MENU

Home routers caught in IoT botnet war

Home routers caught in IoT botnet war

Market news |
By Rich Pell



According to the report, there has been a recent spike in attacks targeting and leveraging routers, particularly around Q4 2019. The research, says the company, indicates increased abuse of these devices will continue as attackers are able to easily monetize these infections in secondary attacks unless users take action to stop their devices from enabling this criminal activity.

“With a large majority of the population currently reliant on home networks for their work and studies, what’s happening to your router has never been more important,” says Jon Clay, director of global threat communications for Trend Micro. “Cybercriminals know that a vast majority of home routers are insecure with default credentials and have ramped up attacks on a massive scale.”

“For the home user, that’s hijacking their bandwidth and slowing down their network,” says Clay. “For the businesses being targeted by secondary attacks, these botnets can totally take down a website, as we’ve seen in past high-profile attacks.”

The company’s research revealed an increase from October 2019 onwards in brute force log-in attempts against routers, in which attackers use automated software to try common password combinations. The number of attempts increased nearly tenfold from around 23 million in September to nearly 249 million attempts in December 2019. As recently as March 2020, says the company, it recorded almost 194 million brute force logins.

Another indicator that the scale of this threat has increased, says the company, is devices attempting to open telnet sessions with other IoT devices. Because telnet is unencrypted, it’s favored by attackers – or their botnets – as a way to probe for user credentials. At its peak, in mid-March 2020, nearly 16,000 devices attempted to open telnet sessions with other IoT devices in a single week.

The trend is concerning, says the company, and indicates that cybercriminals are competing with each other to compromise as many routers as possible so they can be conscripted into botnets. These are then sold on underground sites either to launch Distributed Denial of Service (DDoS) attacks, or as a way to anonymize other attacks such as click fraud, data theft, and account takeover.

Competition is so fierce, says the company, that criminals are known to uninstall any malware they find on targeted routers, booting off their rivals so they can claim complete control over the device. For the home user a compromised router is likely to suffer performance issues, and if attacks are subsequently launched from that device, their IP address may also be blacklisted – possibly implicating them in criminal activity and potentially cutting them off from key parts of the internet, and even corporate networks.

As explained in the report, which highlights three botnet malware families – Mirai, Kaiten, and Qbot – there’s a thriving black market in botnet malware and botnets-for-hire. Although any IoT device could be compromised and leveraged in a botnet, routers are of particular interest because they are easily accessible and directly connected to the internet.

To combat this, says the company, home users should heed the following recommendations:

  • Make sure a strong password is used and that it is changed from time to time.
  • Make sure the router is running the latest firmware.
  • Check logs to find behavior that doesn’t make sense for the network.
  • Only allow logins to the router from the local network.

For more, see the report: “Worm War: The Botnet Battle for IoT Territory.”

Trend Micro

Related articles:
Botnet encyclopedia launched to fight cybercrime
Cybersecurity expert shares top predictions for 2020
New IoT botnet ‘puts others to shame’
IoT devices becoming ‘cyberweapon of choice’ for attackers

If you enjoyed this article, you will like the following ones: don't miss them by subscribing to :    eeNews on Google News

Share:

Linked Articles
10s