Spreading Botnet has Years-Old Flaw to Thank

Spreading Botnet has Years-Old Flaw to Thank

When asked how one can prevent threats from attacking a business’ infrastructure, one of the first answers that we’d give is to ensure that all patches have been applied. Doing so will help to stop an attack from infecting your systems, if a patch has been successfully developed. Unfortunately, the recent spread of the BCMUPnP_Hunter botnet is evidence that not enough people are appropriately patching their systems.

Threat Background
This botnet was first spotted in September and has been infecting devices to help support a massive spam email campaign. By scanning for potential targets - routers with the BroadCom Universal Plug and Play (UPnP) feature enabled - BCMUPnP_Hunter is able to effectively zero-in on its victims and infect them. From there, the systems can then be taken over by the hacker.

In this case, it has been surmised that the network created by BCMUPnP_Hunter is intended to send out spam emails, as it creates a proxy that communicates with popular email servers. Attackers can also use botnets to generate an ill-gotten profit by generating fraudulent clicks. It has also become apparent that the person who created this malware has considerable skills.

BCMUPnP_Hunter appears to scan from over 100,000 sources, making this botnet a considerably large one.

How This Proves that Patches Aren’t Being Added
In order to accomplish its goal, BCMUPnP_Hunter relies on the target device having Broadcom UPnP enabled, as the botnet is leveraging a vulnerability in that particular feature to work.

The thing is, this vulnerability was discovered in 2013, and most manufacturers have long since released a patch for it. This would imply that the majority of devices infected by this threat are those that weren’t patched.

The Lesson
The lesson here is simple. Whether it’s for business or personal use, any equipment that is a part of your computing infrastructure needs to be maintained - and that includes applying patches promptly. Granted, they aren’t always broadcast to the public, but that only means that users (especially in the business environment) need to check every now and then.

An IT provider like BNMC can help with that. We’ll monitor both your systems and these kinds of announcements, making sure that your business’ technology is prepared for the latest threats that emerge. Call 978-482-2020 for more information.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, August 22 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Cloud Email Privacy Computer User Tips Microsoft Network Security Malware Software Hackers Productivity Google Hosted Solutions Business Communication Tech Term Hardware Ransomware Data Mobile Devices Internet Small Business IT Services Efficiency Cloud Computing Smartphone IT Support Data Recovery Workplace Tips Backup Android Saving Money Innovation Upgrade Users Office 365 Managed IT Services Business Continuity Microsoft Office Information Windows Miscellaneous Social Media Windows 10 Mobile Device Browser Windows 10 Data Backup Managed IT Services Business Management Internet of Things Data Management Phishing Outsourced IT Word communications App Gmail Cybersecurity Passwords Productivity Vulnerability Server Facebook Artificial Intelligence Network Disaster Recovery Encryption VoIP Smartphones Remote Monitoring Chrome Virtual Reality Analytics Managed Service Employer-Employee Relationship Website Applications BYOD Money Tip of the week IT Support Infrastructure Save Money Gadgets Managed Service Provider Maintenance Apps Access Control VPN Development IT Management Apple Education YouTube Storage Employee-Employer Relationship Quick Tips Government Risk Management Hacker Data storage Office Tips Paperless Office Router Display Big Data Antivirus Unified Threat Management Company Culture Robot Google Drive Settings Content Filtering Automation Bandwidth Collaboration Firewall End of Support Data Security Business Technology Document Management Server Management Touchscreen Virtual Private Network Printing Wireless SaaS HIPAA Solid State Drive Tablet Holiday Mobile Security Computers Virtualization OneNote Hard Disk Drive Retail Alert Laptop Two-factor Authentication Business Intelligence Spam Computing Avoiding Downtime Outlook The Internet of Things WiFi Scam Bring Your Own Device Operating System Data loss Vendor Management LiFi Monitors Hosted Solution Downtime Telephone Systems Chromebook Administration Networking Augmented Reality desktop Mouse Managing Stress Star Wars Troubleshooting Business Analysis Network Management Chatbots eWaste Cryptocurrency iOS Dark Web Nanotechnology IT solutions Going Green Spying National Security Wearable Technology Network upgrade Google Docs Security Cameras Cyber Monday Safety Analysis Students Halloween Spyware Alerts USB Human Error Memory Legislation Uninterrupted Power Supply Remote Computing Motherboard Cables Hacks Microsoft Excel Computer Care IBM Fraud Cost Management Google Wallet Virus SharePoint File Sharing Network Congestion Identity Continuity Bitcoin Scalability Screen Reader Charging Updates Techology Smart Office Business Growth Managed Services Managed IT Smart Technology Password Mixed Reality How To Lenovo Scary Stories Identity Theft Wi-Fi Licensing Dongle Legal Device Statistics Writing Wires Mail Merge Running Cable Blockchain Training Corporate Profile Assessment Unified Communications Drones LED Threats Downloads Solar Windows 8 Migration Smart Tech PowerPoint VoIP Unified Threat Management Buisness Automobile Dark Data Update Work Laptops Shortcut Distributed Denial of Service G Suite Mobile Device Management Data Breach Firefox Superfish Sports Cooperation Service Level Agreement Deep Learning Mobility Bluetooth Comparison Virtual Desktop Dell Voice over Internet Protocol Address Permissions WannaCry Politics Hotspot Internet Exlporer Co-Managed IT Cabling Compliance Windows 7 Connectivity Onboarding GDPR User Error Google Maps Customer Service IT Technicians Optimization Alt Codes Software as a Service Patch Management Managed IT Service Slack Hard Disk Drives Customer Relationship Management Private Cloud Staff Leominster Print Toner Specifications Office Samsung Modem FinTech Tech Support Language Value Budget Content Huawei Heating/Cooling Multi-Factor Security Regulations Social Messaging IoT Information Technology Digital Signage Data Warehouse Time Management Printer Mirgation Recycling Typing Humor Entertainment Cybercrime Break Fix MSP Current Events Monitoring Solid State Drives Marketing Digital Payment K-12 Schools Best Practice Shortcuts Search Black Friday Social Engineering Cookies Employee-Employer Relationships Emergency Digital Websites Computing Infrastructure Professional Services Streaming Processor Servers Google Calendar Disaster Social Networking Cleaning Upgrades Gadget Emoji CCTV Crowdsourcing Personal Information Botnet Webcam 3D Printing Printers Cortana Error Machine Learning Point of Sale Ben McDonald shares Processors BDR Unsupported Software Travel Regulation Supercomputer CrashOverride Computer Repair Relocation Staffing Mobile Data Financial Motion Sickness How To Work/Life Balance Administrator Recovery Taxes Mobile Computing IT Budget Health Web Server what was your? GPS Black Market Law Enforcement IT Consultant Electronic Medical Records Cameras Notifications Tracking Physical Security Meetings Twitter

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3