Aussies targeted in router attacks
The Australian Cyber Security Centre (ACSC) has warned of a wave of attacks targeting Australian organisations through exposed internet-accessible routers and switches.
The attacks have targeted a number of Australian organisations with switches with Cisco Smart Install accessible over the internet, as well as routers and switches with the simple network management protocol (SNMP) enabled.
Cybercriminals are extracting configuration files from these routers and switches that may contain sensitive information including device administrative credentials, and could be used to compromise the router or switch and enable them to target other devices on the network.
The ACSC is calling on administrators of devices that can be directly managed from the internet to review logs for any suspicious activity, including SNMP queries from unexpected sources, configuration changes from external sources or configuration of unexpected generic routing encapsulation (GRE) tunnels for Cisco devices.
To mitigate the threat, the ACSC is recommending organisations disable SNMP read/write functionality and Cisco Smart Install if not strictly required and implement access control lists to restrict SNMP access to network management platforms.
The development follows Cisco’s disclosure in February that attackers are targeting organisations with Smart Install enabled. Cisco has replaced Smart Install with a new network plug-and-play feature in newer systems.
Lessons from the Land Rover cyber attack: seeing risk before it strikes
The recent Jaguar Land Rover cyber attack saga is a stark demonstration of what happens when...
Why AI agents are a new insider threat for business
AI-powered insiders are non-human actors operating within the perimeter, inheriting trusted...
Securing SMB organisations: closing the cyber gap through culture
Limited budgets and resources mean SMBs cannot financially prioritise cybersecurity as much as...
