Connect with us

Published

on

PUMPKIN ECLIPSE — Mystery malware destroys 600,000 routers from a single ISP during 72-hour span An unknown threat actor with equally unknown motives forces ISP to replace routers.

Dan Goodin – May 30, 2024 2:00 pm UTC EnlargeGetty Images reader comments 0

One day last October, subscribers to an ISP known as Windstream began flooding message boards with reports their routers had suddenly stopped working and remained unresponsive to reboots and all other attempts to revive them.

The routers now just sit there with a steady red light on the front, one user wrote, referring to the ActionTec T3200 router models Windstream provided to both them and a next door neighbor. They won’t even respond to a RESET.

In the messageswhich appeared over a few days beginning on October 25many Windstream users blamed the ISP for the mass bricking. They said it was the result of the company pushing updates that poisoned the devices. Windstreams Kinetic broadband service has about 1.6 million subscribers in 18 states, including Iowa, Alabama, Arkansas, Georgia, and Kentucky. For many customers, Kinetic provides an essential link to the outside world.

We have 3 kids and both work from home, another subscriber wrote in the same forum. This has easily cost us $1,500+ in lost business, no tv, WiFi, hours on the phone, etc. So sad that a company can treat customers like this and not care.

After eventually determining that the routers were permanently unusable, Windstream sent new routers to affected customers. Black Lotus has named the event Pumpkin Eclipse. A deliberate act

A report published Thursday by security firm Lumen Technologies Black Lotus Labs may shed new light on the incident, which Windstream has yet to explain. Black Lotus Labs researchers said that over a 72-hour period beginning on October 25, malware took out more than 600,000 routers connected to a single autonomous system number belonging to an unnamed ISP.

While the researchers arent identifying the ISP, the particulars they report match almost perfectly with those detailed in the October messages from Windstream subscribers. Specifically, the date the mass bricking started, the router models affected, the description of the ISP, and the displaying of a static red light by the out-of-commission ActionTec routers. Windstream representatives declined to answer questions sent by email.

According to Black Lotus, the routersconservatively estimated at a minimum of 600,000were taken out by an unknown threat actor with equally unknown motivations. The actor took deliberate steps to cover their tracks by using commodity malware known as Chalubo, rather than a custom-developed toolkit. A feature built into Chalubo allowed the actor to execute custom Lua scripts on the infected devices. The researchers believe the malware downloaded and ran code that permanently overwrote the router firmware. Advertisement

We assess with high confidence that the malicious firmware update was a deliberate act intended to cause an outage, and though we expected to see a number of router make and models affected across the internet, this event was confined to the single ASN, Thursdays report stated before going on to note the troubling implications of a single piece of malware suddenly severing the connections of 600,000 routers.

The researchers wrote:

Destructive attacks of this nature are highly concerning, especially so in this case. A sizeable portion of this ISPs service area covers rural or underserved communities; places where residents may have lost access to emergency services, farming concerns may have lost critical information from remote monitoring of crops during the harvest, and health care providers cut off from telehealth or patients records. Needless to say, recovery from any supply chain disruption takes longer in isolated or vulnerable communities.

After learning of the mass router outage, Black Lotus began querying the Censys search engine for the affected router models. A one-week snapshot soon revealed that one specific ASN experienced a 49 percent drop in those models just as the reports began. This amounted to the disconnection of at least 179,000 ActionTec routers and more than 480,000 routers sold by Sagemcom. EnlargeBlack Lotus Labs

The constant connecting and disconnecting of routers to any ISP complicates the tracking process, because its impossible to know if a disappearance is the result of the normal churn or something more complicated. Black Lotus said that a conservative estimate is that at least 600,000 of the disconnections it tracked were the result of Chaluba infecting the devices and, from there, permanently wiping the firmware they ran on.

