News & Announcements

More than 300,000 routers in homes and small businesses hacked

A security research outfit has released a report which revealed that more than 300,000 routers in homes and small businesses have been hacked.

Team Cymru, the US-based security outfit which published the report, said that the network of hacked routers is one of the biggest of its kind that has been discovered, with most of the hacked routers in Columbia, India, Italy, Thailand, and Vietnam.

Most of the hacked routers have the following common features: Owners who didn’t know how to configure their routers, insecure default settings (factory-default passwords was not an issue), backdoors in firmware, firmware version vulnerable to a known Cross-Site Request Forgery CSRF) technique, and graphical user interfaces accessible from the Internet.

The hacked router had their DNS settings modified, which is just as bad (maybe worse) than having the end-point computers themselves hacked. This image shows a heatmap distribution of the 300, 000 hacked routers.
Team Cymru 300,000 Hacked Routers

In this particular network of hacked routers, I don’t think it would have made any difference if the computers behind those routers have host-based security tools installed. But it certainly wouldn’t hurt to have the best security tools that you can get installed on your computer(s). The problem with Internet routers is that, for most users, they are an install-it-and-forget-it-device. I think asking users to reset their Internet routers often might not be such a bad idea.

Details about the 300,000 hacked routers are available in this PDF file.

Related Posts

Yea, we want to hear you say it! Baby, I want to hear you say it. Consider this a joke, but a very serious one. Some will find it funny and laugh. Others will still find it funny,...
The National Archives releases new version of file-identification software DROID On 7 March 2011, the National Archives launched the newest version of Digital Record Object Identification (DROID), an open source, file-identificatio...
Debugging a failed Ansible ad hoc command Ansible is an IT automation and configuration management tool. Of all the most popular Free Software applications of its kind, it is the only one that...
How to use fedora-tools image for Fedora Atomic Host Fedora Atomic Host is a container-native version of the Fedora distribution. It is one of several operating systems expressly designed for running con...
The best tool for Fantasy Football analytics: Excel or R? In the early days, I used Excel for basic stuff, but I've been playing with R for some fun and funky data crunching. It's a nice tool to know how to u...
Open source desktops manage shared office space ministries Twenty desktop PCs running the Ubuntu Linux distribution are used to manage the services at a shared office building in the Hague for all Dutch minist...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*