Cybersecurity

Can feds dodge the Cisco router hack?

CISCO's logo

Hackers have claimed new territory, hacking into commercial routers, but federal agencies may not have anything to fear – at least, not anything more than the private sector.

FireEye’s Mandiant team announced that they had discovered 14 Cisco routers implanted with “SYNful Knock” malware in four countries – Ukraine, Philippines, Mexico and India – on Sept. 15.

"This is the ultimate spying tool, the ultimate corporate espionage tool, the ultimate cybercrime tool," FireEye Chief Executive Dave DeWalt told Reuters.

Cisco said it alerted customers of the problem in August.

Hackers didn’t exploit a hardware or software vulnerability, but instead used “valid administrative credentials or physical access to the victim’s device” to implant the malware, Cisco wrote in a blog post.

As FireEye and Reuters both noted, commercial routers haven’t really been thought of as vulnerable to takeover, despite the fact that they operate outside of the full gaze of organizational security tools.

“Imagine for a second that every bit of data going in and out of [global] companies could be compromised without any knowledge of it,” the FireEye team wrote. “You might first assume that all of the databases or servers would need to be under attacker control. But the router's position on the edge of the network can now be turned against you to achieve this goal.”

DeWalt said it was likely a nation with sophisticated cyber capabilities behind the attack, but didn’t name a probable culprit.

FCW asked the Homeland Security Department and Cisco for estimates of the number of Cisco devices currently being used by federal agencies, but neither organization was able to offer figures. (FireEye noted, as Cisco did, that Cisco doesn’t seem to be to blame for these attacks; fault appears to lie with organizations having poor controls over router access.)

A Cisco spokeswoman said that federal agencies don’t appear to face any greater risk than the private sector, and urged agencies to limit physical access to routers and ensure privileged credentials are protected.

“[W]e haven't found this on our current Fed customers' networks and we're currently working with all our customers to identify indicators of compromise that can help them determine their exposure to this attack method,” FireEye Communications Director Dan Wire told FCW. He added the caveat, “We can only report on what we actually found and can't make assumptions if federal agencies are impacted.”

A spokesman for the Homeland Security Department and the U.S. Computer Emergency Readiness Team refused to comment on the attack.

Feds may be in the clear for now, but the threat is likely to persist.

“We believe that the detection of SYNful Knock is just the tip of the iceberg when it comes to attacks utilizing modified router images (regardless of vendor),” FireEye’s announcement warned. “As attackers focus their efforts on gaining persistent access, it is likely that other undetected variants of this implant are being deployed throughout the globe.”

About the Author

Zach Noble is a staff writer covering digital citizen services, workforce issues and a range of civilian federal agencies.

Before joining FCW in 2015, Noble served as assistant editor at the viral news site TheBlaze, where he wrote a mix of business, political and breaking news stories and managed weekend news coverage. He has also written for online and print publications including The Washington Free Beacon, The Santa Barbara News-Press, The Federalist and Washington Technology.

Noble is a graduate of Saint Vincent College, where he studied English, economics and mathematics.

Click here for previous articles by Noble, or connect with him on Twitter: @thezachnoble.


Featured

  • FCW PERSPECTIVES
    sensor network (agsandrew/Shutterstock.com)

    Are agencies really ready for EIS?

    The telecom contract has the potential to reinvent IT infrastructure, but finding the bandwidth to take full advantage could prove difficult.

  • People
    Dave Powner, GAO

    Dave Powner audits the state of federal IT

    The GAO director of information technology issues is leaving government after 16 years. On his way out the door, Dave Powner details how far govtech has come in the past two decades and flags the most critical issues he sees facing federal IT leaders.

  • FCW Illustration.  Original Images: Shutterstock, Airbnb

    Should federal contracting be more like Airbnb?

    Steve Kelman believes a lighter touch and a bit more trust could transform today's compliance culture.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.