Tens of thousands of home routers have been infected with malware and are being used by hackers to launch distributed denial-of-service (DDoS) attacks.
The router-based botnet was discovered by Web security firm Incapsula while investigating a series of DDoS attacks against dozens of its customers that have been going on since late December.
Incapsula’s researchers traced the malicious traffic back to routers made by Ubiquiti Networks and distributed by ISPs around the world to their customers. The devices had DDoS malware programs installed on them — usually more than one, the researchers said in a report published Tuesday.
The researchers said they don’t believe the routers were hacked through a vulnerability in their firmware, but because they had been deployed in an insecure manner: with their management interfaces exposed to the Internet via SSH and HTTP using default credentials.
In fact, they found shell scripts running on the compromised devices that were designed to scan the Internet for other routers that could be accessed over SSH with default usernames and passwords.
“Facilitating the infiltration, all of these under-secured routers are clustered in the IP [Internet Protocol] neighborhoods of specific ISPs that provide them in bulk to end-users,” the researchers said. “For perpetrators, this is like shooting fish in a barrel, which makes each of the scans that much more effective.”
In an earlier version of its report distributed to reporters, Incapsula said it believed the hacktivist group Anonymous was among those making use of the compromised routers. It later said that, due to conflicting data, it could not be confident that Anonymous was involved in the hacking.
The problem of ISPs distributing insecure routers to their customers is a widespread one that hackers have exploited time and time again over the years.
In addition to DDoS attacks, compromised routers are used to redirect users to malicious websites, intercept online banking sessions, inject rogue ads into Web traffic, steal credentials for various online accounts and perform other illegal activities.
Cybersecurity journalist Brian Krebs reported in January that a group called Lizard Squad had set up a DDoS-for-hire service using hacked home routers. Lizard Squad has taken responsibility for DDoS attacks against Sony’s PlayStation Network, Microsoft’s Xbox Live service and other high profile websites.
The botnet made up of Ubiquiti devices is most likely not the one used in January by Lizard Squad for its DDoS service, because they are powered by different malware programs, the Incapsula researchers said. However, days after Incapsula observed a surge in attacks from the Ubiquiti botnet in April, Lizard Squad hinted on Twitter that it has a more powerful botnet.
It’s possible, and even likely, that the hacked Ubiquiti routers are being used by multiple groups. This is supported by the presence of multiple DDoS malware programs on them.
Incapsula detected 40,269 different IP addresses from 1,600 ISPs in 109 countries associated with the botnet. The largest concentrations of infected devices are in Thailand (64 percent), Brazil (21 percent), the U.S. (4 percent) and India (3 percent).
The company also identified 60 servers used by hackers to control the routers, the majority of them in China and the U.S.
Users should make sure that their routers do not expose management interfaces over HTTP or SSH to the Internet. A tool on yougetsignal.com can be used to scan a router’s IP for open ports.
Users should also make sure that they change the default login credentials for their routers, the Incapsula researchers said. Ubiquiti provides information on how to do this in the user guides for its airOS devices.
Correction: The security company that provided the information for the original story “Anonymous-tied DDoS botnet shows insecure routers are legion” now says it was mistaken and that Anonymous may not have been involved with the botnet at all. The story has been rewritten to reflect that.