Article Details
Scrape Timestamp (UTC): 2024-01-04 13:18:23.478
Source: https://www.theregister.com/2024/01/04/orange_spain_outage_breach/
Original Article Text
Click to Toggle View
Infostealer malware, weak password leaves Orange Spain RIPE for plucking. No 2FA or special characters to prevent database takeover and BGP hijack. A weak password exposed by infostealer malware is being blamed after a massive outage at Orange Spain disrupted around half of its network's traffic. The network provider is Spain's second most popular and on Wednesday evening confirmed its RIPE account had been breached by an attacker. RIPE is the regional database that contains all IP addresses and their owners in Europe, the Middle East, and Central Asia. The attack was claimed by an individual operating under the alias of "Snow," who published a series of screenshots explaining how they supposedly carried out the attack. Researchers used the information in the shared images to determine that the RIPE account had been accessed after the attacker harvested admin credentials using infostealer malware. The malware had infected the account of an Orange Spain employee. The password was revealed to be "ripeadmin" – a simple and easily guessable password for an important account. Researchers at Hudson Rock described the password as "ridiculously weak" before confirming with "high certainty" this was the method used to breach the RIPE account. "This attack again illustrates how a single infostealer infection could be detrimental to any company," the company said in a post. "It is important to routinely check your organizational exposure to infostealer infections which are the top initial attack vector for threat actors to access corporate and customer accounts." Infosec specialist Kevin Beaumont also noted that RIPE does not mandate 2FA or MFA use, and it wasn't enabled at Orange Spain, whereas North America's equivalent database, ARIN, has mandated it since February 2023. "Also, there is no sane password policy at RIPE – you can use borisjohnson as your password, in other words, it is a powder keg," he claimed. "The account in question has been on an infostealer since August last year, with the details resold onwards." Following the RIPE account breach, Snow then appears to have hijacked the network provider's border gateway protocol (BGP) traffic, which led to the service outage experienced by customers. The attacker modified the autonomous system (AS) number associated with Orange Spain's IP address and changed the route origin authorizations (ROAs) – cryptographically signed objects that help to securely verify that announced BGP routes are associated with the correct origin – in turn breaking the network's BGP routing. "Orange Spain has had their /12 [ROA records] (and likely others) broken by (what appears to be) someone breaking into their RIPE account and making RPKI ROA's to somewhere else," blogged Ben Cartwright-Cox, director at Port 179, the company behind network and monitoring and analytics tool BGP.Tools. "Current reachability of impacted prefixes is pretty poor… the current ROA is pointing to AS49581 ("Ferdinand Zink trading as Tube-Hosting")." "Snow" documented the attack via a freshly minted X account, goading Orange Spain and encouraging it to reach out and request the new RIPE admin credentials after they were breached and changed. Orange Spain confirmed its RIPE account was breached via its X account, adding that service was restored shortly after acknowledging the outage. There is no evidence to suggest any customer or client data was compromised during the incident, and the disruption was to its services only, Orange added. Beaumont said he's seen credentials to thousands of different RIPE accounts on infostealer marketplaces, and expects a wave of similar attacks to take place now the incident at Orange Spain has been publicized.
Daily Brief Summary
Orange Spain experienced a massive outage due to an infostealer malware that harvested an employee's admin credentials.
The compromised RIPE account had a "ridiculously weak" password ("ripeadmin"), which allowed attackers to disrupt half of the network's traffic.
The attack was executed by an individual using the alias "Snow," who hijacked the provider's BGP traffic after breaching the RIPE account.
RIPE, lacking mandatory 2FA or MFA and reasonable password policies, made Orange Spain's critical infrastructure particularly vulnerable.
The attack led to incorrect routing associations within the network's BGP, resulting in service outages for customers.
Despite the service disruption, there was no evidence of customer or client data being compromised.
The incident highlights the risk of infostealer malware and poor cybersecurity practices, with experts anticipating potential future similar attacks on other RIPE accounts.