Aussies targeted in router attacks
The Australian Cyber Security Centre (ACSC) has warned of a wave of attacks targeting Australian organisations through exposed internet-accessible routers and switches.
The attacks have targeted a number of Australian organisations with switches with Cisco Smart Install accessible over the internet, as well as routers and switches with the simple network management protocol (SNMP) enabled.
Cybercriminals are extracting configuration files from these routers and switches that may contain sensitive information including device administrative credentials, and could be used to compromise the router or switch and enable them to target other devices on the network.
The ACSC is calling on administrators of devices that can be directly managed from the internet to review logs for any suspicious activity, including SNMP queries from unexpected sources, configuration changes from external sources or configuration of unexpected generic routing encapsulation (GRE) tunnels for Cisco devices.
To mitigate the threat, the ACSC is recommending organisations disable SNMP read/write functionality and Cisco Smart Install if not strictly required and implement access control lists to restrict SNMP access to network management platforms.
The development follows Cisco’s disclosure in February that attackers are targeting organisations with Smart Install enabled. Cisco has replaced Smart Install with a new network plug-and-play feature in newer systems.
Why we need to redefine cybersecurity success to support CISOs
When Notifiable Data Breaches statistics are released we should look at the nature of the...
Is 2026 the year of identity? Just follow the money
What $40 billion in cyber acquisitions says about the future of identity security.
Proactive cybersecurity must lead innovation in Australia’s AI future
AI presents extraordinary opportunities for productivity, innovation and growth but it also...
