• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   home routers

Routers Under Attack: Current Security Flaws and How to Fix Them

  • Posted on:January 31, 2017 at 5:00 am
  • Posted in:Internet of Things
  • Author:
    Trend Micro Forward-Looking Threat Research Team
0

How is it possible for users to lose hundreds of dollars in anomalous online bank transfers when all of their gadgets have security software installed?

Read More
Tags: home routersrouters

Home Routers: Mitigating Attacks that can Turn them to Zombies

  • Posted on:December 14, 2016 at 7:26 am
  • Posted in:Botnets, Internet of Things, Vulnerabilities
  • Author:
    Trend Micro
0

With more households running smart devices that access the internet, the router is typically their only doorkeeper. And whether an end user has a laptop/desktop and router combo, or a miscellany of other devices connected to the network, the security risks are the same. Based on our research, home routers have been most susceptible to cross-site scripting (XSS) and PHP arbitrary code injection attacks, as well as being involved in carrying out DNS amplification attacks.

Read More
Tags: Bitcoin MiningCVE-2015-1635DNS Amplificationhome routersIOTMirai

Mobile Devices Used to Execute DNS Malware Against Home Routers

  • Posted on:April 11, 2016 at 3:20 am
  • Posted in:Internet of Things, Malware
  • Author:
    Chisato Rokumiya
0

Attacks against home routers have been going around for years—from malware that rigs routers to DNS rebinding attacks and backdoors, among others.  Just last year one of our researchers reported a Domain Name System (DNS) changer malware that redirected users to malicious pages when they visited specific websites. This enabled cyber crooks to get hold of the victims’ online credentials, such as passwords and PINs.

We recently came across an attack that proves how the Internet of Things (IoT) can be an entry point for cybercriminal activities. In this attack, which has been going on since December 2015, it requires users to access malicious websites hosting the JavaScript via their mobile devices. Accessing these sites via mobile devices enable the JavaScript to download another JavaScript with DNS changing routines.

Read More
Tags: home routers

Security Predictions for 2019

  • Our security predictions for 2019 are based on our experts’ analysis of the progress of current and emerging technologies, user behavior, and market trends, and their impact on the threat landscape. We have categorized them according to the main areas that are likely to be affected, given the sprawling nature of the technological and sociopolitical changes under consideration.
    Read our security predictions for 2019.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

  • More than a Dozen Obfuscated APT33 Botnets Used for Extreme Narrow Targeting
  • Mac Backdoor Linked to Lazarus Targets Korean Users
  • New Magecart Attack Delivered Through Compromised Advertising Supply Chain
  • September Patch Tuesday Bears More Remote Desktop Vulnerability Fixes and Two Zero-Days
  • Banking Trojan DRIDEX Uses Macros for Infection

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.