New botnet attacks on home routers on the rise: Trend Micro

Trend Micro Research warns of new botnets attacks on home routers

Hong Kong, China: New botnet attacks on home routers are on the rise warned Trend Micro research to consumers.

Trend Micro‘s new research warned consumers of major attacks that are attempting to compromise their home routers for use in IoT botnets. The report urged users to take action to stop their devices from enabling this criminal activity.

There has been a recent spike in new botnet attacks targeting and leveraging routers, particularly around Q4 2019. This research indicated an increased abuse of these devices will continue as attackers are able to easily monetize these infections in secondary attacks.

“With a large majority of the population currently reliant on home networks for their work and studies, what’s happening to your router has never been more important,” said Jon Clay, Director – Global Threat Communications, Trend Micro.

“Cybercriminals know that a vast majority of home routers are insecure with default credentials and have ramped up attacks on a massive scale. For the home user, that’s hijacking their bandwidth and slowing down their network,” added Clay.

Cautioning businesses against being targeted by secondary attacks, Clay pointed out that these new botnet attacks can totally take down a website. “As we’ve seen in past high-profile attacks,” he added.

From October 2019 onwards there has been a rise in brute force log-in attempts against routers, according to Trend Micro research. In which attackers use automated software to try common password combinations.

The number of attempts increased by nearly tenfold. From around 23 million in September to nearly 249 million attempts in December 2019. As recently as March 2020, Trend Micro recorded almost 194 million brute force logins.

The scale of this threat has increased in devices attempting to open telnet sessions with other IoT devices.

Because telnet is unencrypted, it’s favored by attackers — or their botnets — as a way to probe for user credentials. At its peak, in mid-March 2020, nearly 16,000 devices attempted to open telnet sessions with other IoT devices in a single week.

This trend is concerning for several reasons. Cybercriminals are competing with each other to compromise as many routers as possible so they can be conscripted into botnets.

These are then sold on underground sites either to launch Distributed Denial of Service (DDoS) attacks or as a way to anonymize other attacks such as click fraud, data theft and account takeover.

Competition among the criminals is so fierce. That they are known to uninstall any malware they find on targeted routers, booting off their rivals. So they can claim complete control over the device.

For the home user, a compromised router is likely to suffer performance issues. If attacks are subsequently launched from that device, their IP address may also be blacklisted — possibly implicating them in criminal activity. And potentially cutting them off from key parts of the internet, and even corporate networks.

There’s a thriving black market in botnet malware and botnets-for-hire. Although any IoT device could be compromised and leveraged in a botnet, routers are of particular interest. Because they are easily accessible and directly connected to the internet, according to the report.

Trend Micro makes the following recommendations for home users:

  • Make sure you use a strong password. Change it from time to time.
  • Make sure the router is running the latest firmware.
  • Check logs to find behavior that doesn’t make sense for the network.
  • Only allow logins to the router from the local network.

(Image source – Trend Micro)

Related posts

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.