r/TheCircuit

CNET: 5 Steps the FBI Wants You to Take to Secure Your Router Right Now

TL;DR

Update your firmware regularly: Many networking devices allow you to enable automatic firmware updates in the settings. If this is an option, I'd highly recommend doing it. If it's not, you can find updates for your router by logging into its web interface or using its app.

Reboot your router: The NSA's guidance recommends rebooting your router, smartphone and computers at least once a week. "Regular reboots help to remove implants and ensure security," the agency says. 

Change default usernames and passwords: One of the most common ways hackers gain access is by trying default, manufacturer-set login credentials. "There's a whole underground economy that underlies all of that," says Ferguson. "Basically, they just harvest credentials, either through attacks of their own, or by stockpiling them from other sources and buying them." This username and password combination is different from your Wi-Fi login, which should also be changed every six months or so. The longer and more random your password, the better. 

Disable remote management: Most regular users don't need to remotely manage their Wi-Fi router, and this is one of the primary ways threat actors can change your router's settings without your knowledge. You can typically find this option in your router's admin settings. 

Use a VPN: The FBI's announcement on the attack specifically recommends that organizations with remote workers use a VPN when accessing sensitive data. These services encrypt your traffic as it passes through a remote server, keeping it safe from hackers.

cnet.com
u/forestexplr — 3 days ago
▲ 15 r/TheCircuit+1 crossposts

Key Details:

  • Researchers used valid credentials blocked by Conditional Access policies to initiate the attack
  • Exploited the Device Registration Service (DRS) endpoint using device code authentication flow
  • Created a "phantom device" registered with a signed Azure AD certificate and private key
  • Registered the device as a Windows machine despite it being Linux, leveraging MITRE ATT&CK technique T1098.005 (Account Manipulation)
  • Obtained a Primary Refresh Token (PRT) with false device claims that bypassed CA device compliance requirements
  • Successfully accessed production tenant containing over 16,000 users without malware or endpoint interaction
  • Bypassed Intune compliance requirements by claiming hybrid domain-join status
u/forestexplr — 8 days ago