Botnet operators and cyber-espionage groups (APTs) are abusing the
Universal Plug and Play (UPnP) protocol that comes with all modern
routers to proxy bad traffic and hide their real location from
investigators.
If you abuse something, you use it in a wrong way or for a bad purpose.
eg:
to abuse a privilege
滥用特权
to abuse one's authority
滥用权力
这个词很常见,一定要会用哦~
In a report published on Monday, Akamai revealed that it detected bad actors abusing at least 65,000 routers to create proxy networks for various types of secret or illegal activities.
According to Akamai, attackers are abusing the UPnP protocol, a feature that makes it easier to interconnect local WiFi-enabled devices and forward ports and services to the Internet.
• Our operating system can now interconnect with other networks. 我们的操作系统现在能和其他网络相连。
• In Freud’s theory, the two areas of sexuality and violence are interconnected. 按照弗洛伊德的理论,性和暴力这两个方面是相互关联的。
• a number of separate but interconnected issues 一些独立但相互关联的问题
UPnP is a crucial service for most of today’s routers, but the protocol has been proven to be insecure more than a decade ago, and malware authors have abused various UPnP flaws ever since.
Akamai says it detected a new way through which bad actors have been recently abusing UPnP. Experts say that bad actors have discovered that some routers expose UPnP services meant for inter-device discovery via their WAN (external Internet) interface.
Reusable software is leveraged across many applications. 可重复使用的软件得到广泛应用。
这个单词与“level”很相似哦~注意,含义还是有很大不同的~
Hackers have been abusing these misconfigured UPnP services to inject malicious routes inside the router's NAT (Network Address Translation) tables, a set of rules that controls how IPs and ports from the router's internal network are mapped to the network above (usually the Internet).
黑客一直都在用这些配置错误的 UPnP 服务将恶意路由注入到路由器的 NAT (网络地址转换)表中。NAT 表即控制内部网络的 IP 和端口如何映射到上面的网络(通常是互联网)的一系列规则。
这个句子很长,嵌套的东西很多,不过也很常见~把句子拆分一下看看:
1、Hackers have been abusing these misconfigured UPnP services to inject
malicious routes inside the router's NAT (Network Address Translation)
tables。
简化为:hackers have been abusing...to do sth.
2、a set of rules that controls
同位语从句,a set of rules 即为:
the router's NAT tables。
3、how IPs and ports from the router's internal network are mapped to the network above (usually the Internet)
简化为:how
IPs and ports
are mapped to the network above.
句子长的话,记得拆分开来,就好理解了!
These custom NAT rules allow an attacker to connect to the router's public IP on a specific port, but get redirected automatically to another IP:port combination.
这些自定义 NAT 规则虽然使得攻击者能够连接到路由器某个端口的公开 IP 地址,但被自动重定向到另外一个 IP:port 组合。
custom 这个词常见的意思有海关、风俗、习惯,都是名词
但在这里明显不是这个意思,在计算机领域,custom为形容词,指“自定义的,定制的”
In other words, this flaw allows attackers to use routers with misconfigured UPnP services as proxy servers for their operations —hence the reason Akamai codenamed this issue UPnProxy.
Hackers can exploit UPnProxy to bypass firewalls and access internal IP addresses...
黑客能够利用 UPnProxy 绕过防火墙并访问内部IP 地址。
... or use the router to redirect the request to an entirely new IP address or domain name.
或者使用路由器将请求重定向至一个全新的 IP 地址或域名。
UPnProxy is a serious flaw because it allows an attacker to access the login panel of routers that do not usually expose their backend on the Internet. UPnProxy would redirect a request for [public_IP]:[custom_port] to the router's backend panel hosted on an internal, restricted IP address.
UPnProxy 是一个严重的漏洞,因为它导致攻击者能够访问通常会将后端暴露到互联网上的路由器登录面板。UPnProxy 将把对 [public_IP]:[custom_port] 的请求重定向至托管于内部且不受限制的 IP 地址的路由器的后端面板上。
又遇到access了,上一篇文章我们有讲到access,那你还记得access是什么意思吗?
几个常见词组:
login panel:登录面板
backend:后端
frontend:前端
Such routers, despite having weak credentials, weren't previously susceptible to brute-force attacks because their admin panel is harder (and sometimes impossible) to reach by an Internet attacker. UPnProxy now lets attackers carry out brute-force attacks against the backend panels of any device on an internal network.
In addition, because UPnProxy can be abused to bounce traffic to any other IP address, the flaw can be used to create an entwined network of proxies that redirect traffic through tens or hundreds of IPs before reaching a final destination.
另外,由于 UPnProxy 可遭滥用,将流量路由到其它任何 IP 地址,因此这个漏洞能用于创建复杂的代理网络,在流量到达最终目的地之前将其重定向至数十个或数百个 IP 地址。
Such a feature could be abused to mask the location of spam campaigns, phishing pages, advertising click fraud, and for DDoS attacks. Because of this, UPnProxy is ideal for botnet operators, cybercrime-related activity, but also for cyber-espionage as well.
In a separate report, Symantecreportedseeing a nation-state-backed actor codenamed "Inception Framework" utilizing the UPnProxy technique to hide their real location behind a cloud of proxies.
Akamai says it detected over 4.8 million routers that expose various UPnP services via the WAN interface. Of these, Akamai experts say they've identified active NAT injections on over 65,000 of these devices, meaning these routers have already been compromised and are actively being used to reroute traffic without the device owner's consent or knowledge.
Akamai 公司指出,检测到480多万台路由器经由 WAN 接口暴露了多种 UPnP 服务。其中从6.5万台设备中发现了活跃的 NAT 注入,也就是说这些路由器已遭攻陷,而且在未经设备所有人同意或知情的情况下被用于重定向流量。
Identifying compromised or vulnerable routers is not a trivial operation unless the device owner can find and audit the router's NAT tables, a task that's out of the reach of almost 99.99% of all SOHO router owners.
Keep this container out of the reach of children and pets.
将此容器放置在儿童和宠物无法够到的地方。
To help users, Akamai has compiled a list of 400 router models from 73 vendors that they identified as exposing UPnP services via the WAN interface, and which they suspect may be vulnerable to UPnProxy attacks.
为此,Akamai 已编译了来自73家供应商的400款路由器机型,这些机型均被指经由 WAN 界面暴露 UPnP 服务,而且可能易受 UPnProxy 攻击。
vendor n. 卖主;销售商
eg:
leading software vendors 主要软件销售商
Mitigating UPnProxy attacks would require a massive effort from all affected vendors. This would imply releasing firmware updates that correct UPnP configs to stop exposing UPnP services via WAN interfaces. In the meantime, the only advice Akamai was able to provide was that users replace existing router models with one not found on their list.
要缓解 UPnProxy 攻击,所有受影响的供应商需要付出大量努力,也就是说必须发布固件更新修正 UPnP 配置以阻止 UPnP 服务经由 WAN 接口被暴露。同时,Akamai 给出的唯一建议是用不在清单上的路由器机型替换现有的路由器机型。
config
[kən'fɪg]
n. 配置,布局;显示配置信息命令
eg :Config Files 配置文件
同:configuration
replace A with B 把A 替换为B
eg:
Replace original with update
以新文件替换原文件
In addition, the company also provided a Bash script that can identify vulnerable or actively exploited routers, albeit this script won't be useful unless users know how to connect to their router's terminal via SSH, run and interpret the results of a Bash script.