Malware Detected on Umbrel

Hi there - I’m running the latest version of Umbrel on a Raspberry PI 4 with an 16GB MCSD and 1 TB SSD. I recently updated the wifi network in my home to use Netgear Orbi wifi 6 mesh network to get better coverage in my home. I have the umbrel hooked up to an ethernet port on the main router.

When I setup the network it came with security software called Netgear Armor - and it scans the network devices for potential security threats and can block them. So far nothing on my network has been problematic except that I’ve got 12 unique notifications of malware and phishing originating from my umbrel node (raspberry pi) but this software says it is blocking it.

blocked Malware site example:
https://www.7tvv.com

Phishing
https://www.h3af.com

Attack
Detected a suspicious remote location 91.123.158.251 attempted a connection to umbrel and blocked that connection.

So I’m not sure I’ve something in my root image on the raspberry pi has been compromised or if this is related to legitimate traffic that the umbrel is doing on TOR that Netgear may not like and how do I resolve it. Maybe I just flash the whole thing, format the SD and update firmware for the raspberry pi?

Thanks!
Nathan

I have just installed this week the latest version of umbrel os, and after security tests i see the device reaching out to known listed malware/log4j targets, i will investigate this further:

1 - stopping all apps (I had around 4 running)
2 - starting and checking apps individually

My questions:
1 - Does Umbrel or anyone checks the base os for security concearns?
2 - Does Umbrel or anyone checks the apps on matketplace?

Thanks in avance, any contribution is valid

Oh, if that’s true, it sounds serious… Could you provide more info about the issue what you have found, please? What addresses it’s reaching out? Or maybe you’ve found more about it already? Any suspicious apps/processes? Thank you.

More info, and i will update further

1 Like

Thank you for the info. As for now I can confirm a sporadic traffic from my Umbrel targeting port 7777 somewhere, but it looks like a normal I2P traffic which my Bitcoin node is using. Nothing else on the mentioned ports detected so far. Umbrel 1.4.2. Will update if I spot anything new.

Did you check the related ips?

a few from the range of 23.128.248.0/24 and a single one 141.94.45.159. apparently it’s originating from the bitcoin node app.

I advise a check of the ips against know log4j malware lists,

and maybe you can help with the more important questions:
1 - Does Umbrel or anyone checks the base os for security concerns?
2 - Does Umbrel or anyone checks the apps on marketplace?

1 Like

Unfortunately I can’t help with the questions you brought up here. I’m just a common user. The project is opensource so in theory anyone can do the necessary checks. I believe the developers do, but yeah, maybe it’s just my false beliefs.. :man_shrugging:

I did. Its like the raspberry pi where you need to regenenerate ssh keys.

I did notice something odd with the kernel based firewall as there are netfilter and iptables entries. Which its common practice to use one or the otherbut not both as it can cause conflicts.

I installed UFW and allowed out, but only accept the umbrel web gui port on incoming.

But I don’t have the umbrel ip forwarded because its not really required for a private bitcoin node. Nor it speeds up sync.

But I’m in the process of moving the node to a different machine and just running the pool and other docker programs on it.

I’ll have to check to see if there are iptables/nftables for forwarded entries on those portsplus look up what services are using those ports.

7777 is an AWS db connect port. But other software uses it too.

My umbrel got flagged (internally) for outgoing connections to log4j know ip lists (check specific thread - Umbrel os Security - Malware detected - log4j? )

What programs you have loaded?

I moved my block files to a Linux machine so I can run node on that and put Umbrel on a sealed network and I only have ckpool running on it. It hasn’t flagged anything. But others say the copy of bitcoin node is doing that.

But since this is a docker program container I am not going to allow it internet access. It doesn’t even need that for ckpool to run, just have to talk to the bitcoin node.

I also removed the donation part in ckpool since the guy is not building the source code correctly and don’t state what kernel + distribution works on compiling.