After identifying the ASN, Black Lotus discovered a complex multi-path infection mechanism for installing Chaluba on the routers. The following graphic provides a logical overview. EnlargeBlack Lotus Labs

Further ReadingMystery solved in destructive attack that knocked out >10k Viasat modemsThere aren’t many known precedents for malware that wipes routers en masse in the way witnessed by the researchers. Perhaps the closest was the discovery in 2022 of AcidRain, the name given to malware that knocked out 10,000 modems for satellite Internet provider Viasat. The outage, hitting Ukraine and other parts of Europe, was timed to Russia’s invasion of the smaller neighboring country.

A Black Lotus representative said in an interview that researchers can’t rule out that a nation-state is behind the router-wiping incident affecting the ISP. But so far, the researchers say they aren’t aware of any overlap between the attacks and any known nation-state groups they track. Advertisement

The researchers have yet to determine the initial means of infecting the routers. It’s possible the threat actors exploited a vulnerability, although the researchers said they aren’t aware of any known vulnerabilities in the affected routers. Other possibilities are the threat actor abused weak credentials or accessed an exposed administrative panel. An attack unlike any other

While the researchers have analyzed attacks on home and small office routers before, they said two things make this latest one stand out. They explained:

First, this campaign resulted in a hardware-based replacement of the affected devices, which likely indicates that the attacker corrupted the firmware on specific models. The event was unprecedented due to the number of units affectedno attack that we can recall has required the replacement of over 600,000 devices. In addition, this type of attack has only ever happened once before, with AcidRain used as a precursor to an active military invasion.

They continued:

The second unique aspect is that this campaign was confined to a particular ASN. Most previous campaigns weve seen target a specific router model or common vulnerability and have effects across multiple providers networks. In this instance, we observed that both Sagemcom and ActionTec devices were impacted at the same time, both within the same providers network.This led us to assess it was not the result of a faulty firmware update by a single manufacturer, which would normally be confined to one device model or models from a given company. Our analysis of the Censys data shows the impact was only for the two in question. This combination of factors led us to conclude the event was likely a deliberate action taken by an unattributed malicious cyber actor, even if we were not able to recover the destructive module.

With no clear idea how the routers came to be infected, the researchers can only offer the usual generic advice for keeping such devices free of malware. That includes installing security updates, replacing default passwords with strong ones, and regular rebooting. ISPs and other organizations that manage routers should follow additional advice for securing the management interfaces or administering the devices.

Thursday’s report includes IP addresses, domain names, and other indicators that people can use to determine if their devices have been targeted or compromised in the attacks. reader comments 0 Dan Goodin Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords. In his spare time, he enjoys gardening, cooking, and following the independent music scene. Advertisement Channel Ars Technica ← Previous story Related Stories Today on Ars

Continue Reading

Sports

Sources: Nats demote All-Star after all-nighter

Published

on

By

Sources: Nats demote All-Star after all-nighter

The Washington Nationals demoted All-Star shortstop CJ Abrams to the minor leagues after he stayed out all night at a Chicago-area casino, leaving only hours before a Friday day game against the Chicago Cubs, sources told ESPN’s Jesse Rogers.

The 23-year-old Abrams led off for the Nationals and went 0 for 3 with a walk and strikeout in Friday’s game, which started at 1 p.m. CT. He was informed of the demotion Friday night, sources said. He will be sent to West Palm Beach, home of the Nationals’ minor league complex.

Because Abrams has been with Washington for the entirety of the season, the demotion will not affect his service time. Players earn a full year of service with 172 days on the major league roster, and Abrams already has exceeded that threshold.

Abrams could, however, file a grievance through the Major League Baseball Players Association to fight for lost pay if he believes the demotion unjust. He would lose around $30,000 of his $752,000 salary for missing the season’s final week. Abrams will be arbitration-eligible this winter, entering the system for the first of four times as a Super 2.

Acquired as one of the centerpieces of the Juan Soto trade two years ago, Abrams parlayed a breakout first-half into an All-Star selection, hitting .268/.343/.489 with 15 home runs and 15 stolen bases over the Nationals’ first 89 games. He struggled significantly in the second half, slashing .203/.260/.326, and Abrams’ defense has been a weakness throughout the season.

Still, the Nationals did not intend to send him to the minor leagues until they learned of his time spent at the casino, which was first reported Friday by CHGO.

