Spreading Botnet has Years-Old Flaw to Thank

Spreading Botnet has Years-Old Flaw to Thank

When asked how one can prevent threats from attacking a business’ infrastructure, one of the first answers that we’d give is to ensure that all patches have been applied. Doing so will help to stop an attack from infecting your systems, if a patch has been successfully developed. Unfortunately, the recent spread of the BCMUPnP_Hunter botnet is evidence that not enough people are appropriately patching their systems.

Threat Background
This botnet was first spotted in September and has been infecting devices to help support a massive spam email campaign. By scanning for potential targets - routers with the BroadCom Universal Plug and Play (UPnP) feature enabled - BCMUPnP_Hunter is able to effectively zero-in on its victims and infect them. From there, the systems can then be taken over by the hacker.

In this case, it has been surmised that the network created by BCMUPnP_Hunter is intended to send out spam emails, as it creates a proxy that communicates with popular email servers. Attackers can also use botnets to generate an ill-gotten profit by generating fraudulent clicks. It has also become apparent that the person who created this malware has considerable skills.

BCMUPnP_Hunter appears to scan from over 100,000 sources, making this botnet a considerably large one.

How This Proves that Patches Aren’t Being Added
In order to accomplish its goal, BCMUPnP_Hunter relies on the target device having Broadcom UPnP enabled, as the botnet is leveraging a vulnerability in that particular feature to work.

The thing is, this vulnerability was discovered in 2013, and most manufacturers have long since released a patch for it. This would imply that the majority of devices infected by this threat are those that weren’t patched.

The Lesson
The lesson here is simple. Whether it’s for business or personal use, any equipment that is a part of your computing infrastructure needs to be maintained - and that includes applying patches promptly. Granted, they aren’t always broadcast to the public, but that only means that users (especially in the business environment) need to check every now and then.

An IT provider like BNMC can help with that. We’ll monitor both your systems and these kinds of announcements, making sure that your business’ technology is prepared for the latest threats that emerge. Call 978-482-2020 for more information.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, January 22 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Email Cloud Privacy Malware Hackers Network Security Business Computing Tech Term User Tips Business Computer Google Software Internet Microsoft Productivity IT Services Efficiency Mobile Devices Hosted Solutions Ransomware Communication Android IT Support Hardware Smartphone Small Business Data Backup Saving Money Managed IT Services Cloud Computing Browser Innovation Data Recovery Business Continuity Windows 10 Data Management Managed IT Services Windows Internet of Things Data Backup Workplace Tips Cybersecurity App Microsoft Office Business Management Productivity Facebook Gmail Server Artificial Intelligence Phishing Remote Monitoring Mobile Device Office 365 Disaster Recovery Windows 10 Upgrade Encryption Passwords Outsourced IT Word Managed Service Provider Network Vulnerability Employer-Employee Relationship IT Support Money Applications Website Infrastructure BYOD Smartphones Analytics Tip of the week communications Chrome Information Robot Antivirus Save Money Data storage Automation Users YouTube Access Control Risk Management IT Management Paperless Office Social Media Government Router Office Tips Google Drive Bandwidth Content Filtering Miscellaneous Company Culture Big Data Managed Service VoIP Maintenance Settings Document Management Scam Development Hacker Wireless Networking End of Support HIPAA Virtual Reality Mobile Security Outlook Spam Computing VPN Operating System Data Security WiFi Business Technology SaaS Server Management LiFi Touchscreen Hosted Solution Business Intelligence Virtual Private Network Quick Tips Administration Holiday Unified Threat Management Laptop Tablet Mouse Data loss Telephone Systems The Internet of Things Alert Employee-Employer Relationship Display desktop Education Apple Downtime Storage Firewall Two-factor Authentication Managing Stress Avoiding Downtime Monitors Printing Vendor Management Spyware Customer Relationship Management Chromebook Wearable Technology Password Network upgrade Uninterrupted Power Supply Mobility Gadgets Specifications Nanotechnology Legal Alerts Windows 8 USB File Sharing Co-Managed IT Heating/Cooling Multi-Factor Security Social Engineering Unified Communications Motherboard Drones Cables Computer Care IBM Websites Fraud Cost Management Onboarding Time Management Printer Identity Continuity Solid State Drive Break Fix Charging Identity Theft Slack Mobile Device Management Smart Office Print Toner Halloween Search Black Friday Deep Learning Screen Reader Emergency Licensing Dongle Content Servers Google Calendar Safety Wires Training Corporate Profile Alt Codes Assessment Automobile Digital Signage Network Management Remote Computing Solar Hard Disk Drive Dark Web Bring Your Own Device Smart Tech Monitoring Network Congestion Work Dell Shortcuts Scary Stories Cyber Monday Cooperation Social Service Level Agreement Cabling Streaming Running Cable Legislation Budget Voice over Internet Protocol WannaCry Microsoft Excel Wi-Fi Hotspot Typing Internet Exlporer Humor Google Maps Troubleshooting SharePoint Writing Compliance Information Technology Buisness Best Practice Connectivity Spying Virtual Desktop Techology Computers IT Technicians Current Events Optimization Security Cameras Sports Managed IT Smart Technology Analysis How To Lenovo Dark Data Update Staff Leominster Human Error Statistics Modem FinTech Mail Merge Blockchain Language Cryptocurrency Value Downloads Retail Apps Regulations IoT Google Docs Digital Payment VoIP Unified Threat Management IT solutions Mirgation Going Green Recycling Managed Services Shortcut Distributed Denial of Service Politics Digital Firefox Superfish Customer Service Augmented Reality Hacks K-12 Schools Disaster Device Bluetooth Comparison Cookies MSP Address Permissions Computing Infrastructure Bitcoin Professional Services Collaboration LED Cybercrime Office Samsung Social Networking Google Wallet Business Growth Star Wars PowerPoint User Error Chatbots eWaste Marketing Patch Management Managed IT Service Tech Support Webcam Law Enforcement Electronic Medical Records Notifications Error Twitter Physical Security Emoji Point of Sale Ben McDonald shares Upgrades Gadget Travel Crowdsourcing BDR Personal Information Botnet G Suite Regulation Supercomputer CrashOverride Cortana Mobile Computing 3D Printing Motion Sickness Staffing Machine Learning Administrator Processors Taxes IT Budget Virtualization Web Server what was your? Unsupported Software GPS Computer Repair Relocation Printers IT Consultant Cameras Mobile Data Recovery Meetings How To Work/Life Balance Tracking Health Private Cloud Cleaning Black Market CCTV

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3