Hackers Attacking Routers In Greater Numbers - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
News

Hackers Attacking Routers In Greater Numbers

Hacking routers isn't as widespread as hacking servers, but poor security practices with routers could change that.

Slapdash router security may become a major point of attack, warns the government-funded security watchdog group, CERT/CC. According to Kevin J. Houle, leader of the CERT/CC Incident Response Team, if attacks target routers, which largely help drive network traffic, the impact on Internet performance could be substantial.

Houle explains that, although the tactic of hacking routers hasn't become widespread, it's the beginning of a new phenomenon. "We're getting reports of routers being compromised by intruders, routers being deployed and compromised with weak or default passwords, and the availability of public resources helping to instruct novices how to exploit router security weaknesses," he says.

Although hackers have yet to publish automated tools that would enable hackers to commandeer multiple routers into a distributed denial-of-service attack, Houle says that such tools are possible, and he wouldn't be surprised to see them surface in the future.

"The main message here is to educate security professionals that their routers may become a primary target in future attacks, potentially choking their network traffic. They need to watch routers just as closely as they watch their network and servers," Houle advises.

As with securing servers, security administrators need to turn off any functions or services not needed by the router, select difficult-to-guess passwords, and encrypt communications used to manage or change router settings over the Internet.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
The State of IT & Cybersecurity Operations 2020
The State of IT & Cybersecurity Operations 2020
Download this report from InformationWeek, in partnership with Dark Reading, to learn more about how today's IT operations teams work with cybersecurity operations, what technologies they are using, and how they communicate and share responsibility--or create risk by failing to do so. Get it now!
Slideshows
10 Cyberattacks on the Rise During the Pandemic
Cynthia Harvey, Freelance Journalist, InformationWeek,  6/24/2020
News
IT Trade Shows Go Virtual: Your 2020 List of Events
Jessica Davis, Senior Editor, Enterprise Apps,  5/29/2020
Commentary
Study: Cloud Migration Gaining Momentum
John Edwards, Technology Journalist & Author,  6/22/2020
Register for InformationWeek Newsletters
Video
Current Issue
Key to Cloud Success: The Right Management
This IT Trend highlights some of the steps IT teams can take to keep their cloud environments running in a safe, efficient manner.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll