HomeCyber BalkansHackers are taking advantage of router vulnerabilities to launch continuous attacks on...

Hackers are taking advantage of router vulnerabilities to launch continuous attacks on enterprise networks

Published on

spot_img

Enterprises are finding themselves in the crosshairs of increasingly sophisticated cyber threats, with attackers now setting their sights on network infrastructure, particularly routers. This shift in focus is in line with the findings of Forescout Research Vedere Labs’ 2025 report on the riskiest connected devices, which points to a growing trend of cyber adversaries targeting routers as their primary entry point for attacks.

The report reveals a significant change in the cybersecurity landscape, with routers overtaking traditional endpoints as the most sought-after target for cyberattacks. This change is driven by the inherent vulnerability of routers located at network perimeters and the presence of high-severity vulnerabilities that are being exploited at an alarming rate through large-scale campaigns.

This year’s report sheds light on a troubling increase in risk, with 12 new device types making their debut on the list of the most vulnerable devices. Among these are Application Delivery Controllers (ADCs), firewalls, and IPMI devices, all of which play crucial roles in network management but are riddled with vulnerabilities, some of which have already been exploited by malicious actors.

Routers, in particular, have emerged as the most vulnerable devices, accounting for over 50% of devices with critical vulnerabilities. This makes them prime targets for exploitation, with cyberattacks often starting at these entry points before spreading throughout the enterprise network. The retail sector has been identified as having the riskiest devices on average, followed closely by financial services, government, healthcare, and manufacturing.

One concerning trend highlighted in the report is the increasing use of legacy Windows versions, especially in government and healthcare sectors, which continues to pose significant risks. Additionally, there has been a surge in the use of unencrypted Telnet over more secure protocols like SSH, particularly within government networks. This shift towards less secure protocol usage is alarming as it exposes devices to a higher risk of unauthorized access.

To address these emerging threats, security professionals are urged to adopt a comprehensive security strategy that covers all types of devices, including IT, IoT, OT, and IoMT devices. The report emphasizes the importance of not only identifying vulnerabilities but also actively managing and mitigating risks across diverse device ecosystems. Traditional endpoint-focused security measures are no longer adequate, and there is a need for comprehensive, automated security controls that do not rely solely on endpoint agents.

As the cyberattack landscape continues to evolve, the focus on network equipment, especially routers, as entry points for attacks underscores the urgent need for enterprises to bolster their security measures at the network level. Continuous vigilance and adaptive security frameworks are essential in effectively countering these evolving threats and ensuring the resilience of enterprise networks against malicious actors.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...