Alert: APT28’s MooBot Threat Targets Ubiquiti EdgeRouter Users, Caution Issued by Cybersecurity Agencies:-

Prateek Kumar Gupta
4 min readFeb 28, 2024

--

Introduction

Cybersecurity agencies from the United States and several other countries recently issued a joint advisory warning users of Ubiquiti EdgeRouters about a significant threat posed by a malware botnet known as MooBot. This botnet, linked to the notorious APT28 (also known as Fancy Bear or Strontium), was recently disrupted by law enforcement in an operation codenamed Dying Ember. However, the advisory emphasizes the need for immediate action by EdgeRouter users to ensure their devices are not compromised and vulnerable to further attacks.

What is MooBot and How Does it Affect EdgeRouters?

MooBot is a malware botnet that specifically targeted Ubiquiti EdgeRouters, exploiting vulnerabilities to gain unauthorized access and control. This allowed APT28, a state-sponsored Russian threat actor group, to leverage compromised routers for various malicious activities. These included:

  • Credential harvesting: Stealing usernames and passwords to gain access to other systems within a network.
  • NTLMv2 digest collection: Gathering information used for authentication purposes, potentially leading to further unauthorized access.
  • Network traffic manipulation: Intercepting and diverting network traffic for various malicious purposes, such as data exfiltration or espionage.
  • Hosting malicious content: Using compromised routers to host spear-phishing landing pages or deploy custom malware for further exploitation.

The advisory highlights the criticality of the situation due to the potential consequences of compromised EdgeRouters

  • Unfettered access: APT28 actors with root access to compromised devices gain complete control over the Linux-based operating system, allowing them to install additional malicious tools and further obfuscate their activities.
  • Supply chain attacks: Compromised routers can be used as a springboard to launch attacks on other devices within a network, potentially compromising the entire IT infrastructure.

Taking Action to Secure Your EdgeRouter

The joint advisory outlines several crucial steps that EdgeRouter users should take immediately to mitigate the MooBot threat and secure their devices:

  1. Hardware Factory Reset: This action wipes the router’s file system, effectively removing any malicious files installed by MooBot.
  2. Firmware Update: Install the latest firmware version provided by Ubiquiti. This ensures your device benefits from the latest security patches and fixes.
  3. Change Default Credentials: Replace the default username and password with strong, unique credentials to prevent unauthorized access attempts.
  4. Implement Firewall Rules: Configure your firewall to restrict access to remote management services, minimizing potential attack vectors.

Additional Considerations for Enhanced Security

Beyond the immediate actions outlined in the advisory, users can further enhance their EdgeRouter security by implementing these additional measures:

  • Enable two-factor authentication (2FA): This adds an extra layer of security by requiring a second verification code in addition to the username and password during login attempts.
  • Monitor router activity: Regularly review logs and network traffic to identify any suspicious or unauthorized activity.
  • Segment your network: Separate critical systems and devices from less sensitive ones, limiting the potential impact of a successful attack.

Staying Informed and Keeping Up with Security Updates

The MooBot incident serves as a stark reminder of the ever-evolving cyber threat landscape. It is critical for organizations and individuals using Ubiquiti EdgeRouters to stay informed about the latest security advisories and take prompt action to implement recommended mitigation measures. Users should also consider subscribing to relevant security alerts and updates from Ubiquiti to remain informed about potential vulnerabilities and available patches.

The walls may be digital, but the battle for your EdgeRouter is real. Secure your defenses against MooBot and keep APT28 at bay.

Python script demonstrating basic principles of responsible vulnerability checking:

import requests

def check_ubiquiti_firmware_updates(model):
“””
Checks for firmware updates for a given Ubiquiti EdgeRouter model.

Args:
model (str): The model name of the EdgeRouter.

Returns:
str: A message indicating update availability or an error message.
“””
url = f”https://www.ubnt.com/download/{model}"
try:
response = requests.get(url)
if response.status_code == 200:
# Parse the HTML to check for update information (implementation omitted for brevity)
# …
return “Update information available. Please visit the official website for details.”
else:
return f”Error: Failed to retrieve information. Status code: {response.status_code}”
except requests.exceptions.RequestException as e:
return f”Error: {e}”

# Example usage
model = “edgerouter-x”
update_message = check_ubiquiti_firmware_updates(model)
print(update_message)

Conclusion

The joint advisory from cybersecurity agencies highlights the seriousness of the MooBot threat and the potential consequences for Ubiquiti EdgeRouter users. By taking immediate action to implement the recommended security measures and maintaining vigilance, users can significantly improve their device security posture and mitigate the risk of compromise by APT28 and other malicious actors. Remember, cybersecurity is a continuous process, and staying informed and proactive is crucial in safeguarding your data and systems.

--

--

Prateek Kumar Gupta
Prateek Kumar Gupta

Written by Prateek Kumar Gupta

A proactive B.Tech Information Technology student at the Sharda University. Possess with cybersecurity, IT, leadership and writing skills.

No responses yet