“I just want it to be known it wasn’t performance-based,” Nationals manager Dave Martinez told reporters Saturday. “It’s an internal issue. I’m not going to give specifics.”

Continue Reading

World

At least 44 people killed in Israel strikes on Lebanon and Gaza in last 24 hours

Published

on

By

At least 44 people killed in Israel strikes on Lebanon and Gaza in last 24 hours

At least 44 people have been killed in Israeli strikes on Lebanon and Gaza in the last 24 hours. 

A strike on the Lebanese capital Beirut killed at least 31 people including three children and seven women, the country’s health minister Firas Abiad said.

Beirut
Beirut

Fifteen of the 68 wounded in the attack remain in hospital.

Ali Harake, the head of the rescue team searching through the rubble, told Sky News his team is still looking for between 17 and 18 missing people – though he fears none have survived.

Please use Chrome browser for a more accessible video player

‘I think the missing people are dead’

Follow the latest updates on the Middle East

It is understood two apartment blocks in a densely populated southern neighbourhood collapsed in the strike – the deadliest attack on Beirut in decades.

Beirut

Top Hezbollah commanders are believed to have been meeting in the basement of one of the buildings.

More on Hezbollah

Hezbollah has confirmed two of its senior commanders, Ibrahim Aqil and Ahmed Wahbi, died in the strike while an Israeli military spokesperson said that at least 16 Hezbollah militants were killed.

Beirut

Wahbi oversaw the military operations of the Radwan special forces – a commando unit that seeks to infiltrate and carry out attacks in Israel – until early 2024. Aqil was also a top commander for the Iran-backed group.

The Palestinian militant group Hamas has described the killing of Aqil as a “crime” and a “folly”, adding Israel will “pay the price”.

Read more: Israeli airstrike on Beirut causes more shock to a country already rocked to its core

Meanwhile, at least 13 people have been killed in Israeli strikes on Gaza City, according to a local report.

The strikes are believed to have hit several schools sheltering displaced people in the southern part of the city.

Palestinians inspect a school, which was sheltering displaced people, after it was hit by an Israeli strike, amid the Israel-Hamas conflict, in Gaza City, September 21, 2024. REUTERS/Dawoud Abu Alkas
Image:
Inside a school, that was sheltering displaced people, after it was hit by an Israeli strike this morning. Pic: Reuters

A Palestinian man walks on a street after a school, which was sheltering displaced people, was hit by an Israeli strike, amid the Israel-Hamas conflict, in Gaza City, September 21, 2024. REUTERS/Dawoud Abu Alkas
Image:
The street outside the school. Pic: Reuters

The strikes come after Hezbollah launched one of its most intense bombardments of northern Israel in nearly a year of fighting, largely targeting Israeli military sites.

Israel’s Iron Dome missile defence system intercepted most of the Katyusha rockets.

Follow Sky News on WhatsApp
Follow Sky News on WhatsApp

Keep up with all the latest news from the UK and around the world by following Sky News

Tap here

Hezbollah said its latest wave of rocket attacks was a response to past Israeli strikes on southern Lebanon.

It came days after mass explosions of Hezbollah pagers and walkie-talkies killed at least 37 people, including two children. Some 2,900 others were wounded in the assault which has been widely attributed to Israel.

Continue Reading

World

Fire rips through arms depot deep inside Russia after huge Ukrainian drone attack – as Zelenskyy prepares to meet Trump

Published

on

By

Fire rips through arms depot deep inside Russia after huge Ukrainian drone attack - as Zelenskyy prepares to meet Trump

A fire has ripped through a Russian missile depot in the Tver region deep inside the country after it was targeted in a Ukrainian drone attack, the defence ministry in Moscow has said.

Footage shows a second Ukrainian drone attack on the southwestern Russian region of Krasnodar also triggered a fire and caused a series of explosions.

Russia’s defence ministry has claimed its forces shot down 101 Ukrainian drones over Russian territory and occupied Crimea during the overnight attacks.

