Mavericks Blogs

What is a Router Botnet? Find Out Today!

What is a Router Botnet? Find Out Today!

Ordinarily, one of the best ways to protect your organization’s infrastructure is to make sure any and all patches administered to the software you use are applied as soon as possible after they’ve been released. However, patches don’t help against threats that aren’t discovered at the moment they are released. The recent spread of BCMUPnP_Hunter botnet shows that it’s not enough for people to keep patching their systems.

Threat Background
This botnet was initially discovered in September. Since then, it has infected devices to support a huge spam email campaign. BCMUPnP_Hunter is able to zero-in on victims thanks to its ability to scan for potential targets, like routers with the BroadCom University Plug and Play feature enabled. The system can then be taken over by the hacker.

It is assumed that the network created by BCMUPnP_Hunter was created to send out spam emails. The threat creates a proxy that communicates with email servers, allowing attackers to use botnets to generate profit through fraudulent clicks. What’s more is that the malware seems to have been created by someone who has a considerable amount of skill. To make things worse is that BCMUPnP_Hunter also appears to scan from over 100,000 sources, making this botnet quite large.

How Does This Prove That Patches Aren’t Working?
In order for BCMUPnP_Hunter to work as intended, it must target devices that have BroadcomUPnP enabled to take advantage of a vulnerability. The thing is that this vulnerability has been patched since 2013 when it was first discovered, meaning that most manufacturers have issued a patch since then. Therefore, the majority of devices being used by this threat are those that haven’t been patched for some reason or another.

The Lesson Learned
A simple lesson can be learned here. It goes to show that any equipment on your infrastructure that’s not maintained could be putting your business at risk. This includes making sure that you implement patches and security updates as soon as they are released. Of course, they aren’t always broadcast to the public--after all, who would want to admit that the product they have created is vulnerable to attack, and that the vulnerability is being exploited? As a business owner, it’s your responsibility to keep up with the latest threats.

Granted, not all business owners have the time or luxury to focus on something like this. For those who want to minimize the threat posed by vulnerabilities, give the IT professionals at Mavericks a call at (440) 305-5514.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, February 19 2019

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Tech Term Privacy User Tips Hosted Solutions Business Computing Productivity Data recovery Network Security Mobile Devices Data Communications Innovation Google Email Data Backup Cloud Cloud Computing Malware Smartphone IT Services Internet Workplace Tips Internet of Things Hardware Smartphones IT Support Artificial Intelligence VoIp Saving Money Router Mobile Device Communication Information BDR Browser Applications Backup Windows 10 Hackers Network Outsourced IT Business Computer Android Data Protection Efficiency Business Management Encryption Holiday Connectivity Chrome Microsoft Managed Service Gadgets Windows Managed IT Services Small Business Miscellaneous Disaster Recovery Computers Password Two-factor Authentication Comparison Cybercrime Managed IT services Paperless Office Server Automation Software as a Service CES Sports Passwords Identity Theft Access Control Content Management Business Intelligence Servers VPN Virtual Assistant Human Resources Machine Learning Money Blockchain Word Settings Infrastructure Voice over Internet Protocol Save Money Fraud Facebook Business Continuity Office 365 Keyboard How To Cybersecurity Social Engineering Vulnerability Telephone System Scam Proactive IT Business Mangement BYOD Cryptocurrency MSP Telephony Electronic Medical Records Inventory Document Management Employee PDF Thought Leadership Spam Wire Evernote Millennials WiFi top-line performance Amazon Wiring Wi-Fi Employer-Employee Relationship Virtualization Nanotechnology Warranty Mobile Device Management Addiction Safe Mode Telephone Systems File Sharing Mobility Remote Monitoring Charger Digital Signage Password Manager Update Networking IT Management Phishing Cleaning Specifications Workforce Microchip Legal business intelligence Wireless Internet Amazon Web Services Firewall Hacker Workers Smart Tech Printer Gmail Social Media Social Data Management Entertainment Wireless Charging Camera Google Search Managed IT Enterprise Content Management Telecommuting Google Drive Ransomware Practices Smart Office Search Engine Criminal organizations need Upgrade Unified Threat Management Botnet Alert Mouse Recycling Credit Cards Augmented Reality Vendor Cortana Authentication Private Cloud Apps Law Enforcement Password Management Remote Work Google Docs Devices HVAC Microsoft Office Bing Windows 7 Online Shopping Smartwatch Software eWaste Disaster Recovery Systems Organizations today Website Bring Your Own Device Training Display Google Apps IT Plan Save Time Big Data Data Security NIST Shortcuts HIPAA Hosted Computing Digital Signature Collaboration Help Desk Accountants USB OneNote Mobile Computing Health Work/Life Balance Administrator data-driven marketplace Cache Remote Worker Security Cameras Staff Bandwidth YouTube Twitter Compliance Quick Tips Company Culture Net Neutrality Regulation Thank You Managing Stress ISP Congratulations Printers