What firmware are you running? It seems like the router still allow the brute force attack to continue even it knows that that is abnormal behaviours. It would be better if the router block the login attempt after several failed attempts for several minutes(5-60minutes). It does seem like brute force of a known username/password list. But as ColinTaylor says, this is not in my case as in my case, the attacker somehow manage to get my credential without brute force attack, so it's likely to be vulnerability. Anyway, don't forget to close Web Access from WAN to prevent further problems.I think it's a brute force attack...
They could have purged the logs as well when inside. But why wouldn't they have purged them fully. I think this is not directly related to the reported entries...I think it's a brute force attack...
Yes, WAN webaccess.
Is there any log about what they are trying to do with infected routers?Yes, WAN webaccess.
They paid a visit again last night, three times from different IP's. All outside access was now off...
No SSH/Telnet/Web access/AiCloud off/uPnP off...
Jan 4 04:10:33 dropbear[18525]: Password auth succeeded for 'adminxxxxxx' from 46.43.113.225:42479
Jan 4 04:17:21 dropbear[18862]: Password auth succeeded for 'adminxxxxxx' from 46.32.210.36:45857
Jan 4 04:26:51 dropbear[19316]: Password auth succeeded for 'adminxxxxxxx' from 177.221.107.45:3569
Jan 4 04:28:48 dropbear[19316]: Exit (admin_eddiez): Exited normally
Do you have any dropbear 'Child connection from' messages WITHOUT a following 'Password auth' message immediately proceeding this?Yes, WAN webaccess.
They paid a visit again last night, three times from different IP's. All outside access was now off...
No SSH/Telnet/Web access/AiCloud off/uPnP off...
Jan 4 04:10:33 dropbear[18525]: Password auth succeeded for 'adminxxxxxx' from 46.43.113.225:42479
Jan 4 04:17:21 dropbear[18862]: Password auth succeeded for 'adminxxxxxx' from 46.32.210.36:45857
Jan 4 04:26:51 dropbear[19316]: Password auth succeeded for 'adminxxxxxxx' from 177.221.107.45:3569
Jan 4 04:28:48 dropbear[19316]: Exit (adminxxxxxx): Exited normally
Do you have any dropbear 'Child connection from' messages WITHOUT a following 'Password auth' message immediately proceeding this?
I need to see entries prior to what you had posted...maybe starting two hour earlierThe board doesn't allow code to be posted
How would I know if something is open?
If you want official support, why don't you use official code, then?And if only asking the question whether or not the mods in the firmware can enable this is already considered an unacceptable insult...wow. Please back off with this attitude of admiration.
Yes, WAN webaccess.
They paid a visit again last night, three times from different IP's. All outside access was now off...
No SSH/Telnet/Web access/AiCloud off/uPnP off...
Jan 4 04:10:33 dropbear[18525]: Password auth succeeded for 'adminxxxxxx' from 46.43.113.225:42479
Jan 4 04:17:21 dropbear[18862]: Password auth succeeded for 'adminxxxxxx' from 46.32.210.36:45857
Jan 4 04:26:51 dropbear[19316]: Password auth succeeded for 'adminxxxxxxx' from 177.221.107.45:3569
Jan 4 04:28:48 dropbear[19316]: Exit (adminxxxxxx): Exited normally
admin@RT-AC68U:/# ps w | grep dropbear
594 admin 1084 S dropbear -p 22 -j -k
3404 admin 1152 S dropbear -p 22 -j -k
3643 admin 1396 S grep dropbear
admin@RT-AC68U:/#
Before Jan 4 everything was switched off (everything to the WAN was already off, only web access had been enabled before Jan 4)What the bolded text above means? Did you stopped the outside access BEFORE or AFTER Jan 4 04:10:33?
@eddiez Can you log on to your router (from LAN with SSH) and issue the following command:
ps w | grep dropbear
We have seen from previous logs that once the attacker gets in he starts up a second instance of dropbear that would not be apparent from the web interface.
This is what you would normally see:
Code:admin@RT-AC68U:/# ps w | grep dropbear 594 admin 1084 S dropbear -p 22 -j -k 3404 admin 1152 S dropbear -p 22 -j -k 3643 admin 1396 S grep dropbear admin@RT-AC68U:/#
Ah, OK. Thanks for the info.When enabling SSH, I switched back the altered port from 2222 to 22
If you want official support, why don't you use official code, then?
I suppose you have read Merlin's disclaimers?
Professionals? GMAFB... We are not professionals, but amateurs in sense "we love what we do" (ref: latin: Amo = I love), and we know and understand the limitations of the code and the support structure. I use it, because its track quality record is way above what many professionals deliver.
That said, I agree that this is a serious problem, and Asus should be notified.
So in that case there are three possibilities how the attack has been managed:Before Jan 4 everything was switched off (everything to the WAN was already off, only web access had been enabled before Jan 4)
I know how to resolve it, thanks though. I want to keep the router as-is for now...It might help in assessing the exploit/vulnerability/infection. Will refrain from online banking now, though...So in that case there are three possibilities how the attack has been managed:
1. They used a vulnerability in web access
2. Some of your LAN devices is infected and they took control from the inside of your LAN
3. They had installed some malicious code in your router during previous attacks (before 4 January) and this code is still active and opens the door for them.
The first step I would do is reset to factory defaults, re-flash FW and again reset to factory defaults. Format the JFFS partition. All these operation should be performed with WAN disconnected.
If the problem persists it will confirm that either you have infected LAN device, which immediately run the exploit again or that they managed to infect the bootloader.
/jffs/configs$ ps w | grep dropbear
10849 admin_ed 1136 S dropbear -p 192.168.1.1:22 -a -j -k
10894 admin_ed 1380 D grep dropbear
27387 admin_ed 1068 S dropbear -p 192.168.1.1:22 -a -j -k
27410 admin_ed 1136 S dropbear -p 192.168.1.1:22 -a -j -k
28252 admin_ed 460 S /tmp/dropbear/dropbearmulti dropbear -p 16161 -r /tmp/dropbear/dropbear_rsa_host_key -d /tmp/dropbear/dro
When enabling SSH, I switched back the altered port from 2222 to 22
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!