CornfieldWin
Occasional Visitor
Frankly, I never seen anything like this, but the vulnerability was my fault.
My router now runs a corrupted version of Merlin 3006.102.5 on AX88U Pro connected via Spectrum provided copper cable modem symmetric at 600Mb.
My Guest Portal SSID was left open unprotected after initial experimentation for at least 3 months (personal negligence, plead guilty). Upon discovery yesterday that the router had been exposing a neighborhood WIFI candy store, an access code was created whereupon the system immediately crashed. Internet connection (via unbound) was permanently lost. Two flash and restore with SHA256 verified Asuswrt-Merlin downloads brought up a deeply corrupted version that appears could almost be a prior version due to missing features but was restored with the original Asuswrt-Merlin download and a second fresh one. Most critically, Backmon which had worked previously now fails by reporting tar file corruption. Oddly, there was no Internet connection until unbound was (re) installed.
The UI appears to be a throwback: Guest Pro in particular is different than before initial restoration. Entire Guest Pro options like vlan bridging is gone. Entware email fails to test, although working perfectly before. Internal dnsmasq.conf and dnsmas1-[n].conf files are incomplete and 2 missing vlan config files, and YazDHCP failed to update dnsmasq.conf.add or dnsmasq.conf. Most importantly, dv-vnstat installed a week ago shows unexpected outbound traffic dropped dramatically overnight, which was a prior clue to be investigated (dv-nstat was not yet a trusted tool) and Skynet or Diversion reported unusual traffic from Bulgaria also tbi. I have idea yet what other damage may have been done to my extensive IOT devices, streaming media devices, etc. The level of sophistication to pull this off is staggering and reveals deep knowledge of ASUS boot firmware and Asuswert-Merlin system software (aka as router firmware), this is not an everyday hack. It is doubtful that the immediate neighbors have the sophistication, semi-rural WNY is no tech haven, but compromise on any nearby WIFI enabled system might have also found my vulnerability very quickly.
I post this as a warning there may be a sophisticated bot net and persistent malware threat out there targeting ASUS-Merlinwrt (or I may have piled bonehead mistake upon bonehead mistake but I don't see where past the glaringly open access). I seek input before taking further action to report such a serious incident.
My router now runs a corrupted version of Merlin 3006.102.5 on AX88U Pro connected via Spectrum provided copper cable modem symmetric at 600Mb.
My Guest Portal SSID was left open unprotected after initial experimentation for at least 3 months (personal negligence, plead guilty). Upon discovery yesterday that the router had been exposing a neighborhood WIFI candy store, an access code was created whereupon the system immediately crashed. Internet connection (via unbound) was permanently lost. Two flash and restore with SHA256 verified Asuswrt-Merlin downloads brought up a deeply corrupted version that appears could almost be a prior version due to missing features but was restored with the original Asuswrt-Merlin download and a second fresh one. Most critically, Backmon which had worked previously now fails by reporting tar file corruption. Oddly, there was no Internet connection until unbound was (re) installed.
The UI appears to be a throwback: Guest Pro in particular is different than before initial restoration. Entire Guest Pro options like vlan bridging is gone. Entware email fails to test, although working perfectly before. Internal dnsmasq.conf and dnsmas1-[n].conf files are incomplete and 2 missing vlan config files, and YazDHCP failed to update dnsmasq.conf.add or dnsmasq.conf. Most importantly, dv-vnstat installed a week ago shows unexpected outbound traffic dropped dramatically overnight, which was a prior clue to be investigated (dv-nstat was not yet a trusted tool) and Skynet or Diversion reported unusual traffic from Bulgaria also tbi. I have idea yet what other damage may have been done to my extensive IOT devices, streaming media devices, etc. The level of sophistication to pull this off is staggering and reveals deep knowledge of ASUS boot firmware and Asuswert-Merlin system software (aka as router firmware), this is not an everyday hack. It is doubtful that the immediate neighbors have the sophistication, semi-rural WNY is no tech haven, but compromise on any nearby WIFI enabled system might have also found my vulnerability very quickly.
I post this as a warning there may be a sophisticated bot net and persistent malware threat out there targeting ASUS-Merlinwrt (or I may have piled bonehead mistake upon bonehead mistake but I don't see where past the glaringly open access). I seek input before taking further action to report such a serious incident.