www.networkworld.com Open in urlscan Pro
151.101.66.165  Public Scan

URL: https://www.networkworld.com/article/3693753/cisco-warns-of-attacks-on-network-routers-firewalls.html
Submission: On June 23 via api from IN — Scanned from DE

Form analysis 1 forms found in the DOM

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1" dir="ltr" spellcheck="false" placeholder="Start Searching"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

Close Ad


network world
UNITED STATES
 * United States
 * Asia
 * United Kingdom

 * Glossary
 * Data Center
 * SD-WAN
 * Linux
 * Events
 * White Papers/Webcasts
 * Newsletters

×

search
 

5G
Cloud
 * Hybrid Cloud
 * Private Cloud

Data Centers
Internet of Things
Linux
Networking
 * SD-WAN
 * VPNs
 * Wi-Fi

Storage
Virtualization
Windows Server
Newsletters
Events
In-Depth
 * Features
 * How-To
 * News
 * Opinion
 * Reviews

Blogs
Video
 * 2-Minute Linux Tips
 * IDG TECH(talk) Channel

White Papers/Webcasts
From Our Partners
   
   
 * The Latest Content from Our Sponsors

More from the Foundry Network
The voice of IT leadership
Analytics Careers CIO Role Digital Transformation Leadership Project Management
Security at the speed of business
Application Security Cloud Security Identity Management Information Security
Network Security Risk Management Security Software
Making technology work for business
Blockchain Collaboration Mobile Office Software Security Systems Management
Windows
Building the next-gen enterprise
Analytics Cloud Computing Databases Devops Machine Learning Open Source Software
Development
 * About Us |
 * Contact |
 * Republication Permissions |
 * Privacy Policy |
 * Cookie Policy |
 * European Privacy Settings |
 * Member Preferences |
 * Advertising |
 * Foundry Careers |
 * Ad Choices |
 * E-commerce Links |
 * California: Do Not Sell My Personal Info |

 * Follow Us
 * 
 * 
 * 


×

Close
 * Home
 * Technology Industry
 * Cisco Systems




CISCO WARNS OF ATTACKS ON NETWORK ROUTERS, FIREWALLS


CISCO TALOS INTELLIGENCE GROUP'S WARNING FOLLOWS A UK NOTICE ABOUT INCREASING
EXPLOITS AGAINST PERIMETER-BASED NETWORKING EQUIPMENT.

 * 
 * 
 * 
 * 
 * 
 * 
 * 

By Michael Cooney

Senior Editor, Network World | Apr 18, 2023 4:26 pm PDT


HYWARDS / Getty Images



Cisco’s Talos security intelligence group issued a warning today about an uptick
in highly sophisticated attacks on network infrastructure including routers and
firewalls.

The Cisco warning piggybacks a similar joint warning issued today from The UK
National Cyber Security Centre (NCSC), the US National Security Agency (NSA), US
Cybersecurity and Infrastructure Security Agency (CISA) and US Federal Bureau of
Investigation (FBI) that noted an uptick in threats in part utilizing an exploit
that first came to light in 2017.  That exploit targeted an SNMP vulnerability
in Cisco routers that the vendor patched in 2017. 

But as Cisco and the government agencies noted, similar exploits are being aimed
at a broad set of multivendor networking gear, potentially including Juniper,
Extreme, Allied-Telesis, HP and others.

[ Get regularly scheduled insights by signing up for Network World newsletters.
]

“The warning involves not just Cisco equipment, but any networking equipment
that sits at the perimeter or that might have access to traffic that a
significantly capable and well-tooled adversary might have an interest in
intercepting and modifying,” said JJ Cummings, Cisco Talos Threat Intelligence &
Interdiction team lead. Cummings leads the Talos team tasked with nation-state,
critical infrastructure, law enforcement, and intelligence-based concerns.



In a blog noting the increase in threats, Cisco Talos wrote: “We have observed
traffic manipulation, traffic copying, hidden configurations, router malware,
infrastructure reconnaissance, and active weakening of defenses by adversaries
operating on networking equipment. Given the variety of activities we have seen
adversaries engage in, they have shown a very high level of comfort and
expertise working within the confines of compromised networking equipment.”

