I ricercatori di Check Point hanno scoperto a harmful firmware che infecta i router TP-Link, Realizzato da un gruppo di attacco legato allo Stato cinese. The attack, called “Horse Shell”, grants the attacker persistent access to the router, allowing the user to control it remotely and from the data.

I ricercatori ritegono che gli aggressori siano riusciti a infettare i router sfruttando vulnerabilità note. One volta infettato, the router scaricava il firmware harmful dal server di commando e controllo degli aggressori. The firmware verrebbe quindi installed on your router, substituting what is legitimate.

Quello di Horse Shell is a modular building, which means that it can be personalized for Please select the specific one degli aggressori. The impianto includes a series of functions that are agreed to by the attackers of remote control of the router, such as:

  • eseguire command arbitration sul router
  • I will transfer file
  • I will use the router as a proxy to inoltrare the traffic

The last data is forse what is very interesting: i router colpiti non vengono infettati perché sono un bersaglio directto, ma piuttosto per ventare nodi di una rete di attackco più grande. Horse Shell, ritengono i ricercatori, potrebbe essere utilizzato per rubare dati, durre sorveglianza o lanciare attacchi denial-of-service.

Infine, it’s worth sottolineare che per il modo in cui è escritto, lo stesso codice si potrebbe modificare easily anche per colpire route of the other marches. Fortunately, if there are some possibilities to check to increase the security, for example:

  • I will keep the firmware of the router updated
  • I will use a complex password for the router
  • Disable remote management functions if not necessary
  • (for offices, SOHO and PMI) I will install a firewall on the router
  • (for offices, SOHO and PMI) I will use a security solution to the degree of blocking harmful traffic.

The scoperta dell’impianto Horse Shell is a memory of it minaccia semper presente dei cyberattacchi. It is important that all are aware of the risks and that they provide protection to protect their own devices and their own possessions. Following the raccomandazioni di cui sopra, I will be able to contribute to maintaining and your devices safe from the attacks.

California18

Welcome to California18, your number one source for Breaking News from the World. We’re dedicated to giving you the very best of News.

Leave a Reply