What's new

Unexplained 'hacks' into Asus routers

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

We'd have to see more detailed information from @sanke1 to confirm that it's the same hack and not something different. @sanke1 can we see your syslog please?
I had posted the screenshot of the problem in this post but the image got deleted while editing the post. Maybe a mod can retrieve the image from there. Post #36 of this thread.

But I assure you the logs were same as mentioned. Few failed attempts and few success and my SSH port was changed to 2222.
 
But I assure you the logs were same as mentioned. Few failed attempts and few success and my SSH port was changed to 2222.
Thanks for the extra info. The tell-tale signs for this hack are logging in on the first attempt without failure and then starting up another dropbear instance in background before logging out. This is usually followed within a couple of minutes by another login from a different IP address.
Code:
Dec 30 08:51:28 dropbear[30095]: Child connection from 46.20.215.170:52354
Dec 30 08:51:33 dropbear[30095]: Password auth succeeded for 'admin' from 46.20.215.170:52354
Dec 30 08:52:15 dropbear[30267]: Running in background
If you're seeing failed login attempts then they are probably not connected with this hack.
 
Thanks for the extra info. The tell-tale signs for this hack are logging in on the first attempt without failure and then starting up another dropbear instance in background before logging out. This is usually followed within a couple of minutes by another login from a different IP address.
Code:
Dec 30 08:51:28 dropbear[30095]: Child connection from 46.20.215.170:52354
Dec 30 08:51:33 dropbear[30095]: Password auth succeeded for 'admin' from 46.20.215.170:52354
Dec 30 08:52:15 dropbear[30267]: Running in background
If you're seeing failed login attempts then they are probably not connected with this hack.
"Password auth succeeded for 'admin' from 46.20.215.170:52354"

That's in to me.
And same IP range as others.
 
thats why i dont trust ISP gear cause most of em leave shirt like that open and unsecured.
 
exactly why ;) where i live they use SOAP and that is insecure as **** the whole zyxel botnet (mirai) that something i was exposed to until recently kinda plugged that whole but its still scary cause there are far more things i have no clue about in their software.

btw funny video :D watching it now and enjoying myself :)
 
Last edited:

Latest threads

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Top