Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What is a Router Botnet? Find Out Today!

What is a Router Botnet? Find Out Today!

Ordinarily, one of the best ways to protect your organization’s infrastructure is to make sure any and all patches administered to the software you use are applied as soon as possible after they’ve been released. However, patches don’t help against threats that aren’t discovered at the moment they are released. The recent spread of BCMUPnP_Hunter botnet shows that it’s not enough for people to keep patching their systems.

Threat Background
This botnet was initially discovered in September. Since then, it has infected devices to support a huge spam email campaign. BCMUPnP_Hunter is able to zero-in on victims thanks to its ability to scan for potential targets, like routers with the BroadCom University Plug and Play feature enabled. The system can then be taken over by the hacker.

It is assumed that the network created by BCMUPnP_Hunter was created to send out spam emails. The threat creates a proxy that communicates with email servers, allowing attackers to use botnets to generate profit through fraudulent clicks. What’s more is that the malware seems to have been created by someone who has a considerable amount of skill. To make things worse is that BCMUPnP_Hunter also appears to scan from over 100,000 sources, making this botnet quite large.

How Does This Prove That Patches Aren’t Working?
In order for BCMUPnP_Hunter to work as intended, it must target devices that have BroadcomUPnP enabled to take advantage of a vulnerability. The thing is that this vulnerability has been patched since 2013 when it was first discovered, meaning that most manufacturers have issued a patch since then. Therefore, the majority of devices being used by this threat are those that haven’t been patched for some reason or another.

The Lesson Learned
A simple lesson can be learned here. It goes to show that any equipment on your infrastructure that’s not maintained could be putting your business at risk. This includes making sure that you implement patches and security updates as soon as they are released. Of course, they aren’t always broadcast to the public--after all, who would want to admit that the product they have created is vulnerable to attack, and that the vulnerability is being exploited? As a business owner, it’s your responsibility to keep up with the latest threats.

Granted, not all business owners have the time or luxury to focus on something like this. For those who want to minimize the threat posed by vulnerabilities, give the IT professionals at Total Tech Care a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Communication IT Support Business Continuity Smartphones Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Managed IT Services Windows Upgrade Phishing Outsourced IT Data Backup Ransomware Windows 10 Office Data Recovery Server Cloud Computing Save Money Passwords Windows 10 Chrome Social Media Tech Term Virtualization Saving Money Holiday Gadgets Microsoft Office Managed Service Automation Managed IT Services Operating System Facebook Computers Cybercrime Artificial Intelligence Hacking Health BYOD Mobile Device Management Internet of Things Networking IT Support Wi-Fi Information Telephone Systems Information Technology Remote Spam Alert Office 365 Managed Service Provider Covid-19 Social Engineering Mobility Recovery Employer-Employee Relationship Router BDR Bandwidth Big Data Password App Money History Encryption Data Breach Applications Mobile Computing Human Resources Application Law Enforcement Remote Monitoring Data Storage Patch Management Office Tips Apps Training VPN Government Remote Computing How To Private Cloud Mobile Office Blockchain Managed IT Paperless Office Work/Life Balance Vulnerability Wireless Windows 7 Infrastructure Word Voice over Internet Protocol Gmail Flexibility Servers Marketing Settings Google Drive WiFi IT solutions Entertainment Two-factor Authentication Website Budget Avoiding Downtime Data Security Mouse HaaS Bring Your Own Device Data Management Cleaning Risk Management Remote Work Hacker Conferencing Connectivity Employee/Employer Relationship Scam RMM The Internet of Things End of Support Lithium-ion battery Education Physical Security Safety Vendor Management Sports HIPAA Firewall Redundancy Data Protection Keyboard Virtual Reality Apple USB Social User Error Meetings Vendor Save Time Managed Services Telephone System Staff Software as a Service Display Machine Learning Computing Infrastructure Update Biometrics Virtual Desktop Going Green Hard Drive Business Intelligence Google Docs Identity Theft DDoS Worker Battery Virus Audit IT Management Shadow IT Computing SharePoint Legal Unified Threat Management Botnet Computer Accessories IT Plan Augmented Reality Internet Exlporer Fraud Customer Service Environment PDF Unsupported Software Remote Worker Digital Signage Fax Server Cryptocurrency Charger Printer Proactive IT Bluetooth Compliance SaaS OneNote Best Practice Computer Care Procurement Workplace Strategy YouTube Current Events Comparison Net Neutrality Telephony Black Market Samsung CES Network Congestion Help Desk Printing eWaste IT Consultant Business Technology Value Content Management Document Management Humor Solid State Drive Wireless Technology Access Control Electronic Medical Records Managed Services Provider How to Downtime Spam Blocking Virtual Assistant Authentication Wearable Technology Database Hiring/Firing Retail Hard Drives Data storage Remote Workers Automobile Instant Messaging Robot Excel Processor Computer Tips Assessment Digital Signature Managed IT Service Security Cameras WIndows 7 Biometric Security Windows Server 2008 Warranty Virtual CIO OneDrive HVAC Peripheral Streaming Media Google Apps Tools Reputation Digital Security Cameras Tech Support Television Analysis Using Data Content 5G Techology Science Administrator Laptop Devices Copiers Enterprise Content Management Quick Tip Customers PowerPoint Windows Media Player MSP Ergonomics Public Computer Accountants Smartwatch User Audiobook Distributed Denial of Service Credit Cards OLED Customer Relationship Management Regulations Microchip Touchpad Thought Leadership Development Transportation Computer Fan Password Management PCI DSS Rootkit Password Manager Virtual Machine Analyitcs Programming Advertising 2FA Fiber Optics Multi-Factor Security Employee Managing Stress Politics Benefits Cabling Search Engine Workers Twitter Messaging FENG NIST Policy Notifications Business Mangement Hypervisor Cameras Dark mode IBM Smart Tech Trend Micro Antivirus Trending Smart Technology Amazon Default App Windows 8 Flash Addiction SMS Procedure Recycling Saving Time IT service Relocation Software Tips Wiring dark theme Supercomputer Practices Shopping Google Search Amazon Web Services IT Infrastructure Video Games Tablet Sync Emails Cache AI Safe Mode FinTech Criminal Domains Bing Worker Commute Printer Server GDPR Hosted Computing Social Network Experience Two Factor Authentication IaaS Online Shopping Investment Maintenance Scalability Netflix Wireless Internet Root Cause Analysis File Sharing Employees Employee/Employer Relationships Business Owner Bloatware HBO Camera Windows 365 NarrowBand Knowledge Inventory Music Specifications ISP Evernote ROI Search Tablets Skype Wire Video Conferencing iPhone Data loss Sales Bitcoin Travel Shortcuts Entrepreneur Outlook Printers Point of Sale Leadership Personal Troubleshooting Millennials Cryptomining Wireless Charging Shortcut Start Menu Smart Office Supply Chain Management Files Screen Mirroring Monitoring Loyalty Batteries Cost Management Social Networking Frequently Asked Questions Virtual Private Network Windows 8.1 Chromecast Digitize Books Workforce Cables Windows Server 2008 R2 Consultant Mobile Windows 10s Colocation Cast Customer relationships Uninterrupted Power Supply Analytics Tip of the week Project Management Email Best Practices webinar Nanotechnology IT Assessment Emergency Running Cable Telecommuting Manufacturing Employer Employee Relationship Cortana Best Available Memory Professional Services Monitor Public Cloud

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code