
ISC StormCast for Wednesday, April 19th, 2023
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
00:00
How to Protect Your Routers From Threat Attacks
Once the threat actor has access to an affected router, they will then use the usual tools like TFTP in order to either exfiltrate files or or also install additional malware on the system. ESET published a brief paper looking at I think about 18 routers they bought of eBay. These are more professional routers, things like Juniper, FortiGate and the like. In about half of these routers they found, for example, still valid credentials. They also found VPN configurations and other network configuration details which if they haven't changed since then could now be used to access these exact networks.
Transcript
Play full episode