netware5
Very Senior Member
Thanks for the info. So you would not recommend to save a settings file and then reload it when the router is set to factory default?
Yes. Just for precaution. We don't know what a mess 'they' did with NVRAM settings.
Thanks for the info. So you would not recommend to save a settings file and then reload it when the router is set to factory default?
Do a probe from outside (WAN side) of TCP port 2222 to check if it is open.
Did you have Web Access from WAN enabled? What about Asus Router app? What is/was your SSH port with WAN+LAN? What was the firmware version when you first saw SSH setting changes?
default SSH port is 22, and this is very similar to mine, bar the IP. My IP subnet is 192.168.1.xThis happened just after I did a firmware reload and NVRAM reset. RT-AC87U. Merlin 380.64. No web access from WAN ever. Never used the smartphone app. I don't know what port was active - probably 22.
I'm also seeing -a -j and -k on dropbear.
admin@RT-AC87U:/tmp/home/root# ps | grep dropbear
6323 admin 1068 S dropbear -p 10.0.0.1:22 -a -j -k
9157 admin 1096 S dropbear -p 10.0.0.1:22 -a -j -k
9163 admin 1380 S grep dropbear
Yes. Just for precaution. We don't know what a mess 'they' did with NVRAM settings.
My device showed a couple a hard reboots/crashes...And someone mentioned there is no python inside AsusWRT - but one sees python in the logs - this is just stuff echo'ed back as part of a helper script...
This is a sign of a ROP attack - ROP stands for Return Oriented Programming - where the attacker can grab little bits here and there inside existing code, and build a new binary to do things...
And with Thumb, sometimes it's not obvious when looking at things - but basically these attacks use various code on the stack, and pop things around the PC, LR, and R0/R1 registers inside the ARM - that we some some fatal exceptions in some of the logs where the ARM reboots is a very good indication - and that librt, along with a couple of other libs, someone has taken a very close look at the build and has crafted the attack very nicely...
smells like russia actually...
Best thing that Asus could do is disable that function all together - but I'm not sure how this would impact all their vertical services (DDNS, Cloud, Protect, device Apps, etc...)
There are some safe, legitimate use for exposing the web interface to the WAN. That's how I do all of my development: test routers are within my LAN, and my laptop sits on the LAN, in front of the tested router's WAN.
if I remember correctly, thumb support is disabled in Asuswrt's kernel.
Also, newer routers have an encrypted CFE, which makes things harder for exploits to hide anything in there. It's not 100% locked down however, but that's not something I'd feel like discussing in public, just like I wouldn't discuss the (now known) cfecommit tricks supported by previous router generations...
So far, everyone affected had their web interface open to the WAN, which leads me to believe this is the work of bots, not of malicious websites hitting you from the LAN side.
If anyone actually felt like tracking down what is REALLY going on, they'd have to setup a honeypot, with full traffic capture of what goes in and out of the honeypot. Without that, it will be a wild guessing game figuring out the exact vector of attack. Most likely it's a way to bypass user authentication and apply changes to an existing webpage (the Advanced_System_Content.asp page seems to be getting hit based on the list of services being restarted). Another possible way is a method allowing to retrieve the username and password, and then using it to fully access the webui, and opening SSH access.
No way to be sure until proven as such, but I suspect the same hole _should_ also exist in the stock firmware, since I've made it a point to never touch the authentication code in httpd, aside from the obvious security fixes (preventing visible buffer overruns, that sort of thing).
The dropbear flag issue mentioned in this thread are irrelevant to this issue. That port forwarding feature requires you to open an authenticated session, and it does not do what most people think it does (it's more of a port redirection than a port forward, really).
if I remember correctly, thumb support is disabled in Asuswrt's kernel.
Features : swp half thumb fastmult edsp
It's there...
But the kernel's ability to load thumb binaries is disabled however.
I wonder how many of these people seeing attacks have been using the Android App to manage their routers.
There have been reports about malware on android that changes DNS setting, but I have not faced one. I heard that the main target of one of DNS changing attack is in China, but there could be several more attacks. When I was reading about one DNS changing attack that its main target is China, it seems like infected devices downloaded apps outside Playstore which claims to be Baidu. However, I would install a free well-known antivirus(Ex. Sophos, McAfee, Malwarebytes, Avira, ...) on Android devices for children as they may not know how to browse safely.Also, has anyone noticed any DNS changes? Are the affected routers home to users with Android devices & children with unlimited access to the Playstore?
There have been reports about malware on android that changes DNS setting, but I have not faced one. I heard that the main target of one of DNS changing attack is in China, but there could be several more attacks. When I was reading about one DNS changing attack that its main target is China, it seems like infected devices downloaded apps outside Playstore which claims to be Baidu. However, I would install a free well-known antivirus(Ex. Sophos, McAfee, Malwarebytes, Avira, ...) on Android devices for children as they may not know how to browse safely.

Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!