More than 300,000 routers in homes and small businesses hacked

A security research outfit has released a report which revealed that more than 300,000 routers in homes and small businesses have been hacked.

Team Cymru, the US-based security outfit which published the report, said that the network of hacked routers is one of the biggest of its kind that has been discovered, with most of the hacked routers in Columbia, India, Italy, Thailand, and Vietnam.

Most of the hacked routers have the following common features: Owners who didn’t know how to configure their routers, insecure default settings (factory-default passwords was not an issue), backdoors in firmware, firmware version vulnerable to a known Cross-Site Request Forgery CSRF) technique, and graphical user interfaces accessible from the Internet.

The hacked router had their DNS settings modified, which is just as bad (maybe worse) than having the end-point computers themselves hacked. This image shows a heatmap distribution of the 300, 000 hacked routers.
Team Cymru 300,000 Hacked Routers

In this particular network of hacked routers, I don’t think it would have made any difference if the computers behind those routers have host-based security tools installed. But it certainly wouldn’t hurt to have the best security tools that you can get installed on your computer(s). The problem with Internet routers is that, for most users, they are an install-it-and-forget-it-device. I think asking users to reset their Internet routers often might not be such a bad idea.

Details about the 300,000 hacked routers are available in this PDF file.

Related Posts

Debian 6.0 “Squeeze” released After 24 months of constant development, the Debian Project is proud to present its new stable version 6.0 (code name "Squeeze"). Debian 6.0 is a free...
NSA PRISM program a traffic boost for DuckDuckGo The NSA PRISM program's revelation, thanks to Edward Snowden, like everything else, has its good and bad side. The good part is, we now know that the ...
Set up, run a pentest lab on AWS or Google Cloud with Kali Linux, Metasploitable and WebGo... Editor: Kali Linux is a special Linux distribution designed just for penetration testing, or pentesting. It is based on Debian Testing, and is one of ...
RAPIRO: The Raspberry Pi-powered robotics kit RAPIRO is a robot and a robotic kit designed by Shota Ishiwatari, the founder of kiluck.co.jp. It is designed to work with a Raspberry Pi, a credit ca...
Debugging a failed Ansible ad hoc command Ansible is an IT automation and configuration management tool. Of all the most popular Free Software applications of its kind, it is the only one that...
Google to Gmail users: Forget about privacy. It’s so dead! Here's a report from The Guardian. Yep, it's that same UK online news site that's been making headlines for more than a month. The report cites...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*