Our Blog: Stuff we think you should know

Spreading Botnet has Years-Old Flaw to Thank

Spreading Botnet has Years-Old Flaw to Thank

When asked how one can prevent threats from attacking a business’ infrastructure, one of the first answers that we’d give is to ensure that all patches have been applied. Doing so will help to stop an attack from infecting your systems, if a patch has been successfully developed. Unfortunately, the recent spread of the BCMUPnP_Hunter botnet is evidence that not enough people are appropriately patching their systems.

Threat Background
This botnet was first spotted in September and has been infecting devices to help support a massive spam email campaign. By scanning for potential targets - routers with the BroadCom Universal Plug and Play (UPnP) feature enabled - BCMUPnP_Hunter is able to effectively zero-in on its victims and infect them. From there, the systems can then be taken over by the hacker.

In this case, it has been surmised that the network created by BCMUPnP_Hunter is intended to send out spam emails, as it creates a proxy that communicates with popular email servers. Attackers can also use botnets to generate an ill-gotten profit by generating fraudulent clicks. It has also become apparent that the person who created this malware has considerable skills.

BCMUPnP_Hunter appears to scan from over 100,000 sources, making this botnet a considerably large one.

How This Proves that Patches Aren’t Being Added
In order to accomplish its goal, BCMUPnP_Hunter relies on the target device having Broadcom UPnP enabled, as the botnet is leveraging a vulnerability in that particular feature to work.

The thing is, this vulnerability was discovered in 2013, and most manufacturers have long since released a patch for it. This would imply that the majority of devices infected by this threat are those that weren’t patched.

The Lesson
The lesson here is simple. Whether it’s for business or personal use, any equipment that is a part of your computing infrastructure needs to be maintained - and that includes applying patches promptly. Granted, they aren’t always broadcast to the public, but that only means that users (especially in the business environment) need to check every now and then.

An IT provider like Haber Group can help with that. We’ll monitor both your systems and these kinds of announcements, making sure that your business’ technology is prepared for the latest threats that emerge. Call 866.625.3560 for more information.

Powerful Physical Security Options
Tip of the Week: Use These Practices to Boost Your...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, February 21 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Email Hackers Business Malware User Tips Computer Business Computing Internet Network Security Productivity Tech Term Microsoft Google Software Hosted Solutions Mobile Devices Efficiency IT Services Communication Small Business Backup Windows 10 Hardware Ransomware Smartphone Data Android IT Support Saving Money Workplace Tips Productivity Managed IT Services Microsoft Office Browser Data Management Facebook Internet of Things Server Data Recovery Upgrade Windows Managed IT Services Gmail Cloud Computing Business Continuity Disaster Recovery Phishing Innovation App Word Passwords Office 365 Data Backup Cybersecurity Smartphones Managed Service Provider Business Management Users VoIP Remote Monitoring Encryption Outsourced IT Employer-Employee Relationship Mobile Device Windows 10 Artificial Intelligence Money Spam Website Government Infrastructure Social Media BYOD Office Tips Network Chrome Information Content Filtering Analytics Applications IT Support Big Data Tip of the week Miscellaneous communications Vulnerability Robot Antivirus Risk Management Wireless Printing Automation Employee-Employer Relationship Customer Service Save Money Managed Service Apple IT Management Hacker Settings Access Control Two-factor Authentication Router Firewall Maintenance Data storage Display Virtual Reality Bandwidth YouTube WiFi Tablet Avoiding Downtime Paperless Office The Internet of Things Gadgets IBM Networking Wireless Technology Recovery Virtualization Unified Threat Management VPN Administration Operating System Holiday Mobile Device Management End of Support Business Intelligence Customer Relationship Management Data Security Wi-Fi Computing Data loss Business Technology Laptop Password Virtual Private Network Google Drive Company Culture Augmented Reality Mouse Vendor Management Server Management Apps Touchscreen Safety LiFi Document Management HIPAA Computers Hacking Telephone Systems Downtime Storage Retail Development Hosted Solution Quick Tips Scam Presentation Mobile Security Outlook Monitors SaaS Search Education Office Solar Print Toner Break Fix Cookies Application Monitoring How To Cooperation Typing IT service Heating/Cooling Black Friday Regulations Remote Computing WannaCry Experience Unified Communications Hotspot Professional Services Deep Learning Humor Work Content Multi-Factor Security Mirgation Hacks Update Voice over Internet Protocol Hard Disk Drive Microsoft Excel Star Wars Desktop Time Management Running Cable Cryptocurrency Shortcuts Cabling Virtual Desktop Dark Web Nanotechnology Budget Spying Firefox Staff Streaming BDR Servers Buisness Cyber Monday Social Networking How To Analysis Language USB Bring Your Own Device sip Digital Payment Optimization Lithium-ion battery Google Calendar Chatbots Chromebook FinTech IT solutions Blockchain Cost Management Hard Drives Politics Troubleshooting Network Management Bitcoin Network Congestion Collaboration Security Cameras Managed IT Net Neutrality Screen Reader Techology Printer Wearable Technology Recycling Human Error Google Maps 5G Smart Technology Motherboard Information Technology Digital Lenovo Computing Infrastructure Dongle Best Practice telephony Halloween Legislation Identity User Writing MSP Mail Merge Cortana Permissions Assessment Refrigeration Google Docs Tech Support Windows 8 Public Speaking File Sharing Managing Stress Managed Services Disaster Shortcut Fun FCC Smart Tech Computer Care PowerPoint Unified Threat Management eWaste Device Statistics Distributed Denial of Service Google Wallet Samsung Spyware Superfish Alerts Service Level Agreement Business Growth Competition Scary Stories Comparison Current Events Address Fraud Internet Exlporer Websites Identity Theft LED SharePoint Cables Laptops Uninterrupted Power Supply Patch Management Title II Connectivity Legal Training Onboarding IP Address User Error Cybercrime Automobile Continuity Mobility Bluetooth Managed IT Service Modem Drones G Suite Slack Licensing Alt Codes Dark Data Sports Specifications Compliance Going Green Social Engineering Charging Corporate Profile Knowledge Value Undo Smart Office Co-Managed IT Downloads IT Technicians Social Wires Software as a Service Solid State Drive Online IoT Marketing Digital Signage VoIP Mobile Office Personal Information Administrator Unsupported Software Crowdsourcing Taxes Web Server Regulation Emergency Machine Learning IT Budget Entertainment GPS Computer Repair Mobile Data IT Consultant Processors Cameras Relocation Meetings Tracking Domains Health Cleaning Alert CCTV Private Cloud Mobile Computing Emoji Webcam Printers Electronic Medical Records Physical Security Work/Life Balance Upgrades Error Black Market Point of Sale Travel Law Enforcement 3D Printing Notifications CrashOverride Twitter Botnet Supercomputer Motion Sickness Gadget Staffing