{"id":9521,"date":"2020-01-21T15:27:03","date_gmt":"2020-01-21T20:27:03","guid":{"rendered":"http:\/\/pappp.net\/?guid=641063be475d9617eb142052554b0c67"},"modified":"2020-01-21T15:27:03","modified_gmt":"2020-01-21T20:27:03","slug":"internet-routers-running-tomato-are-under-attack-by-notorious-crime-gang","status":"publish","type":"post","link":"https:\/\/pappp.net\/?p=9521","title":{"rendered":"Internet routers running Tomato are under attack by notorious crime gang"},"content":{"rendered":"<p class=\"syndicated-attribution\">Source: <a href=\"https:\/\/arstechnica.com\/?p=1646825\">Ars Technica<\/a><\/p>\n<div style=\"background-color : #fff7d5;\n\t\t\tborder-width : 1px; padding : 5px; border-style : dashed; border-color : #e7d796;margin-bottom : 1em; color : #9a8c59;\">Article note: It's interesting\/surprising how many people have the savvy to flash a custom firmware and still leave it with default credentials.<\/div><div>\n<figure><img src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2020\/01\/tomato-800x365.jpg\" alt=\"Internet routers running Tomato are under attack by notorious crime gang\" referrerpolicy=\"no-referrer\"\/><p><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2020\/01\/tomato.jpg\" rel=\"noopener noreferrer\">Enlarge<\/a> (credit: advancedtomato.com)<\/p>  <\/figure><div><a name=\"page-1\"><\/a><\/div>\n<p>Internet routers running the Tomato alternative firmware are under active attack by a self-propagating exploit that searches for devices using default credentials. When credentials are found, the exploit then makes the routers part of a botnet that&rsquo;s used in a host of online attacks, researchers said on Tuesday.<\/p>\n<p>The Muhstik botnet came to light about two years ago when it started unleashed a string of exploits that attacked Linux servers and Internet-of-things devices. It opportunistically exploited a host of vulnerabilities, including the so-called <a href=\"https:\/\/arstechnica.com\/information-technology\/2018\/04\/drupalgeddon2-touches-off-arms-race-to-mass-exploit-powerful-web-servers\/\" rel=\"noopener noreferrer\">critical Drupalgeddon2 vulnerability disclosed in early 2018<\/a> in the Drupal content management system. Muhstik has also been caught <a href=\"https:\/\/blog.netlab.360.com\/gpon-exploit-in-the-wild-i-muhstik-botnet-among-others-en\/\" rel=\"noopener noreferrer\">using vulnerabilities in routers<\/a> that use Gigabit Passive Optical Network (GPON) or DD-WRT software. The botnet has also exploited previously patched vulnerabilities in other server applications, including the Webdav, WebLogic, Webuzo, and WordPress.<\/p>\n<p>On Tuesday, researchers from Palo Alto Networks said they recently detected Muhstik targeting Internet routers running <a href=\"https:\/\/advancedtomato.com\/\" rel=\"noopener noreferrer\">Tomato<\/a>, an open-source package that serves as an alternative to firmware that ships by default with routers running Broadcom chips. The ability to work with virtual private networks and provide advanced quality of service control make Tomato popular with end users and in some cases router sellers.<\/p>\n<\/div><p><a href=\"https:\/\/arstechnica.com\/?p=1646825#p3\" rel=\"noopener noreferrer\">Read 6 remaining paragraphs<\/a> | <a href=\"https:\/\/arstechnica.com\/?p=1646825&amp;comments=1\" rel=\"noopener noreferrer\">Comments<\/a><\/p><div>\n<a href=\"http:\/\/feeds.arstechnica.com\/~ff\/arstechnica\/index?a=dCxBrtBE3eM:hsAYwBm29vQ:V_sGLiPBpWU\" rel=\"noopener noreferrer\"><img src=\"http:\/\/feeds.feedburner.com\/~ff\/arstechnica\/index?i=dCxBrtBE3eM:hsAYwBm29vQ:V_sGLiPBpWU\" border=\"0\" referrerpolicy=\"no-referrer\"\/><\/a> <a href=\"http:\/\/feeds.arstechnica.com\/~ff\/arstechnica\/index?a=dCxBrtBE3eM:hsAYwBm29vQ:F7zBnMyn0Lo\" rel=\"noopener noreferrer\"><img src=\"http:\/\/feeds.feedburner.com\/~ff\/arstechnica\/index?i=dCxBrtBE3eM:hsAYwBm29vQ:F7zBnMyn0Lo\" border=\"0\" referrerpolicy=\"no-referrer\"\/><\/a> <a href=\"http:\/\/feeds.arstechnica.com\/~ff\/arstechnica\/index?a=dCxBrtBE3eM:hsAYwBm29vQ:qj6IDK7rITs\" rel=\"noopener noreferrer\"><img src=\"http:\/\/feeds.feedburner.com\/~ff\/arstechnica\/index?d=qj6IDK7rITs\" border=\"0\" referrerpolicy=\"no-referrer\"\/><\/a> <a href=\"http:\/\/feeds.arstechnica.com\/~ff\/arstechnica\/index?a=dCxBrtBE3eM:hsAYwBm29vQ:yIl2AUoC8zA\" rel=\"noopener noreferrer\"><img src=\"http:\/\/feeds.feedburner.com\/~ff\/arstechnica\/index?d=yIl2AUoC8zA\" border=\"0\" referrerpolicy=\"no-referrer\"\/><\/a>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Enlarge (credit: advancedtomato.com)<br \/>\nInternet routers running the Tomato alternative firmware ar&#8230;<\/p>\n<p> <a href=\"https:\/\/pappp.net\/?p=9521\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[226],"tags":[],"class_list":["post-9521","post","type-post","status-publish","format-standard","hentry","category-news-2"],"_links":{"self":[{"href":"https:\/\/pappp.net\/index.php?rest_route=\/wp\/v2\/posts\/9521","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pappp.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pappp.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pappp.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pappp.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9521"}],"version-history":[{"count":0,"href":"https:\/\/pappp.net\/index.php?rest_route=\/wp\/v2\/posts\/9521\/revisions"}],"wp:attachment":[{"href":"https:\/\/pappp.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9521"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pappp.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9521"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pappp.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9521"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}