Unsecured home routers, as Trend Micro pointed out in the Most Noteworthy Home Network Security Threats of 2017 report, are conduits for communications on all sorts of devices used for work and could potentially impact the entire enterprise network once the staff member brings the endpoint back to the office for work.
The issues include:
The issues include:
· Incorrectly configured networks, which can provide an open door for malicious actors.
· Default or weak passwords in use, as these are low-hanging fruit for hackers.
· Not keeping up with firmware updates, creating vulnerabilities.
· Default or weak passwords in use, as these are low-hanging fruit for hackers.
· Not keeping up with firmware updates, creating vulnerabilities.
Routers and other devices are also being leveraged for mining Bitcoin and other cryptocurrencies, which Trend Micro calls "the most detected network event seen in 2017". Besides routers, devices found mining cryptocurrency included home computers (14,586), tablets (358), smartphones (981), game consoles (314), IP cameras (573) and printers (219).
"Cryptocurrency-mining malware, for instance, are capable of infecting devices to illicitly mine for cryptocurrency," Trend Micro researchers noted in the report. "Such malware can spread the same way other malware types spread, e.g., through spam emails and malicious URLs, and take advantage of the computing power of multiple devices to increase yield from mining."
Another threat comes through Remote Desktop Protocol (RDP) capabilities in devices, which hackers are using to carry out brute force logins of devices operating outside the office. RDP technology allows someone to take control of a device remotely. While it is meant to be used for maintenance and troubleshooting, hackers can also use RDP to execute malware that could eventually spread to enterprise networks; steal user details, and find out who has control of what devices. Those with more privileges may then be targeted for a wider network attack.
Source: Trend Micro. Network diagram above a tablet. |
In one real-word instance, an employee took his work laptop home, where his daughter used the device to check her email. One infected message that she opened contained Sircam, which infected the laptop and then the corporate network after the laptop was brought back to the office.
Luckily for the employee and the small business he worked for, the infection was spotted on the company network and systems were disconnected before it could spread further or damage machines. The instance did result in downtime for the company, during which the network had to be cleansed and employees were unable to access mission-critical assets.
Explore:
Read the blog post from Trend Micro, and check out Trend Micro's report