The drone strikes were carried out as Ukrainian leader Volodymyr Zelenskky said he is hoping to meet Donald Trump next week when he travels to the US – where he will present US President Joe Biden with a “victory plan” in relation to the war.

An explosion after the drone strike on the arms depot in Krasnodar
Image:
An explosion after the drone strike on the arms depot in Krasnodar

Meanwhile, Ukraine’s foreign minister said Russia appears to be planning strikes on Ukrainian nuclear facilities before the winter.

Posts on local Telegram channels said a Ukrainian drone attack struck an arms depot near the town of Toropets, in Russia’s Tver region – which is about 380 kilometres (240 miles) northwest of Moscow and about 500 kilometres (300 miles) from the Ukrainian border on Saturday.

Russian authorities closed a 100-kilometre (62-mile) stretch of a highway and evacuated passengers from a nearby rail station.

The depot appeared to be just miles from a Russian weapons arsenal storing missiles, bombs and ammunition in Tver that was struck by Ukrainian drones early Wednesday, injuring 13 people and also causing a huge fire.

Flames rise during an explosion, amid the Russia-Ukraine conflict, in Toropets, Tver region, Russia in this screen grab obtained from a social media video released on September 18, 2024. Social Media/via REUTERS THIS IMAGE HAS BEEN SUPPLIED BY A THIRD PARTY. NO RESALES. NO ARCHIVES.
Image:
Flames rise after the strike on the Tver region on Wednesday. Pic: Reuters

Meanwhile, at least 1,200 people were evacuated from Russia’s southwestern Krasnodar region after an ammunition depot and missile arsenal were struck in the second drone attack overnight, the local governor has said.

Most of those evacuated were staying with friends and relatives, Veniamin Kondratyev, the governor of Krasnodar region, said on the Telegram messaging app.

There were no immediate reports of casualties in either Tver or Krasnodar.

Ukraine warning of attacks on nuclear sites

It comes as Kyiv is urging the International Atomic Energy Agency (IAEA) and Ukraine’s allies to establish permanent monitoring missions at the country’s nuclear plants as it warns they could be targeted in Russian attacks.

“In particular, it concerns open distribution devices at (nuclear power plants and) transmission substations, critical for the safe operation of nuclear energy,” foreign minister Andriy Sybiha wrote on X.

Read more from Sky News:
Body found in search for missing TV chaplain
Parents die on Hawaii ‘babymoon’
Anthony Joshua’s shot at greatness against Dubois

Follow Sky News on WhatsApp
Follow Sky News on WhatsApp

Keep up with all the latest news from the UK and around the world by following Sky News

Tap here

A mushroom cloud rises after the drone strike on Toropets in the Tver region. Pic: Reuters
Image:
A mushroom cloud rises after the drone strike on Toropets in the Tver region. Pic: Reuters

Zelenskyy prepares for US trip

Meanwhile, the Ukrainian leader has said he plans to meet Republican presidential candidate Mr Trump on either Thursday or Friday next week.

During the trip, Mr Zelenskyy will present Mr Biden with a so-called victory plan as he hopes to bring about an end to the conflict.

Volodymr Zelenskyy with Donald Trump in 2020. Pic: Reuters
Image:
Volodymr Zelenskyy with Donald Trump in 2020. Pic: Reuters

The Ukrainian president has said the plan will include long-range striking capabilities and other weapons long sought by Kyiv, and will serve as the basis for any future negotiation with Russia.

He is also expected to push Washington to lift restrictions on long-range missile strikes inside Russia.

Mr Zelenskyy will attend sessions of the UN Security Council and General Assembly and also plans to meet vice president Kamala Harris, the Democratic candidate in this year’s US election, in separate meetings on 26 September.

The developments come as three sources have told Reuters that Iran did not include mobile launchers with the close-range ballistic missiles that Washington has accused Tehran of delivering to Russia for use against Ukraine.

The sources – a European diplomat, a European intelligence official and a US official – said it was not clear why Iran did not supply launchers with the Fath-360 missiles, raising questions about when and if the weapons will be operational.

Continue Reading

Trending