Greater than 600,000 small workplace/dwelling workplace (SOHO) routers are estimated to have been bricked and brought offline following a damaging cyber assault staged by unidentified cyber actors, disrupting customers’ entry to the web.
The mysterious occasion, which happened between October 25 and 27, 2023, and impacted a single web service supplier (ISP) within the U.S., has been codenamed Pumpkin Eclipse by the Lumen Applied sciences Black Lotus Labs group. It particularly affected three router fashions issued by the ISP: ActionTec T3200, ActionTec T3260, and Sagemcom.
“The incident took place over a 72-hour period between October 25-27, rendered the infected devices permanently inoperable, and required a hardware-based replacement,” the corporate mentioned in a technical report.
The blackout is critical, not least as a result of it led to the abrupt removing of 49% of all modems from the impacted ISP’s autonomous system quantity (ASN) through the timeframe.
Whereas the title of the ISP was not disclosed, proof factors to it being Windstream, which suffered an outage across the identical time, inflicting customers to report a “steady red light” being displayed by the impacted modems.
Now, months later, Lumen’s evaluation has revealed a commodity distant entry trojan (RAT) referred to as Chalubo – a stealthy malware first documented by Sophos in October 2018 – as accountable for the sabotage, with the adversary choosing it presumably in an effort to complicate attribution efforts reasonably than use a customized toolkit.
“Chalubo has payloads designed for all major SOHO/IoT kernels, pre-built functionality to perform DDoS attacks, and can execute any Lua script sent to the bot,” the corporate mentioned. “We suspect the Lua functionality was likely employed by the malicious actor to retrieve the destructive payload.”
That mentioned, the precise preliminary entry methodology used to breach the routers is at present unclear, though it is theorized that it could have concerned the abuse of weak credentials or exploited an uncovered administrative interface.
Upon gaining a profitable foothold, the an infection chain proceeds to drop shell scripts that pave the best way for a loader in the end designed to retrieve and launch Chalubo from an exterior server. The damaging Lua script module fetched by the trojan is unknown.
A notable side of the marketing campaign is its focusing on of a single ASN, versus others which have usually focused a selected router mannequin or frequent vulnerability, elevating the chance that it was intentionally focused, though the motivations behind it are undetermined as but.
“The event was unprecedented due to the number of units affected – no attack that we can recall has required the replacement of over 600,000 devices,” Lumen mentioned. “As well as, the sort of assault has solely ever occurred as soon as earlier than, with AcidRain used as a precursor to an energetic army invasion.”