BNMC Blog

Spreading Botnet has Years-Old Flaw to Thank

Spreading Botnet has Years-Old Flaw to Thank

When asked how one can prevent threats from attacking a business’ infrastructure, one of the first answers that we’d give is to ensure that all patches have been applied. Doing so will help to stop an attack from infecting your systems, if a patch has been successfully developed. Unfortunately, the recent spread of the BCMUPnP_Hunter botnet is evidence that not enough people are appropriately patching their systems.

Threat Background
This botnet was first spotted in September and has been infecting devices to help support a massive spam email campaign. By scanning for potential targets - routers with the BroadCom Universal Plug and Play (UPnP) feature enabled - BCMUPnP_Hunter is able to effectively zero-in on its victims and infect them. From there, the systems can then be taken over by the hacker.

In this case, it has been surmised that the network created by BCMUPnP_Hunter is intended to send out spam emails, as it creates a proxy that communicates with popular email servers. Attackers can also use botnets to generate an ill-gotten profit by generating fraudulent clicks. It has also become apparent that the person who created this malware has considerable skills.

BCMUPnP_Hunter appears to scan from over 100,000 sources, making this botnet a considerably large one.

How This Proves that Patches Aren’t Being Added
In order to accomplish its goal, BCMUPnP_Hunter relies on the target device having Broadcom UPnP enabled, as the botnet is leveraging a vulnerability in that particular feature to work.

The thing is, this vulnerability was discovered in 2013, and most manufacturers have long since released a patch for it. This would imply that the majority of devices infected by this threat are those that weren’t patched.

The Lesson
The lesson here is simple. Whether it’s for business or personal use, any equipment that is a part of your computing infrastructure needs to be maintained - and that includes applying patches promptly. Granted, they aren’t always broadcast to the public, but that only means that users (especially in the business environment) need to check every now and then.

An IT provider like BNMC can help with that. We’ll monitor both your systems and these kinds of announcements, making sure that your business’ technology is prepared for the latest threats that emerge. Call 978-482-2020 for more information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, March 26 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Email Cloud Privacy Business Computing Hackers Malware Productivity Network Security Google User Tips Tech Term Business Software Computer Microsoft Communication Internet IT Services Hosted Solutions Efficiency Mobile Devices Ransomware Data IT Support Smartphone Small Business Android Hardware Innovation Cloud Computing Backup Saving Money Data Recovery Business Continuity Managed IT Services Internet of Things Data Backup Workplace Tips Data Management Windows 10 Microsoft Office Managed IT Services Windows Browser Outsourced IT Server Vulnerability Users Cybersecurity App Passwords Business Management Windows 10 Productivity Chrome Word Facebook Phishing Upgrade Remote Monitoring Mobile Device communications Office 365 Artificial Intelligence Gmail Disaster Recovery Encryption Smartphones Tip of the week Managed Service Provider Information Employer-Employee Relationship Social Media Analytics Website Applications BYOD Infrastructure Network Money VoIP IT Support Managed Service Maintenance Settings Antivirus Save Money Robot Google Drive Content Filtering Bandwidth Automation YouTube Miscellaneous Virtual Reality Apple Risk Management Access Control IT Management Paperless Office Government Router Office Tips Hacker Data storage Big Data Company Culture Employee-Employer Relationship Display Managing Stress Operating System Firewall WiFi Two-factor Authentication LiFi Vendor Management Avoiding Downtime Monitors Gadgets Hosted Solution Development Document Management Scam Chromebook Administration Mouse Wireless Networking End of Support HIPAA VPN Mobile Security Education Storage Data Security Server Management Business Technology SaaS Printing Business Intelligence Virtual Private Network Touchscreen Holiday Quick Tips Computers Laptop Tablet Data loss The Internet of Things Unified Threat Management Alert Telephone Systems Retail desktop Computing Downtime Outlook Spam Office Samsung Marketing Social Networking Bring Your Own Device Migration Address Permissions Computing Infrastructure Professional Services Collaboration LED Chatbots eWaste Budget Laptops Patch Management Managed IT Service Tech Support Star Wars Social PowerPoint User Error Information Technology Mobility Specifications Nanotechnology Spyware Typing Humor Customer Relationship Management Wearable Technology Network upgrade Uninterrupted Power Supply Multi-Factor Security Social Engineering Motherboard Cables Computer Care IBM Best Practice Alerts USB File Sharing Current Events Co-Managed IT Heating/Cooling Halloween Identity Continuity Solid State Drive Software as a Service Break Fix Websites Fraud Cost Management Onboarding Time Management Printer Apps Print Toner Search Black Friday Screen Reader Charging Identity Theft Cryptocurrency Slack Smart Office Servers Google Calendar Safety Wires Training Corporate Profile Google Docs Messaging Emergency Licensing Dongle IT solutions Going Green Content Scary Stories Solar G Suite Hard Disk Drive Entertainment Dark Web Assessment Automobile Hacks Digital Signage Network Management Remote Computing Dell Google Wallet Shortcuts Cyber Monday Smart Tech Bitcoin Monitoring Network Congestion Running Cable Work Legislation Buisness Voice over Internet Protocol WannaCry Business Growth Cooperation Service Level Agreement Cabling Streaming Sports Compliance Legal iOS Microsoft Excel Wi-Fi Virtual Desktop Hotspot Internet Exlporer Google Maps Password Troubleshooting SharePoint Writing Unified Communications Drones Security Cameras Managed IT Smart Technology Connectivity Windows 8 Spying Techology Virtualization IT Technicians Optimization Human Error Statistics Modem FinTech Analysis How To Lenovo Dark Data Update Staff Leominster Regulations Deep Learning Scalability Mail Merge Blockchain Language Value Mobile Device Management Downloads Recycling Managed Services Shortcut Distributed Denial of Service Politics IoT Digital Payment VoIP Unified Threat Management Mirgation Device Bluetooth Comparison Cookies MSP Digital Alt Codes Firefox Superfish Customer Service Cybercrime Augmented Reality K-12 Schools Disaster Cleaning Health Private Cloud Mobile Computing CCTV Black Market Law Enforcement Webcam Notifications Windows 7 Electronic Medical Records Physical Security Error Twitter Upgrades Gadget Emoji Point of Sale Ben McDonald shares Crowdsourcing BDR Travel Personal Information Botnet 3D Printing Regulation Supercomputer CrashOverride Cortana Staffing Motion Sickness Taxes Machine Learning Administrator Processors Web Server what was your? Unsupported Software IT Budget GPS IT Consultant Computer Repair Relocation Printers Cameras Mobile Data How To Work/Life Balance Tracking Recovery Meetings

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3