Just wanted to share/document two devices which were hacked.
I manage 7 ac88u's for various family members homes. I recently checked all of them and two had Asian letters after I logged in. Hmm, interesting. After some digging, I found that both had a PP2P VPN set up as servers. Logs have been cleared, how convenient.
Here is the setup which all of them had before the compromise.
- No remote wan
- No remote ping
- All had DDNS with a similar name, just the post-fix changing
- All had the same Unique Username and Unique Password
- All had the same ssh public keys
- All had the same IPsec VPN
The only difference, which for all I know might just be a coincidence is that the 2 affected were at&t while rest were Comcast.
End result, I decided to provide unique DDNS names and unique IPsec creds for all the devices. I do not know what more I can do to protect them.
Scary, is all I can say with the recent VPNfilter and all.
edit: I did setup a log server to catch any future attempts, as the clearing of the logs was a smart move.
I manage 7 ac88u's for various family members homes. I recently checked all of them and two had Asian letters after I logged in. Hmm, interesting. After some digging, I found that both had a PP2P VPN set up as servers. Logs have been cleared, how convenient.
Here is the setup which all of them had before the compromise.
- No remote wan
- No remote ping
- All had DDNS with a similar name, just the post-fix changing
- All had the same Unique Username and Unique Password
- All had the same ssh public keys
- All had the same IPsec VPN
The only difference, which for all I know might just be a coincidence is that the 2 affected were at&t while rest were Comcast.
End result, I decided to provide unique DDNS names and unique IPsec creds for all the devices. I do not know what more I can do to protect them.
Scary, is all I can say with the recent VPNfilter and all.
edit: I did setup a log server to catch any future attempts, as the clearing of the logs was a smart move.