Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What is a Router Botnet? Find Out Today!

What is a Router Botnet? Find Out Today!

Ordinarily, one of the best ways to protect your organization’s infrastructure is to make sure any and all patches administered to the software you use are applied as soon as possible after they’ve been released. However, patches don’t help against threats that aren’t discovered at the moment they are released. The recent spread of BCMUPnP_Hunter botnet shows that it’s not enough for people to keep patching their systems.

Threat Background
This botnet was initially discovered in September. Since then, it has infected devices to support a huge spam email campaign. BCMUPnP_Hunter is able to zero-in on victims thanks to its ability to scan for potential targets, like routers with the BroadCom University Plug and Play feature enabled. The system can then be taken over by the hacker.

It is assumed that the network created by BCMUPnP_Hunter was created to send out spam emails. The threat creates a proxy that communicates with email servers, allowing attackers to use botnets to generate profit through fraudulent clicks. What’s more is that the malware seems to have been created by someone who has a considerable amount of skill. To make things worse is that BCMUPnP_Hunter also appears to scan from over 100,000 sources, making this botnet quite large.

How Does This Prove That Patches Aren’t Working?
In order for BCMUPnP_Hunter to work as intended, it must target devices that have BroadcomUPnP enabled to take advantage of a vulnerability. The thing is that this vulnerability has been patched since 2013 when it was first discovered, meaning that most manufacturers have issued a patch since then. Therefore, the majority of devices being used by this threat are those that haven’t been patched for some reason or another.

The Lesson Learned
A simple lesson can be learned here. It goes to show that any equipment on your infrastructure that’s not maintained could be putting your business at risk. This includes making sure that you implement patches and security updates as soon as they are released. Of course, they aren’t always broadcast to the public--after all, who would want to admit that the product they have created is vulnerable to attack, and that the vulnerability is being exploited? As a business owner, it’s your responsibility to keep up with the latest threats.

Granted, not all business owners have the time or luxury to focus on something like this. For those who want to minimize the threat posed by vulnerabilities, give the IT professionals at Total Tech Care a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 28 February 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Smartphones IT Support Communication Business Continuity Miscellaneous Smartphone Mobile Device Network Browser Small Business Productivity Collaboration Quick Tips Cybersecurity Users Business Management Windows Upgrade Phishing Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Office Server Save Money Cloud Computing Data Recovery Passwords Windows 10 Saving Money Holiday Tech Term Gadgets Chrome Virtualization Social Media Managed IT Services Microsoft Office Automation Managed Service Operating System Artificial Intelligence Facebook Computers Cybercrime Mobile Device Management Networking IT Support Internet of Things Hacking Wi-Fi BYOD Health Spam Managed Service Provider Office 365 Remote Alert Telephone Systems Information Technology Covid-19 Information Bandwidth Router BDR Social Engineering Mobility Recovery Employer-Employee Relationship Law Enforcement Remote Monitoring Big Data App History Password Data Breach Money Mobile Computing Encryption Application Applications Human Resources Remote Computing How To Government Mobile Office Private Cloud Data Storage Patch Management Managed IT Office Tips Training Blockchain Apps Paperless Office VPN Data Security Two-factor Authentication Infrastructure Voice over Internet Protocol Mouse Avoiding Downtime HaaS Vulnerability Windows 7 Bring Your Own Device Data Management Word Wireless Flexibility Work/Life Balance Marketing Servers Gmail WiFi IT solutions Settings Entertainment Website Budget Google Drive HIPAA Sports Virtual Reality Redundancy Apple Keyboard Social User Error Meetings Data Protection Save Time Conferencing Risk Management Hacker Scam Vendor Cleaning The Internet of Things Managed Services Lithium-ion battery Display Telephone System Staff Software as a Service Vendor Management End of Support Machine Learning Physical Security Education Remote Work Employee/Employer Relationship Firewall Connectivity USB Safety RMM Identity Theft Computing Current Events PDF SaaS Telephony IT Consultant Samsung Proactive IT Network Congestion Humor Augmented Reality Best Practice eWaste Value Fraud Digital Signage YouTube Spam Blocking Electronic Medical Records Black Market Remote Worker Cryptocurrency Hiring/Firing Wearable Technology Procurement Document Management Retail Hard Drives Net Neutrality Solid State Drive Wireless Technology Workplace Strategy Instant Messaging How to Downtime Excel Help Desk Robot Comparison Printing CES Biometrics Data storage Virus Business Intelligence Virtual Desktop Automobile Business Technology Unified Threat Management Content Management Audit Managed Services Provider Worker Computing Infrastructure DDoS Computer Accessories Access Control IT Management Database Going Green Virtual Assistant Botnet SharePoint Authentication IT Plan Remote Workers Processor Battery Shadow IT Printer Unsupported Software Customer Service Environment Legal Bluetooth Update Hard Drive Charger Internet Exlporer Fax Server Compliance OneNote Google Docs Computer Care Tablet Smartwatch Administrator Devices Ergonomics Enterprise Content Management Domains Development Netflix OLED Two Factor Authentication Relocation MSP Accountants PCI DSS Root Cause Analysis Virtual Machine Credit Cards Fiber Optics Knowledge Employee Music Microchip IaaS Thought Leadership 2FA HBO Maintenance Password Management Skype Password Manager Messaging Bloatware Cabling Video Games Policy Data loss Multi-Factor Security Hypervisor Worker Commute Trend Micro Experience Leadership Tablets Troubleshooting Search Engine Twitter Dark mode Outlook NIST Start Menu Business Mangement SMS Entrepreneur Default App Scalability Consultant Smart Tech Procedure Screen Mirroring Trending Saving Time Business Owner Loyalty Amazon Shopping Google Search Books NarrowBand Analytics Addiction dark theme Frequently Asked Questions Shortcut Mobile Recycling AI Windows 10s Cost Management IT Infrastructure Search Bing iPhone Best Available Wiring Practices FinTech Cast Social Networking Amazon Web Services Social Network webinar Emergency WIndows 7 Cache Tip of the week Safe Mode Professional Services Criminal Public Cloud Investment Employer Employee Relationship Files GDPR Running Cable Hosted Computing Employees Employee/Employer Relationships Assessment Windows Server 2008 Online Shopping Memory ISP Chromecast Wireless Internet Windows 365 File Sharing Tools Video Conferencing ROI Television Shortcuts Colocation Camera Uninterrupted Power Supply Inventory Sales Specifications Bitcoin Windows Media Player Evernote Personal Cryptomining User PowerPoint Wire Point of Sale Supply Chain Management Travel Monitor Public Computer Science Printers Monitoring Millennials Batteries Regulations Wireless Charging Digitize Transportation Managing Stress Smart Office Windows 8.1 Streaming Media Computer Fan Windows Server 2008 R2 Rootkit Reputation Content Virtual Private Network Tech Support Distributed Denial of Service Cameras Customer relationships Customer Relationship Management Workforce Cables IT Assessment Workers Analyitcs Manufacturing Techology Benefits Laptop Email Best Practices Customers FENG Programming Audiobook IBM Security Cameras Project Management Nanotechnology Computer Tips Telecommuting Managed IT Service Virtual CIO Flash Cortana OneDrive Biometric Security Smart Technology Touchpad Antivirus Digital Signature Peripheral Using Data Politics Supercomputer Windows 8 Advertising Warranty Printer Server Digital Security Cameras Software Tips HVAC Sync IT service Google Apps Copiers Emails 5G Notifications Analysis Quick Tip

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code