论文标题
表征针对低成本路由器的攻击:Mikrotik案例研究(扩展)
Characterising attacks targeting low-cost routers: a MikroTik case study (Extended)
论文作者
论文摘要
针对网络基础架构设备的攻击对Internet安全构成威胁。针对此类设备的攻击会影响整个自主系统。近年来,诸如VPNFILTER,NAVIDADE和SONARDNS之类的恶意软件已被用来妥协低成本路由器,并从DDOS攻击到勒索软件部署。相关类型的路由器既用于为家庭用户提供最后一英里的访问权限,又用于管理域间路由(BGP)。 Mikrotik是低成本路由器的特殊品牌。在我们以前的研究中,我们发现互联网上有超过400万个Mikrotik路由器。我们已经表明,这些设备在Internet交换基础架构中也很受欢迎。尽管它们很受欢迎,但这些设备仍具有许多漏洞。在本文中,我们通过对Mikrotik靶向攻击的长期研究扩展了先前的分析。通过使用我们开发的高度互动性蜜罐,我们从部署在澳大利亚,巴西,中国,印度,荷兰和美国的传感器中收集了超过4400万包包。传入的流量是根据常见漏洞和暴露于检测针对Mikrotik设备的攻击的。这使我们能够确定系统上的各种活动,例如加密货币挖掘,DNS服务器重定向以及超过3,000多个成功建立的用于窃听的隧道。尽管这项研究重点关注Mikrotik设备,但方法和公开脚本都可以轻松地应用于任何其他类型的网络设备。
Attacks targeting network infrastructure devices pose a threat to the security of the internet. An attack targeting such devices can affect an entire autonomous system. In recent years, malware such as VPNFilter, Navidade, and SonarDNS has been used to compromise low-cost routers and commit all sorts of cybercrimes from DDoS attacks to ransomware deployments. Routers of the type concerned are used both to provide last-mile access for home users and to manage interdomain routing (BGP). MikroTik is a particular brand of low-cost router. In our previous research, we found more than 4 million MikroTik routers available on the internet. We have shown that these devices are also popular in Internet Exchange infrastructures. Despite their popularity, these devices are known to have numerous vulnerabilities. In this paper, we extend our previous analysis by presenting a long-term investigation of MikroTik-targeted attacks. By using a highly interactive honeypot that we developed, we collected more than 44 million packets over 120 days, from sensors deployed in Australia, Brazil, China, India, the Netherlands, and the United States. The incoming traffic was classified on the basis of Common Vulnerabilities and Exposures to detect attacks targeting MikroTik devices. That enabled us to identify a wide range of activities on the system, such as cryptocurrency mining, DNS server redirection, and more than 3,000 successfully established tunnels used for eavesdropping. Although this research focuses on Mikrotik devices, both the methodology and the publicly available scripts can be easily applied to any other type of network device.