Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What is a Router Botnet? Find Out Today!

What is a Router Botnet? Find Out Today!

Ordinarily, one of the best ways to protect your organization’s infrastructure is to make sure any and all patches administered to the software you use are applied as soon as possible after they’ve been released. However, patches don’t help against threats that aren’t discovered at the moment they are released. The recent spread of BCMUPnP_Hunter botnet shows that it’s not enough for people to keep patching their systems.

Threat Background
This botnet was initially discovered in September. Since then, it has infected devices to support a huge spam email campaign. BCMUPnP_Hunter is able to zero-in on victims thanks to its ability to scan for potential targets, like routers with the BroadCom University Plug and Play feature enabled. The system can then be taken over by the hacker.

It is assumed that the network created by BCMUPnP_Hunter was created to send out spam emails. The threat creates a proxy that communicates with email servers, allowing attackers to use botnets to generate profit through fraudulent clicks. What’s more is that the malware seems to have been created by someone who has a considerable amount of skill. To make things worse is that BCMUPnP_Hunter also appears to scan from over 100,000 sources, making this botnet quite large.

How Does This Prove That Patches Aren’t Working?
In order for BCMUPnP_Hunter to work as intended, it must target devices that have BroadcomUPnP enabled to take advantage of a vulnerability. The thing is that this vulnerability has been patched since 2013 when it was first discovered, meaning that most manufacturers have issued a patch since then. Therefore, the majority of devices being used by this threat are those that haven’t been patched for some reason or another.

The Lesson Learned
A simple lesson can be learned here. It goes to show that any equipment on your infrastructure that’s not maintained could be putting your business at risk. This includes making sure that you implement patches and security updates as soon as they are released. Of course, they aren’t always broadcast to the public--after all, who would want to admit that the product they have created is vulnerable to attack, and that the vulnerability is being exploited? As a business owner, it’s your responsibility to keep up with the latest threats.

Granted, not all business owners have the time or luxury to focus on something like this. For those who want to minimize the threat posed by vulnerabilities, give the IT professionals at Total Tech Care a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 21 November 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Google Business Network Security Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications IT Support Business Continuity Smartphones Communication Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Business Management Users Phishing Windows Managed IT Services Upgrade Ransomware Data Backup Outsourced IT Windows 10 Cloud Computing Office Data Recovery Server Save Money Passwords Windows 10 Chrome Social Media Virtualization Tech Term Gadgets Saving Money Holiday Automation Microsoft Office Managed Service Managed IT Services Cybercrime Computers Artificial Intelligence Operating System Facebook Hacking Internet of Things Health Wi-Fi BYOD Mobile Device Management Networking IT Support Information Information Technology Alert Remote Spam Office 365 Covid-19 Telephone Systems Managed Service Provider Mobility BDR Employer-Employee Relationship Recovery Bandwidth Social Engineering Router Law Enforcement Human Resources Mobile Computing Password Data Breach Application Remote Monitoring Money Encryption Applications App History Big Data Government VPN Private Cloud Data Storage Patch Management Managed IT Remote Computing Mobile Office Apps Blockchain Office Tips Paperless Office Training How To Gmail Avoiding Downtime Infrastructure Settings Voice over Internet Protocol Flexibility Marketing Two-factor Authentication Vulnerability WiFi Windows 7 IT solutions Entertainment Word Bring Your Own Device Website Mouse Budget Data Management Work/Life Balance HaaS Servers Data Security Google Drive Wireless Lithium-ion battery RMM Connectivity Remote Work Firewall Conferencing Save Time Virtual Reality Apple Scam Data Protection Social Cleaning USB User Error Vendor Management Meetings End of Support Vendor Managed Services Education Physical Security Display Safety Risk Management Hacker Sports HIPAA Telephone System Staff Redundancy Software as a Service Employee/Employer Relationship The Internet of Things Keyboard Machine Learning SharePoint Update Spam Blocking Electronic Medical Records Best Practice YouTube Computing Black Market Google Docs Virus Customer Service Hiring/Firing Identity Theft Environment Unified Threat Management Computer Accessories Fax Server Document Management Digital Signage Wireless Technology Solid State Drive Augmented Reality How to Downtime SaaS Fraud Business Intelligence Remote Worker Data storage Printer Automobile Procurement Audit Worker Bluetooth Net Neutrality Network Congestion Workplace Strategy IT Management Cryptocurrency eWaste Botnet Computing Infrastructure Help Desk Going Green Printing IT Plan Comparison IT Consultant Unsupported Software CES Battery Managed Services Provider Wearable Technology Charger Shadow IT Retail Humor Hard Drives Business Technology Legal Database Content Management Instant Messaging Excel Access Control Compliance Robot Computer Care Internet Exlporer Remote Workers OneNote Virtual Assistant Current Events Biometrics Virtual Desktop Telephony Processor Authentication Samsung PDF Hard Drive DDoS Value Proactive IT Copiers Outlook Video Games 5G Leadership Digital Signature Troubleshooting Customer Relationship Management Quick Tip Start Menu Warranty Worker Commute Distributed Denial of Service Smartwatch Loyalty Google Apps Analyitcs Ergonomics Experience Screen Mirroring HVAC Development Frequently Asked Questions Scalability OLED Analysis Books Programming PowerPoint PCI DSS Windows Media Player Mobile Administrator Business Owner Virtual Machine Windows 10s Devices User Employee NarrowBand 2FA Fiber Optics Cast Enterprise Content Management Messaging Tip of the week MSP Search Cabling webinar Accountants Antivirus Emergency Windows 8 Policy Professional Services Microchip Hypervisor Public Cloud Thought Leadership iPhone Employer Employee Relationship Credit Cards Managing Stress Assessment Password Manager IT service Dark mode Trend Micro Password Management SMS Windows Server 2008 Default App Multi-Factor Security Cameras Tablet Procedure Tools Search Engine Saving Time Twitter Files Google Search Television Business Mangement Chromecast Domains dark theme Shopping NIST AI IT Infrastructure Smart Tech Trending Uninterrupted Power Supply Maintenance FinTech Addiction Colocation Bing IaaS Amazon Public Computer Recycling Bloatware Social Network Regulations Wiring Investment Practices Monitor Transportation Printer Server Tablets Employees Employee/Employer Relationships Computer Fan Cache Rootkit Amazon Web Services ISP Criminal Entrepreneur Windows 365 Safe Mode Video Conferencing GDPR ROI Workers Hosted Computing Reputation Benefits Streaming Media Tech Support Shortcut Sales Content Bitcoin FENG Wireless Internet Shortcuts Online Shopping File Sharing Techology Cryptomining IBM Laptop Cost Management Point of Sale Personal Supply Chain Management Flash Camera Inventory Customers Smart Technology Specifications Social Networking Evernote Monitoring Audiobook Batteries Wire Software Tips Supercomputer Touchpad Travel Windows 8.1 Digitize Sync Printers Windows Server 2008 R2 Emails Running Cable Millennials Wireless Charging Memory Customer relationships Politics Smart Office Advertising IT Assessment Manufacturing Consultant Email Best Practices Analytics Virtual Private Network Netflix Two Factor Authentication Workforce Notifications Security Cameras Cables Computer Tips Managed IT Service Root Cause Analysis OneDrive HBO Biometric Security Knowledge Music Best Available Virtual CIO Science Peripheral Skype Project Management Nanotechnology Relocation Telecommuting WIndows 7 Cortana Digital Security Cameras Using Data Data loss

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code