VPNfilter official statement

Cisco informed us on May 22nd of 2018, that a malicious tool was found on several manufacturer devices, including three devices made by MikroTik. We are highly certain that this malware was installed on these devices through a vulnerability in MikroTik RouterOS software, which was already patched by MikroTik in March 2017*. Simply upgrading RouterOS software deletes the malware, any other 3rd party files and closes the vulnerability. Let us know if you need more details. Upgrading RouterOS is done by a few clicks and takes only a minute.

To be safe against any kinds of attacks, make sure you secure access to your devices:
https://wiki.mikrotik.com/wiki/Manual:Securing_Your_Router

P.S: The name VPNfilter is only a code name of the malware that was found (more specifically, a fake executable name). The modus operandi of this tool has no relation to VPN tunnels. In basic terms, the malware could either sniff certain types of traffic and send it somewhere, or destroy the routers.

*: http://forum.mikrotik.com/t/urgent-security-advisory/117944/1

Thanks for the heads-up.

Is there a specific version from which this malware is able to infect a mikrotik?
How about RouterOS 5.22 for example or 6.27?

The vulnerability in question was fixed in March 2017:

Current release chain:
What’s new in 6.38.5 (2017-Mar-09 11:32):
!) www - fixed http server vulnerability;

And also Bugfix release chain:
What’s new in 6.37.5 (2017-Mar-09 11:54):
!) www - fixed http server vulnerability;

Hi Normis,

Found this IT News Article today saying Mikrotik devices are in the list for being at risk to being Hacked. What’s your take on this article??
https://www.itnews.com.au/news/hackers-infect-500000-routers-and-storage-devices-491582

please read the first post in this thread.

Hopefully my comment won’t come through as rude, but to me it seems a bit irresponsible (or at least over-confident) to say “we are highly certain” without having an actual sample of the malware to analyze and confirm that it was exploiting the old vulnerability and not some new one you might not yet be aware of.

Also, with security threats constantly on the rise, it would be nice if there was a dedicated Security sub-forum or some kind of channel / RSS / mailing list which would discuss only security and which we could subscribe to be notified of things like this.

We do have in-depth analysis materials from the Cisco Talos team. They also said they think it is using the same vulnerability that was pubished/known. We also have conducted a thorough code review after the previous vulnerability.

Thanks for the quick response, that is good to know and quite reassuring.

UPDATE:
FBI has seized and sinkholed toknowall.com domain, here is a copy of an affidavit (PDF).

Thanks for the prompt response Normis.

I assume people that were using the quickset dynamic dns vpn and appropriate firewall rules + updated fw would have been invunerable to these attacks ?

Any RouterOS version with firewall on the www port from untrusted networks was always safe. The original vunlerability that was fixed in march 2017 was only affecting you, if the www port 80 (webfig) was open to untrusted networks.

Normis, do not citate the previous post.

As always, great job guys.

This is great news, but why have I had to dig this info out from the forum? Why isn’t this statement on the Mikrotik home page, somewhere in the news section?

How do you know for sure it was the www exploit that was used instead of for example the more recent winbox exploit?

Hi, after the the linked news/thread back in March (http://forum.mikrotik.com/t/urgent-security-advisory/117944/1) I checked patch levels - or at least thought I had.

On rechecking with the latest set of news today, it became clear to me that I’ve been applying upgrades incorrectly for a long time - I have only been upgrading the RouterOS packages (bang up to date now, and never far behind), not the Routerboard firmware, which was really old (3.x).

1/ Would this partial upgrade have potentially left me open to this attack? I’m hoping not, and that the firmware is basically just a bootloader.

2/ Particularly if the answer to the above is ‘yes’, it would be great to have reassurance that upgrading the firmware (which I have now done) as well as the packages would definitely clear the malware. I know Mikrotik has said ‘yes’ to this before. However, it would be good to have confirmation that - as far as Mikrotik is aware - the malware has not evolved the ability to protect itself against removal, given that we appear to be talking about a state actor that has had since March to develop this defence.

3/ (Unrelated to this thread, really) What level of general exposure would I have had from not updating firmware over a long period of time?

I have had a pretty restrictive set of firewall rules applied - there should be no access from the Internet for anything except L2TP VPN connections. Hopefully that would have mitigated the attack on its own. But it would be great to have an answer to 1/ that would apply even if I had made a mistake in those firewall rules, as it appears I’m incapable of applying an update :frowning:

Cheers,

Martin

Exploit was in RouterOS, so if you upgraded only RouterOS and left old bootloader you are safe.

Thanks mrz for the fast reply.

Thanks for the update and the reminder (link) to the good security practices page!

Isn’t strange that all these news inform that many devices are volunerable but CISCO ones are free from the problem?

investigating the malware, which targets devices from > Linksys, MikroTik, Netgear, TP-Link and QNA> P, advising users to install security updates. … Cisco Systems, which has been investigating the threat for several months…

For me it seems to be some kind of “gray PR” (gray means that I do not want use the “black” word yet) but it resambles a little the “Volkswagengate” in the USA.

BartosP are you working for juniper :stuck_out_tongue_winking_eye:
CISCO has their own issues, they are not virginal.
https://www.bankinfosecurity.com/200000-cisco-network-switches-reportedly-hacked-a-10788
https://www.scmagazine.com/cisco-patched-bug-in-secure-sockets-layer-ssl-vpn-functionality-of-the-asa-function/article/740572/
https://www.fliegerfaust.com/cyber-attack-2550049185.html