Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Vulnerabilities in DrayTek Enterprise Routers Exploited in Attacks

Threat actors have been exploiting a couple of vulnerabilities affecting some DrayTek enterprise routers in attacks that started before patches were released by the vendor.

DrayTek is a Taiwan-based manufacturer of networking equipment, including routers, firewalls, broadband customer premises equipment (CPE), and VPN devices.

Threat actors have been exploiting a couple of vulnerabilities affecting some DrayTek enterprise routers in attacks that started before patches were released by the vendor.

DrayTek is a Taiwan-based manufacturer of networking equipment, including routers, firewalls, broadband customer premises equipment (CPE), and VPN devices.

In early December 2019, researchers at the Network Security Research Lab of Chinese cybersecurity firm Qihoo 360 noticed that some DrayTek Vigor routers had been targeted in attacks exploiting a vulnerability which at the time had a zero-day status. Researchers then noticed on January 28 that a second zero-day flaw affecting DrayTek Vigor routers had been exploited in attacks by a different threat group.

The vulnerabilities, tracked as CVE-2020-8515, can be exploited for command injection and they are related to the rtick and keyPath fields. Qihoo 360 researchers disclosed technical details about the flaws and the attacks on Friday.Hackers target DreayTek Vigor routers

Qihoo 360 unsuccessfully attempted to notify DrayTek of the attacks exploiting the first vulnerability in early December. However, the vendor said it only became aware of the flaws and exploitation attempts on January 30, after another researcher independently discovered one of the vulnerabilities. DrayTek patched the security holes on February 6 with the release of firmware version 1.5.1.

According to DrayTek, the flaws impact its Vigor300B load balancing routers, its Vigor2960 VPN gateways, and its Vigor3900 routers. The Vigor3900 routers have been discontinued, but the vendor has still released patches for these devices.

“If you have remote access enabled on your router, disable it if you don’t need it, and use an access control list if possible. If you have not updated the firmware yet, disable remote access (admin) and SSL VPN. The ACL does not apply to SSL VPN connections (Port 443) so you should also temporarily disable SSL VPN until you have updated the firmware,” DrayTek said in an advisory published on February 10.

According to Qihoo 360, one threat group exploited the keyPath command injection vulnerability to download a script to affected devices. This script then fetched and executed a different script that allowed the attackers to eavesdrop on the victim’s network, specifically targeting ports associated with FTP and email protocols such as SMTP, POP3, and IMAP. The hackers collected data which they uploaded to their server every Monday, Wednesday and Friday.

The second threat actor exploited the rtick command injection flaw to create SSH backdoors.

Advertisement. Scroll to continue reading.

A Shodan search for each of the impacted products currently shows a few thousand results across the world, but some of these internet-exposed devices are already running a patched version of the firmware.

This is not the first time malicious actors have targeted DrayTek routers using zero-day vulnerabilities. Back in 2018, the vendor released firmware updates for many of its Vigor routers after hackers had started exploiting a weakness to change the DNS settings of impacted devices.

Related: Cisco Patches Router Vulnerabilities Targeted in Attacks

Related: MikroTik Routers Exploited in Massive Crypto-Mining Campaign

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...