CERT issues warning about malwares attacking routers

CERT issues warning about malwares attacking routers

PUNE: Following the large scale compromise of Small and Medium-sized Enterprises and Small Office and Home Office (SME/SOHO) routers via exploiting known vulnerabilities, the Computer Emergency Response Team (CERT) has issued warnings about malware trying to attack such routers.

As per CERT, attackers use the variants of some known malware for targeting the Internet of Things (IoT) devices. Some of the malware used by attackers are Mirari, JenX, Satori IoT Botnet, Torii, Hajime Malware and others.

The attacker then tries to exploit the known vulnerabilities present in the Wi-Fi router deployed at the SME/SOHO. The warning by CERT also stated that following the attack, the infected router becomes a part of the attacker-controlled botnet and starts performing different malicious activity such as performing Distributed Denial of Service attack.

BEST PRACTICE AND RECOMMENDATIONS
- Restrict Web Management Interface access of IoT devices to authorised users only and change default username/passwords.
- Always change default login credentials before deployment in production.
- Change default credentials at device start-up and ensure that passwords meet the minimum complexity.
- Disable Universal Plug and Play (UPnP) on IoT devices unless required. 
- Control access to the devices with access list.

Enjoyed reading The Bridge Chronicle?
Your support motivates us to do better. Follow us on Facebook, Instagram and Twitter to stay updated with the latest stories.
You can also read on the go with our Android and iOS mobile app.

Related Stories

No stories found.
logo
The Bridge Chronicle
www.thebridgechronicle.com