said they were prepared to send Tyler Reddick, Bubba Wallace and Riley Herbst to the track each week as open teams. They sought the restraining order Monday, claiming that through discovery they learned NASCAR planned to immediately begin the process of selling the six charters which would put “plaintiffs in irreparable jeopardy of never getting their charters back and going out of business.”

Hamlin said none of the setbacks have made him second-guess the decision to file the lawsuit.

“Dec. 1 is all that matters. Mark your calendar,” Hamlin said. “I’d love to be doing other things. I’ve got a lot going on. When I get in the car (today), nothing else is going to matter other than that. I always give my team 100%. I always prepare whether I have side jobs, side hustles, more kids, that all matters, but I always give my team all the time that they need to make sure that when I step in, I’m 100% committed.”

Reddick, who has a clause that allows him to become a free agent if the team loses its charter, declined comment Saturday on all questions connected to his future and the lawsuit. Hamlin also declined to comment on Reddick’s future with 23XI Racing.

Reddick, one of four drivers left in NASCAR’s $1 million In-season Challenge, was last year’s regular-season champion and raced for the Cup Series championship in the season finale. But none of the six drivers affected by the court ruling are locked into this year’s playoffs.

Making the field won’t be an issue this weekend at Dover as fewer than the maximum 40 cars are entered. But should 41 cars show up anywhere this season, someone slow will be sent home and that means lost revenue and a lost chance to win points in the standings.

“Nothing changes from my end, obviously, and nothing changes from inside the shop,” Front Row Motorsports driver Zane Smith said. “There’s not typically even enough cars to worry about transferring in.”

Smith, 24th in the standings and someone who would likely need a win to qualify for NASCAR’s playoffs, said he stood behind Jenkins in his acrimonious legal fight that has loomed over the stock car series for months.

“I leave all that up to them,” Smith said, “but my job is to go get the 38 the best finish I can.”

Continue Reading

Technology

Astronomer CEO Andy Byron resigns after viral Coldplay kiss-cam controversy

Published

on

By

Astronomer CEO Andy Byron resigns after viral Coldplay kiss-cam controversy

Chris Martin of Coldplay performs at the O2 Shepherd’s Bush Empire on October 12, 2021 in London, England.

Simone Joyner | Getty Images Entertainment | Getty Images

Astronomer, the technology company that faced backlash after its CEO was allegedly caught in an affair at a Coldplay concert, said the CEO has resigned, the company announced Saturday.

“Andy Byron has tendered his resignation, and the Board of Directors has accepted,” the company said in a statement. “The Board will begin a search for our next Chief Executive as Cofounder and Chief Product Officer Pete DeJoy continues to serve as interim CEO.”

Byron was shown on a big screen at a Coldplay concert on Wednesday with his arms around the company’s chief people officer, Kristin Cabot. Byron, who is married with children, immediately hid when the couple was shown on screen. Lead singer Chris Martin said, “Either they’re having an affair or they’re just very shy.” A concert attendee’s video of the affair went viral.

In May, Astronomer announced a $93 million investment round led by Bain Ventures and other investors, including Salesforce Ventures.

Byron’s resignation comes after Astronomer said Friday that it had launched a “formal investigation” into the matter, and the CEO was placed on administrative leave.

“Before this week, we were known as a pioneer in the DataOps space, helping data teams power everything from modern analytics to production AI,” the company said in its Saturday statement. “Our leaders are expected to set the standard in both conduct and accountability, and recently, that standard was not met.”

Continue Reading

Trending