• arrakark@10291998.xyz
    link
    fedilink
    English
    arrow-up
    69
    ·
    10 days ago

    I have a TP-Link router. Maybe I’m an idiot, but I searched around for a bit and I literally could not find which models of router were effected. All articles about Botnet-7777 are frustratingly vague with this.

    • ladfrombrad 🇬🇧@lemdro.id
      link
      fedilink
      English
      arrow-up
      34
      ·
      10 days ago

      I’ve had no end of trouble with routers and ones you should choose to be sure of.

      The ones where you can flash OpenWRT seems the only choice if you want some semblance of security. But even my current Xiaomi router with stock firmware creates hash mismatches using apt to download things, and I don’t 100% know with confidence that using OpenWRT on it instead is keeping me right.

        • ladfrombrad 🇬🇧@lemdro.id
          link
          fedilink
          English
          arrow-up
          6
          ·
          9 days ago

          As opposed to, TP-Link, Cisco(Linksys) and other off the shelf routers it seems some will only go for brands with their own proprietary firmware?

          I grabbed that Xiaomi router on the premise it has OpenWRT, but I’d like to see Ubi / Unifi routers put under the same scrutiny instead of just lumping a brand name as a no-go.

          What’s your recommendation?

          • SharkAttak@kbin.melroy.org
            link
            fedilink
            arrow-up
            1
            arrow-down
            3
            ·
            9 days ago

            Mine was a half-joke, but it’s not the first time chinese hardware was caught sending data around. Now I can’t recommend anything specific since the last time I bought a router was ages ago, and even though having one running OpenWRT is good I’d avoid it to be on the safer side.

        • pandapoo@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          11
          ·
          10 days ago

          They are frequently targeted because they offer enterprise grade configurations at consumer prices.

          Which means, there’s a lot that can be misconfigured, and a lot of short staffed and under budgeted IT departments that deploy them, which means they are a good payoff when exploited.

          That’s the bad part, and the good part.

          You really cannot beat their price point to value for professional grade networking equipment. Just take the time to understand what you’re doing when doing your configurations, and keep them updated.

          • bane_killgrind@slrpnk.net
            link
            fedilink
            English
            arrow-up
            6
            ·
            10 days ago

            Very little is changing over time… I have a proliant salvage server running proxmox with some hosts and the router only port forwards to an NGINX proxy manager instance for the web interfaces on those hosts. I run a synology NAS separate from the proliant hardware that runs through the proxy.

            I know I don’t understand it all, and i’m open to suggestions.

            • pandapoo@sh.itjust.works
              link
              fedilink
              English
              arrow-up
              3
              ·
              edit-2
              10 days ago

              Did you mean to send that reply to me?

              I ask because I’m not quite sure what specific suggestions you’re looking for.

              But in general, I would suggest not exposing port forwarding.

              What services are running behind NGINX? What router/firewall are you using?

              • bane_killgrind@slrpnk.net
                link
                fedilink
                English
                arrow-up
                2
                ·
                10 days ago

                Yes, I attribute security significant misconfigurations to a lag between new service deployments and a relevant review by network security (in a business environment. At home it’s just me.)

                So I’m running Milestone VMS, Synology NAS and maybe in a day a minecraft server for the kids, which should all be available outside my home. I’m using the mikrotik HexPOE which is my main router/firewall.

        • felbane@lemmy.world
          link
          fedilink
          English
          arrow-up
          5
          ·
          9 days ago

          Mikrotik is pretty decent but their configuration method drives me up a wall. Ansible helps mitigate the annoyance, at least (in that I only have to figure out/remember the arcane incantation for configuring VLANs once, and then subsequently just have the machine do it).

        • exu@feditown.com
          link
          fedilink
          English
          arrow-up
          4
          ·
          9 days ago

          Mikrotik is great for features, but their UI definitely feels ancient and you will sometimes question why something takes this many steps.
          However, I’ve never had an plan I couldn’t replicate with their routers.

        • InverseParallax@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          ·
          10 days ago

          Run them in a lot of places, love them.

          They’re good at being configured and forgotten about.

          My main rack, that’s more complicated, I have proper gear, but mikrotik is great for everything else.

        • ladfrombrad 🇬🇧@lemdro.id
          link
          fedilink
          English
          arrow-up
          2
          ·
          10 days ago

          Never used them pal, but seen them used in Enterprise environments?

          Something I’ve found on a SOHO environment though and what I bought a family member?

          Gli-Net mini routers. They come with OpenWRT as a base and then lipstick it with a nice interface. But as always, YMMV

          • bane_killgrind@slrpnk.net
            link
            fedilink
            English
            arrow-up
            4
            ·
            edit-2
            10 days ago

            Years ago, another trade worker on a construction site was using their wifi stuff, and mentioned using it at home. I went and picked up the hexPOE router and i’m pretty happy with it, but all i’m doing is port forwarding and I set up a rule to capture all DNS requests and shunt them into my pihole.

