• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Recycled Network Devices Exposing Corporate Secrets

You are here: Home / General Cyber Security News / Recycled Network Devices Exposing Corporate Secrets
April 20, 2023

In excess of fifty percent (56%) of company network products sold 2nd-hand continue to incorporate sensitive firm facts, in accordance to a new analyze from ESET.

The security vendor bought 16 recycled equipment routers and discovered that nine of them contained 1 or much more IPsec or VPN credentials, or hashed root passwords, as nicely as adequate data to establish the prior operator.

This details could theoretically allow risk actors who received maintain of the devices to get network entry to the corporation that recycled the router, ESET claimed.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Some of the analyzed routers also contained:

  • Client info
  • Credentials for connecting to other networks as a trusted party
  • Link aspects for specific apps
  • Router-to-router authentication keys

Much more specifically, the researchers uncovered the full maps of important nearby and cloud-dependent software platforms made use of by businesses that beforehand owned the routers. These ranged from company email to bodily developing security and enterprise programs.

ESET researchers were in a position to work out over which ports and from which hosts all those applications connect and theoretically could have probed for acknowledged vulnerabilities, the seller claimed.

In some cases they were being also ready to map network topology, such as the area of distant offices and operators, which could be utilized in subsequent exploitation attempts.

The end end result of this failure to adequately decommission was to expose quite a few of these corporations, their customers and associates to elevated cyber risk.

The routers were at first owned by mid-sized and world businesses functioning throughout many verticals, which includes datacenter vendors, legislation companies, tech suppliers, suppliers, innovative firms and software package developers.

Though some handled the event as a critical info breach, other individuals evidently failed to reply to ESET’s repeated tries to notify.

Exploration lead, Cameron Camp, explained the conclusions really should provide as a wake-up simply call, regardless of whether firms dispose of gadgets by themselves or agreement an e-squander corporation to do so.

“We would anticipate medium-sized to organization firms to have a demanding set of security initiatives to decommission devices, but we discovered the reverse,” he included.

“Organizations need to be much additional mindful of what stays on the gadgets they put out to pasture, due to the fact a majority of the equipment we obtained from the secondary marketplace contained a electronic blueprint of the corporation involved, which includes, but not constrained to, main networking details, application knowledge, company qualifications, and facts about partners, vendors and customers.”


Some pieces of this post are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News #CYBERUK23: Russian Cyber Offensive Exhibits ‘Unprecedented’ Speed and Agility
Next Post: NSO Group Used 3 Zero-Click iPhone Exploits Against Human Rights Defenders nso group used 3 zero click iphone exploits against human rights»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Microsoft Uncovers Banking AitM Phishing and BEC Attacks Targeting Financial Giants
  • University of Manchester Suffers Suspected Data Breach During Cyber Incident
  • Asylum Ambuscade: A Cybercrime Group with Espionage Ambitions
  • Barracuda Urges Swift Replacement of Vulnerable ESG Appliances
  • Google Launches Framework to Secure Generative AI
  • 5 Reasons Why Access Management is the Key to Securing the Modern Workplace
  • Security Experts Highlight Exploit for Patched Windows Flaw
  • Minecraft Users Warned of Malware Targeting Modpacks
  • Organizations Urged to Address Critical Vulnerabilities Found in First Half of 2023
  • Stealth Soldier: A New Custom Backdoor Targets North Africa with Espionage Attacks

Copyright © TheCyberSecurity.News, All Rights Reserved.