National intelligence agencies and state-sponsored actors across the globe have
attacked network infrastructure as a primary target, Cisco stated. “Route/switch
devices are stable, infrequently examined from a security perspective, are often
poorly patched and provide deep network visibility.”



“The idea here is to get the messaging out that network operations teams need to
maybe start to approach things slightly differently or at least be more mindful
from a security perspective, because there are significantly capable adversaries
that are targeting their infrastructure that may or may not, in many of the
cases, been significantly tooled or monitored, or updated,” Cummings said. 

Nominations are open for the 2024 Best Places to Work in IT

“What we do see primarily is threats targeting those devices and with these
types of attacks, somewhat aging—and certainly outdated from a software
perspective—devices,” Cummings said. “What we what we see in almost every
instance that I can think of, is the adversary also having some level of
pre-existing access to one degree or another to that device.”

Cisco noted a number of specific growing threats including:

 * The creation of Generic Router Encapsulation (GRE) tunnels and the hijacking
   of DNS traffic, giving the actor the ability to observe and control DNS
   resolution.
 * Modifying memory to reintroduce vulnerabilities that had been patched so the
   actor has a secondary path to access.
 * Modification of configurations to move the compromised device into a state
   that lets the actor execute additional exploits.
 * Installation of malicious software into an infrastructure device that
   provides additional capabilities to the actor.
 * The masking of certain configurations so that they can’t be shown by normal
   commands.


RECOMMENDED PRECAUTIONS INCLUDE UPDATING SOFTWARE.

As for what can be done to protect networking infrastructure, the biggest and
perhaps most obvious step is keeping software up-to-date, Cummings said. “If you
fix the vulnerabilities, and you’re running current software, it’s not going to
certainly, completely eliminate your risk. But if I get rid of 10 CVEs, that
dramatically reduces my risk footprint,” Cummings said. 

He recommends increasing visibility into device behavior, “because with without
visibility, I can’t necessarily catch the bad guy doing the bad guy things. I
need to be able to see and understand any change or access that happens to that
fully updated device." Similarly, strictly locking down access to those devices
makes it much harder for attackers to get to them, he said.

The blog also suggests:


 * Select complex passwords and community strings; avoid default credentials.
 * Use multi-factor authentication.
 * Encrypt all monitoring and configuration traffic (SNMPv3, HTTPS, SSH,
   NETCONF, RESTCONF)
 * Lock down and aggressively monitor credential systems.
 * Do not run end-of-life hardware and software.

Next read this:

 * 9 career-boosting Wi-Fi certifications
 * What is MPLS, and why isn't it dead yet?
 * 11 ways to list and sort files on Linux
 * 5 free network-vulnerability scanners
 * How-to measure enterprise Wi-Fi speeds



Related:
 * Cisco Systems
 * Network Security
 * Network Monitoring
 * Security

Michael Cooney is a Senior Editor with Network World who has written about the
IT world for more than 25 years. He can be reached at michael_cooney@idg.com.

Follow
 * 
 * 
 * 
 * 

Copyright © 2023 IDG Communications, Inc.

The 10 most powerful companies in enterprise networking 2022



SPONSORED LINKS

 * dtSearch® - INSTANTLY SEARCH TERABYTES of files, emails, databases, web data.
   25+ search types; Win/Lin/Mac SDK; hundreds of reviews; full evaluations
 * There's a new hybrid cloud agenda. HPE has the playbook for success. Learn
   more here.
 * Maximize the ROI of Cisco solutions with Cisco U. Learn more.

Network World Follow us
 * 
 * 
 * 
   


 * About Us
 * Contact
 * Republication Permissions
 * Privacy Policy
 * Cookie Policy
 * European Privacy Settings
 * Member Preferences
 * Advertising
 * Foundry Careers
 * Ad Choices
 * E-commerce Links
 * California: Do Not Sell My Personal Info

Copyright © 2023 IDG Communications, Inc.

Explore the Foundry Network descend
 * CIO
 * Computerworld
 * CSO Online
 * InfoWorld
 * Network World















NETWORK WORLD WANTS TO SHOW YOU NOTIFICATIONS

--------------------------------------------------------------------------------

YOU CAN TURN OFF NOTIFICATIONS AT ANY TIME FROM YOUR BROWSER

Accept Do not accept

POWERED BY SUBSCRIBERS