Helped uncover a massive cyber incident today affecting multiple residential complexes and built in switches and infrastructure.
It appears the attackers were trying to reroute and intercept numerous individuals WFH residential traffic.
Add this to your threat list
Residential complexes have their own built in routing for fiber.
After plugging in a new device into the residential facility preconfigured using ISP setup, after 24 hours noticed unknown devices being directly connected to subnet of the victims router.
Victims router was then exploited and administrative password was changed, additional devices were allowed by MAC address to join subnet of targeted victim
Looking over pcaps revealed that entire network in residential was turned into a flat network with no guest isolation.
Confirmed with ISP today that this was not intentional, and that switch configurations were not in original state and that default remote administrative passwords on many of them were changed.
Another review of pcap logs revealed attempted https spoofing, layer 2 attacks
Being delivered by devices connected remotely who were bridging themselves into each switch and subnet systematically. They spent extra time on a few locations and then allowed themselves to reconnect and join via MAC
They specifically denied VPNs from connecting, changing any victim who connected via VPN a bad gateway.
Got to watch this happen in real time.
This is essentially the same as blasting your victims MFA with requests until they accept. Users turned off VPN to work
ISP is not throwing out the possibility of hybrid physical and cyber incidents being employed here.
They said they are beefing up the physical protection of this and other units and will be inspecting other properties as well.
Reminder: If you plug directly into an ethernet connection in your apartment/condo - that switch is *somewhere* and likely out of your control.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
#log4j theoretical worm depending on propegation speed might just blend in with the noise for a while.
Ideally right now reducing attack surface should be everyone's top priority
Unfortunately we are dealing with a bug with unprecedented vectors.
Everyone right now shouldn't even focus on worm capabilities because exploitation is so wide spread right now it doesn't even increase your risk level, attackers are doing nearly identical to what worm activity would be like.
Traffic congestion and network bottlenecking tho...
Historically if we look at worm activity it took roughly a week to 14 days for them to be widespread & developed
However those in the past didn't use logic flaws & required memory corruption exploits which are less reliable & complex payloads.
#Log4J based on what I've seen, there is evidence that a worm will be developed for this in the next 24 to 48 hours.
Self propagating with the ability to stand up a self hosted server on compromised endpoints.
In addition to spraying traffic, dropping files, it will have c2c
Biggest hurdle appears to be implementing a JDK gadget to enable code execution on limited env.
That is currently being researched by several groups.
Honestly I'm kinda surprised it isn't finished yet, but I have seen at least 3 groups (Eastern euro, .ru and .cn) that are investigating options to do this.
Goals appear varied: financial gain via extortion as well as selling access to compromised hosts to RaaS groups