Currently, criminals are grabbing much more home routers than ever, as evidenced by a study of the antivirus manufacturer Trend Micro. Between September and December 2019, the number almost tenfold, namely from 23 to 249 million unauthorized login experiments. In the Marz of this year alone, the company registered almost 194 million such attacks. The security researchers ame that with the relocation of company data in home networks, such attacks are far more lucrative for criminals.
The current attack shaft apparently drove professionals to use Brute Force procedures script controlled to crack access data of various Internet-of-Things devices. Home routers are based on their central location in the network of victims in the visor of the attacker: The router is the first device of the home network, which is responsive from the Internet. He is also suitable as a bridge head for more attacks on IoT devices behind it. The aim of the attacker is to tap the equipment in a botnet to drove approximately DDOS attacks on company websites.
Firmware often outdated
That home routers are increasingly jerking into the focus of professional attackers, it could be due to the safety of such equipment persistently poorly ordered. For example, the Fraunhofer Institute for Communication, Information Processing and Ergonomics (FKIE) has knocked the firmware of 127 non-listed home routers of the manufacturer ASUS, AVM, D-Link, Linksys, Netgear, TP-Link and Zyxel on security joke. Huawei routers did not investigate the researchers because the manufacturer does not provide firmware files on their website. For the same reason, Fraunhofer has not considered the widespread provider routers.