415,000 routers infected by cryptomining malware – Prime target MikroTik

According to a new report, around 415,000 routers throughout the world are infected with malware having the potential to steal computer resources and discreetly mine for the cryptocurrency. The campaign is an active one and it primarily targets MikroTik routers. Researchers claim that the cryptojacking attacks started in August and in the first string of […]

UPnProxy – A Dubbed NSA Hacking Tool of EternalSilence Vulnerable to Attack 277,000 UPnP Enabled Routers

New research reveals that  Universal Plug and Play (UPnP) implemented 277,000 Connected Devices are vulnerable to malicious proxy system UPnProxy , a dubbed EternalSilence NSA hacking tool arsenal. UPnP is a feature that allows the devices on your network to discover each other and allow to access certain services. Often, this is used for streaming media between devices on a network. […]

German Government issues recommendations on router security

The measures were criticized by specialist organizations and software developers Last week, in an attempt to address the security of broadband routers, the German government issued some suggestions on minimum standards, receiving immediate criticism of the scope of its proposals. According to specialists in digital forensics from the International Institute of Cyber Security, the BSI, the […]

UPnP-Exploiting Botnet Infecting 100,000+ Home Routers and Still Counting

Security experts for a long time have warned users to turn-off UPnP (Universal Plug and Play) on their home modem/routers, to close the security vulnerability inherent in the UPnP protocol. However, UPnP is turned-on by default on all consumer routers is the longtime trend, and it is not expected for a reversal of policies anytime […]

Three critical vulnerabilities can be chained to take full control of D-Link routers

Researchers from the Silesian University of Technology in Poland discovered several flaws that could be exploited to take control over some models of D-Link routers A group of digital forensics investigators from the Silesian University of Technology in Poland reported the founding of three vulnerabilities in some D-Link router models that could be chained to take full control over […]

MikroTik router vulnerability lets hackers bypass firewall to load malware undetected

Tenable Research’s cybersecurity researcher has released “By The way,” which is a new PoC (proof-of-concept) RCE attack after identifying a new attack method to exploit an already discovered vulnerability in MikroTik routers. The vulnerability, identified as CVE-2018-14847, is an old directory traversal flaw, which was patched the same day it was detected in April, 2018. […]

Nearly 90% of routers contain vulnerable code

Five out of six brand routers such as Linksys, NETGEAR, and D-Link, contain known open-source vulnerabilities Experts in digital forensics report an exorbitant figure regarding to the use of domestic and organizational tasks routers, since 83% of these devices contain vulnerabilities that could be exploited to deploy numerous cyberattacks. Of vulnerable routers, more than a quarter contain critical and high-risk vulnerabilities, according to a report published this week […]

New GhostDNS, DNS Changer Botnet Hijacked Over 1,00,000 Routers

Chinese researchers have discovered cyber widely spread the GhostDNS malicious campaign that has captured more than 100,000 home routers and changed their DNS settings for users to crack malicious web pages, especially if they visit banking sites, and steal their credentials. GhostDNS Dubbed, the campaign has a lot to do with the notorious malicious software […]

Vulnerability discovered in WiFi routers

An error has been discovered in all modern WiFi routers that cannot be solved Specialists in ethical hacking and cybersecurity at the University of California reported the discovery of a vulnerability that leverages the interaction of two universal Internet protocols: the Transmission Control Protocol (TCP) and WiFi. This exploit does not appear to be traditional […]

How to find what your router exposes on the Internet

  These devices are easy prey for hackers Sometimes a home use router may look like an open door to the leaking of some of our information, cyber security organization experts discuss how we can find out if our devices are vulnerable. First of all, it’s important to start by implementing basic security measures to protect our […]

Cracking Wireless Router Using Aircrack-ng with crunch

Today I will show you how to crack a wireless router using aircrack-ng and crunch. First off this is tested on my own home network as i don’t advise hacking anyone else’s WiFi but your own. First we need to put our wireless adaptor into monitor mode. Monitor mode: or RFMON mode, allows a computer with a […]

Russian espionage software persistent in thousands of domestic routers

Last May, the Justice Department asked US citizens to restart their routers, but there are still things to do The Russian army is present within hundreds of thousands of routers owned by Americans and from other parts of the world, a U.S. security official said on Friday. The presence of Russian malware on the routers, […]

In-the-wild router exploit sends unwitting users to fake banking site

DLink vulnerability lets attackers remotely change DNS server settings. Hackers have been exploiting a vulnerability in DLink modem routers to send people to a fake banking website that attempts to steal their login credentials, a security researcher said Friday. The vulnerability works against DLink DSL-2740R, DSL-2640B, DSL-2780B, DSL-2730B, and DSL-526B models that haven’t been patched […]

Update MikroTik routers – 170,000 devices hit by cryptocurrency malware

Currently, the malware is targeting unpatched MikroTik routers in Brazil but researchers believe it’s about time it will spread worldwide. Unpatched routers manufactured by MikroTik have become potential targets of cryptojacking malware campaigns in Brazil. According to the analysis of Trustwave’s security researcher Simon Kenin, an unprecedented increment in web-based cryptojacking/cryptomining attacks in Brazil has […]

Routersploit – A Free Framework for Exploiting Embedded Devices

Routersploit is an open source framework used for exploiting vulnerabilities in embedded devices like routers. Routersploit is loaded with various modules that help the tool perform its functionality. These modules can be divided into the following categories. (a) Scanner Modules: Scanner modules are responsible for finding the vulnerabilities in the routers or embedded devices. (a) […]

Hackers attack Russian bank to steal $1m using an outdated router

Cybercriminals part of a notorious hacking group attacked the PIR Bank of Russia and stole $1m. The hacking was carried out after infiltrating the bank’s systems by compromising an old, outdated router. The router was installed at one of the regional branches of the bank. The money was stolen via the Automated Workstation Client (AWC) […]

How to Exploit a Router Using RouterSploit

The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices. It consists of various modules that aids penetration testing operations: exploits – modules that take advantage of identified vulnerabilities creds – modules designed to test credentials against network services scanners – modules that check if a target is vulnerable to any exploit payloads […]

Russia, Routers, and Why Virtually Everyone is part of the DDoS Problem

Every day, the vast majority of us do our best to not contribute to major global problems. We recycle. We bring our cars in for emissions testing. We stop ourselves from spending $120 on a pair of fake Yeezys and bolstering the counterfeit goods industry. Yes, we are heroes. However, DDoS attack have become a […]

New Prowli Malware Is Targeting Routers, IoT Devices And Servers

After discovering the massive botnet VPNFilter malware, security researchers have discovered another huge botnet ( Prowli Malware )that has already touched more than 40,000 servers, modems, and Internet-connected devices belonging to a large number of organizations around the world. Prowli’s double operation, the campaign has spread malicious programs and injected malicious code to detect the […]