            The documentation is pretty spiffy and public.

            I’m not really sure if this seems good because I don’t know any better, or it’s good because it’s good.

            edit Gli-net seems nice, but i’m a stickler of using a WAP separate from the router. I know I pay more.

            • ladfrombrad 🇬🇧@lemdro.id
              link
              fedilink
              English
              arrow-up
              2
              ·
              9 days ago

              edit Gli-net seems nice, but i’m a stickler of using a WAP separate from the router. I know I pay more.

              It’s exactly why I bought her two of them. One their main router and the other in AP mode ;)

    • finitebanjo@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      edit-2
      9 days ago

      If you don’t use Microsoft Azure cloud services then it shouldn’t matter, for now. Might want to just avoid running those for a little while.

      The article also says:

      It’s unclear precisely how the compromised botnet devices are being initially infected. Whatever the cause, once devices are exploited, the threat actors often take the following actions:

      • Download Telnet binary from a remote File Transfer Protocol (FTP) server
      • Download xlogin backdoor binary from a remote FTP server
      • Utilize the downloaded Telnet and xlogin binaries to start an access-controlled command shell on TCP port 7777
      • Connect and authenticate to the xlogin backdoor listening on TCP port 7777
      • Download a SOCKS5 server binary to router
      • Start SOCKS5 server on TCP port 11288.

      So maybe setting up some firewall rules could also help prevent further problems.

  • DarkCloud@lemmy.world
    link
    fedilink
    English
    arrow-up
    32
    ·
    edit-2
    10 days ago

    The article makes it clear that the Chinese botnet is targeting Microsoft azure accounts, usually for large organizations involved with governments, infrastructure, legal professionals, science and technology.

    It also states that the attacks can be disinfected by regularly restarting your router, but that this doesn’t prevent reinfection later.

    The US intelligence services also says you should regularly restart your phone.

    This is Microsoft’s posting about it which other news sources are quoting from: https://www.microsoft.com/en-us/security/blog/2024/10/31/chinese-threat-actor-storm-0940-uses-credentials-from-password-spray-attacks-from-a-covert-network/

    It has a recommendations section which suggests “credential hygiene” and strong passwords help.

    • LunchMoneyThief@links.hackliberty.org
      link
      fedilink
      English
      arrow-up
      8
      arrow-down
      1
      ·
      10 days ago

      Many experts in the past have noted that most such infected devices can’t survive a reboot because the malware can’t write to their storage. That means periodically rebooting can disinfect the device, although there’s likely nothing stopping reinfection at a later point.

      Relevant line for my lazy chadbros who know that reading articles is for sissies.

  • josefo@leminal.space
    link
    fedilink
    English
    arrow-up
    19
    ·
    9 days ago

    thanks to this post I found out about openwrt, and my tplink router model is compatible with it, I see this as an absolute win

    • dinckel@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      ·
      9 days ago

      I’d love to do the same with mine, but admittedly, the hardware in it is so poor, that they just couldn’t get it to work properly.

      It’s quite frustrating too, because despite being a relatively new router, they’re already behind on security updates, and after all the promises, still haven’t delivered the bare necessities as WPA3 support

      • josefo@leminal.space
        link
        fedilink
        English
        arrow-up
        4
        ·
        9 days ago

        Yeah, no joke, I totally didn’t know about any of this, be certain that I’m going to consider this OpenWRT stuff when I’m buying a new router, it one of the most important pieces of my network, and can’t leave it to whatever the manufacturer plans to support in terms of security.

      • JasonDJ@lemmy.zip
        link
        fedilink
        English
        arrow-up
        2
        ·
        9 days ago

        Look to the Xiaomi Mi AX6S. Quite capable router and only like $50 on AliExpress. I just got a second one to use as a mesh node and wireless bridge for a bunch of stuff that gets a terrible signal inside of a solid wood entertainment center.

  • Cargon@lemmy.ml
    link
    fedilink
    English
    arrow-up
    8
    arrow-down
    1
    ·
    9 days ago

    For less money than some gaudy gaming wireless router that you end up replacing every 3 years, you can grab a Mini PC with two NICs, a wireless access point, and install OpnSense.

    Your life will be irrevocably changed for the better.

    • Todd Bonzalez@lemm.ee
      link
      fedilink
      English
      arrow-up
      5
      arrow-down
      2
      ·
      9 days ago

      Eh, mini-PCs weren’t designed for that. Just buy an OpenWRT compatible router, or a router designed for OpenWRT like the ones from Turris. It’s better to have hardware designed for this kind of application.

      • histic@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        6
        arrow-down
        2
        ·
        9 days ago

        Why does it matter ”what its designed for” a router is no better at it then a computer with 10x the brains you can route 10gig through them if you have the nics for it large company use pfsense and the like

        • interdimensionalmeme@lemmy.ml
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          2
          ·
          8 days ago

          The main issue is they have fans and the bios will sometime fail to boot. They are less reliable but much more powerful. It’s a tradeoff.

          • histic@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            1
            arrow-down
            1
            ·
            8 days ago

            Ermmm router have fans mini pc actually doesn’t( at least mine mines fanless) routers also fail to boot but also that not a giant issue either way cause who’s turning on and off their router and any significant interval I have run time of 6 months before mines restarted and that’s due to software updates otherwise it would push a whole year

            • interdimensionalmeme@lemmy.ml
              link
              fedilink
              English
              arrow-up
              2
              arrow-down
              1
              ·
              8 days ago

              I have never had a household router that had a fan in it. Fanless mini pcs do exists they are rarer and usually more expensive and weaker.

              The rebooting problem comes from micro interruption in the power grid. Yes you can add a UPS, but then these will become the main reason why the internet is down (I have a whole stack of APC branded UPS with failed batteries)

              • histic@lemmy.dbzer0.com
                link
                fedilink
                English
                arrow-up
                1
                ·
                8 days ago

                Newer WiFi 6 routers tend to have fans cause they get fairly warm but I’ve had a ups on mine for literally years and had to replace the battery in it once but before I got one even I still never had that problem we haven’t had a power outage in like a year or 2 now and I maybe happens once a year if it does so I don’t see your problem and I have it set to auto turn back on when it gets ac power so it’s a non issue

  • sploosh@lemmy.world
    link
    fedilink
    English
    arrow-up
    3
    ·
    9 days ago

    This makes me want to call up the former CTO of the MSP I worked for who disagreed with me when I said TP-Link and other consumer hardware was a risk we shouldn’t let our customers take and tell him that he’s a miserable drunk who destroyed a company by taking a role he had no business in.

      • sploosh@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        ·
        9 days ago

        Only if he shows me that he wasn’t destroying the company, but building networks to leverage crises into profit.

        Which, it would seem, is what he and the rest of the C-suite team did.

        They bought out the old owners and signed up a bunch of new customers that we didn’t understand how to work with (new industries with different requirements, we were very specialized toward a few professions and our staff’s knowledge and skills reflected that). They also brought in fresh, inexperienced people to manage the clients, so we didn’t really get very good on-boarding results and didn’t generate good documentation for the help desk to work off of. Right off the bat we did a bad job for these new customers and it took us a long time to do it, while our long-time customers had their wait times go up by an unacceptable amount.

        My team was running at their limits, but I was not allowed to let up at all because we needed to get the tickets down. 9 hours days were the minimum, 9.5-10 were the norm. We hadn’t hired any new people when we added the new clients and the new clients generated tickets at 1.75x the of rate existing clients, and they were still signed up more. After months of begging, they hired two people for Tier-3 positions without testing them technically. They were both from corp call centers and had previously read scripts with troubleshooting steps on them. Neither had ever logged into a router. This is where I quit.

        Within four months of my departure (and a few others at my level around the same time, we had all had enough) the company had lost 30% of their clients, two of which were huge 250-person entities that were cash cows for biling. Four months later the owner-operators sold the whole thing to another company, getting high level jobs, equity and cash out of it. As far as I know they’re all still working for the bigger company. Even if they lost money buying and selling, chances are they’re on top in the long run.

          • sploosh@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            9 days ago

            One of the benefits of having a number of middle managers leave is a few of the folks in the trenches get a chance to move up. Two of my team members were there in management through 2023, which is a number of years after everything went down. I don’t know what their compensation looks like, but I know they must have gotten a 15% bump at the least jumping up during the exodus. They were the last two from the staff still at the company.

  • rehydrate5503@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    ·
    8 days ago

    So I just added a TP-Link switch (TL-SG3428X) and access point (EAP670) to my network, using OPNSense for routing. I’m still within the return window for both items. I understand the article mentions routers, but should I consider returning these, and upping my budget to go for ubiquity? The AP would only be like $30 more for an equivalent, so that’s negligible, but a switch that meets my needs is about 1.6x more. And still only has 2 SFP+ ports, while I need 3 at minimum.

    • ladfrombrad 🇬🇧@lemdro.id
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      7 days ago

      Ya know this is a really good point and whether the network switch is managed, or unmanaged.

      I’ve never delved into the black magic of playing with a managed switch before but your comment makes me eager to have a play with one now.

  • werefreeatlast@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    ·
    9 days ago

    Go to openwrt. Or get something better with good security. Unifi is good and very expansible but it doesn’t have opensource software compatibility. Sad really.

        • CaptPretentious@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          ·
          8 days ago

          I mean, that makes sense to some. But not reasonable for an average user. He just did a search for top rated, recommended routers and bought what all these crappy sites recommend. He tried to do the needful.

          • GHiLA@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            1
            ·
            edit-2
            8 days ago

            The average user isn’t going to replace the firmware in a wireless router, so if it sucks out of the box, it’s just going to suck and they’ll never think to make it not so.

            The first word in getting into FOSS or open anything should be compatibility before you even get to the store.

            If not, then… well, I hope you keep the receipt.