Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What is a Router Botnet? Find Out Today!

What is a Router Botnet? Find Out Today!

Ordinarily, one of the best ways to protect your organization’s infrastructure is to make sure any and all patches administered to the software you use are applied as soon as possible after they’ve been released. However, patches don’t help against threats that aren’t discovered at the moment they are released. The recent spread of BCMUPnP_Hunter botnet shows that it’s not enough for people to keep patching their systems.

Threat Background
This botnet was initially discovered in September. Since then, it has infected devices to support a huge spam email campaign. BCMUPnP_Hunter is able to zero-in on victims thanks to its ability to scan for potential targets, like routers with the BroadCom University Plug and Play feature enabled. The system can then be taken over by the hacker.

It is assumed that the network created by BCMUPnP_Hunter was created to send out spam emails. The threat creates a proxy that communicates with email servers, allowing attackers to use botnets to generate profit through fraudulent clicks. What’s more is that the malware seems to have been created by someone who has a considerable amount of skill. To make things worse is that BCMUPnP_Hunter also appears to scan from over 100,000 sources, making this botnet quite large.

How Does This Prove That Patches Aren’t Working?
In order for BCMUPnP_Hunter to work as intended, it must target devices that have BroadcomUPnP enabled to take advantage of a vulnerability. The thing is that this vulnerability has been patched since 2013 when it was first discovered, meaning that most manufacturers have issued a patch since then. Therefore, the majority of devices being used by this threat are those that haven’t been patched for some reason or another.

The Lesson Learned
A simple lesson can be learned here. It goes to show that any equipment on your infrastructure that’s not maintained could be putting your business at risk. This includes making sure that you implement patches and security updates as soon as they are released. Of course, they aren’t always broadcast to the public--after all, who would want to admit that the product they have created is vulnerable to attack, and that the vulnerability is being exploited? As a business owner, it’s your responsibility to keep up with the latest threats.

Granted, not all business owners have the time or luxury to focus on something like this. For those who want to minimize the threat posed by vulnerabilities, give the IT professionals at Total Tech Care a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications IT Support Smartphones Business Continuity Communication Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Cybersecurity Quick Tips Users Business Management Windows Managed IT Services Upgrade Phishing Outsourced IT Ransomware Data Backup Windows 10 Save Money Cloud Computing Data Recovery Office Server Passwords Windows 10 Chrome Virtualization Saving Money Holiday Tech Term Gadgets Social Media Microsoft Office Managed Service Managed IT Services Automation Cybercrime Operating System Computers Facebook Artificial Intelligence Health Hacking BYOD Internet of Things Mobile Device Management Networking IT Support Wi-Fi Managed Service Provider Remote Spam Covid-19 Office 365 Information Telephone Systems Information Technology Alert Social Engineering Mobility Router BDR Bandwidth Recovery Employer-Employee Relationship Password Human Resources Big Data Money Encryption Remote Monitoring Applications Data Breach Mobile Computing Law Enforcement App History Application Apps Data Storage Remote Computing Patch Management Mobile Office Blockchain Paperless Office Government Office Tips Training Private Cloud How To VPN Managed IT Work/Life Balance Two-factor Authentication Vulnerability Mouse HaaS Windows 7 Word Flexibility Google Drive Marketing Servers WiFi IT solutions Entertainment Avoiding Downtime Website Budget Wireless Infrastructure Voice over Internet Protocol Data Security Gmail Settings Bring Your Own Device Data Management Cleaning Virtual Reality Apple Conferencing End of Support Social Physical Security Scam Education User Error Vendor Safety Managed Services HIPAA Meetings Sports Telephone System Staff Software as a Service Display Redundancy Machine Learning Keyboard Vendor Management Connectivity Remote Work Risk Management Employee/Employer Relationship Hacker USB RMM The Internet of Things Lithium-ion battery Save Time Data Protection Firewall Computing Infrastructure Hiring/Firing Procurement Going Green Comparison Net Neutrality Workplace Strategy SaaS CES Help Desk Printing Battery Network Congestion Shadow IT Virus Business Technology eWaste Content Management Legal Business Intelligence Access Control Managed Services Provider Audit Internet Exlporer Worker Unified Threat Management Computer Accessories Virtual Assistant IT Management Database Authentication Botnet PDF Wearable Technology Remote Workers IT Plan Retail Hard Drives Processor Instant Messaging Proactive IT Update Excel Printer Unsupported Software Robot Bluetooth Best Practice Hard Drive Biometrics YouTube Charger Google Docs Black Market Virtual Desktop Identity Theft Compliance OneNote Computer Care Current Events DDoS Computing Document Management Telephony IT Consultant SharePoint Solid State Drive Wireless Technology Samsung Downtime Augmented Reality How to Fraud Humor Value Digital Signage Data storage Remote Worker Customer Service Automobile Spam Blocking Environment Electronic Medical Records Cryptocurrency Fax Server Cache AI Mobile IT service Amazon Web Services IT Infrastructure Windows 10s Safe Mode FinTech Criminal Cast Bing Best Available Reputation webinar WIndows 7 Tablet Streaming Media Emergency GDPR Hosted Computing Social Network Tip of the week Wireless Internet Content Professional Services Domains Online Shopping Investment Public Cloud Tech Support Employer Employee Relationship File Sharing Employees Employee/Employer Relationships Techology Laptop Assessment Maintenance Specifications ISP Customers Camera Windows 365 IaaS Inventory Windows Server 2008 Wire Video Conferencing Audiobook Tools Evernote ROI Bloatware Sales Bitcoin Travel Shortcuts Touchpad Television Millennials Cryptomining User Tablets PowerPoint Windows Media Player Printers Point of Sale Personal Smart Office Supply Chain Management Politics Wireless Charging Advertising Entrepreneur Monitoring Batteries Public Computer Shortcut Workforce Managing Stress Notifications Transportation Virtual Private Network Windows 8.1 Digitize Regulations Cables Windows Server 2008 R2 Computer Fan Cost Management Rootkit Cameras Customer relationships Social Networking Nanotechnology IT Assessment Telecommuting Manufacturing Relocation Workers Benefits Project Management Email Best Practices Cortana FENG Security Cameras IBM Computer Tips Running Cable Digital Signature Managed IT Service Video Games OneDrive Worker Commute Flash Biometric Security Memory Smart Technology Warranty Virtual CIO HVAC Peripheral Experience Google Apps Supercomputer Printer Server Digital Security Cameras Analysis Using Data Scalability Software Tips Devices Copiers Business Owner Sync 5G Emails Administrator Enterprise Content Management Quick Tip NarrowBand Smartwatch Science MSP Ergonomics Accountants Search Thought Leadership Development Credit Cards OLED iPhone Netflix Two Factor Authentication Microchip Password Management PCI DSS Password Manager Virtual Machine Root Cause Analysis Multi-Factor Security Employee Knowledge Music 2FA Distributed Denial of Service Fiber Optics HBO Customer Relationship Management Twitter Messaging Skype Cabling Files Analyitcs Search Engine NIST Policy Business Mangement Hypervisor Data loss Programming Chromecast Trending Leadership Troubleshooting Dark mode Smart Tech Trend Micro Outlook Addiction SMS Start Menu Amazon Default App Colocation Uninterrupted Power Supply Procedure Antivirus Recycling Saving Time Screen Mirroring Loyalty Consultant Google Search Monitor Windows 8 Books Analytics Wiring dark theme Practices Shopping Frequently Asked Questions

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code