Enterprise cybersecurity technology research that connects the dots.
Microsoft Issues Guidance for Protecting Network Gateways from Mozi IoT BotnetMicrosoft Issues Guidance for Protecting Network Gateways from Mozi IoT Botnet
The Mozi botnet now targets Netgear, Huawei, and ZTE network gateways, Microsoft found.
August 19, 2021
The Mozi peer-to-peer botnet best known for recruiting IoT devices to wage distributed denial-of-service (DDoS) attacks, data exfiltration, and payload execution, has grown up: it's now able to hijack network gateways for more powerful attacks, Microsoft researchers have found.
Microsoft today published a detailed how-to on defending against Mozi, which now targets Netgear, Huawei, and ZTE. Infecting these routers allows attackers to gain a stronghold in a victim's network.
"By infecting routers, they can perform man-in-the-middle (MITM) attacks—via HTTP hijacking and DNS spoofing—to compromise endpoints and deploy ransomware or cause safety incidents in OT facilities," Microsoft said in a blog post.
The devices should be patched and running up-to-date software, and employ strong passwords, the vendor said.
"Network gateways are a particularly juicy target for adversaries because they are ideal as initial access points to corporate networks. Adversaries can search the internet for vulnerable devices via scanning tools like Shodan, infect them, perform reconnaissance, and then move laterally to compromise higher value targets—including information systems and critical industrial control system (ICS) devices in the operational technology (OT) networks," the blog explains.
Read the full post here.
Read more about:Black Hat News
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023