{"id":25585,"date":"2020-11-05T09:15:40","date_gmt":"2020-11-05T12:15:40","guid":{"rendered":"https:\/\/abes.org.br\/?p=25585"},"modified":"2020-11-04T22:42:31","modified_gmt":"2020-11-05T01:42:31","slug":"estudo-da-trend-micro-aponta-disputa-cibercriminosa-de-botnet-por-roteadores-domesticos","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/estudo-da-trend-micro-aponta-disputa-cibercriminosa-de-botnet-por-roteadores-domesticos\/","title":{"rendered":"Trend Micro study points to cybercriminal botnet dispute over home routers"},"content":{"rendered":"<p><em>Report points out that there has been a recent growth in attacks focused on these devices, especially in the fourth quarter of 2019<\/em><em>\u00a0<\/em><\/p>\n<p>Trend Micro, a global cybersecurity benchmark, released a survey warning consumers of a new wave of attacks that seek to compromise home routers on their private networks for the use of Internet of Things (IoT) botnets. The report encourages users to take steps to prevent devices from allowing such criminal activity.<\/p>\n<p>Botnets are networks of terminals that receive commands from hackers, ranging from computers and cell phones to IoT devices, for malicious purposes. There has been a recent growth in attacks focused on routers, especially in the fourth quarter of 2019. This research indicates that the increased abuse of these devices will continue, as attackers are able to easily monetize these infections in secondary attacks.<\/p>\n<p>&quot;With the majority of the population currently relying on home networks to do their jobs and studies, what is happening to their router has never been more important,&quot; says Jon Clay, director of global threat communications at Trend Micro. \u201cCybercriminals know that most home routers are not secure with standard credentials and have intensified attacks on a large scale. For the home user, this means hijacking their internet bandwidth and slowing down the network speed. And for companies targeting secondary attacks, these botnets can bring down a website, as we saw in previous high-profile attacks. \u201d<\/p>\n<p>Trend Micro&#039;s research revealed an increase from October 2019 in crude log-in attempts against routers, where attackers use automated software to try common password combinations. The number of attempts has increased almost tenfold, from about 23 million in September to almost 249 million in December 2019. In March 2020, Trend Micro recorded nearly 194 million brute force logins.<\/p>\n<p><strong>IoT and botnet<\/strong><\/p>\n<p>Another indicator that shows the increase in the threat scale is the number of attempts by devices to open telnet sessions (network protocol on the Internet or local networks to provide a facility for communication) with other IoT devices. Since telnet is not encrypted, it is favored by attackers - or their botnets - as a way of searching for the user&#039;s credentials. At its peak in mid-March this year, some 16,000 devices attempted to open telnet sessions with other IoT devices in a single week.<\/p>\n<p>This trend is worrying for several reasons. Cybercriminals are competing with each other to compromise as many routers as possible so that they can be turned into botnets. These are then sold on underground websites to launch Distributed Denial of Service (DDoS) attacks, or as a way to anonymize other attacks, such as click fraud, data theft and account acquisition.<\/p>\n<p>As explained in the report, there is a thriving illegal market for botnet malware and\u00a0<em>botnets-for-hire<\/em>. Although any IoT device can be compromised and transformed into a botnet, routers are of particular interest because they are easily accessible and directly connected to the internet.<\/p>\n<p>Trend Micro makes the following recommendations for home users:<\/p>\n<ul>\n<li>Make sure to use a strong password. Change it from time to time<\/li>\n<li>Check that the router is running the latest firmware<\/li>\n<li>Check the logs to find behaviors that don&#039;t make sense to the network<\/li>\n<li>Only allow logins to the router from the local network<\/li>\n<\/ul>\n<p>To access the full report, go to:\u00a0<a href=\"http:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/caught-in-the-crossfire-defending-devices-from-battling-botnets\">http:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/caught-in-the-crossfire-defending-devices-from-battling-botnets<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Relat\u00f3rio aponta que houve um crescimento recente nos ataques focados nesses dispositivos, especialmente no quarto trimestre de 2019\u00a0 A Trend Micro, refer\u00eancia global em ciberseguran\u00e7a, divulgou uma pesquisa alertando os consumidores sobre uma nova onda de ataques que buscam comprometer os roteadores dom\u00e9sticos de suas redes particulares para o uso de botnets de Internet das [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[246,108,244,245],"class_list":["post-25585","post","type-post","status-publish","format-standard","hentry","category-coluna-4","category-ultimas-noticias","tag-ataques-ciberneticos","tag-ciberseguranca","tag-dispositivos-iot","tag-malware-botnet"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Estudo da Trend Micro aponta disputa cibercriminosa de botnet por roteadores dom\u00e9sticos - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/estudo-da-trend-micro-aponta-disputa-cibercriminosa-de-botnet-por-roteadores-domesticos\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Estudo da Trend Micro aponta disputa cibercriminosa de botnet por roteadores dom\u00e9sticos - ABES\" \/>\n<meta property=\"og:description\" content=\"Relat\u00f3rio aponta que houve um crescimento recente nos ataques focados nesses dispositivos, especialmente no quarto trimestre de 2019\u00a0 A Trend Micro, refer\u00eancia global em ciberseguran\u00e7a, divulgou uma pesquisa alertando os consumidores sobre uma nova onda de ataques que buscam comprometer os roteadores dom\u00e9sticos de suas redes particulares para o uso de botnets de Internet das [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/estudo-da-trend-micro-aponta-disputa-cibercriminosa-de-botnet-por-roteadores-domesticos\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-05T12:15:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/01\/logo_abes_marca_tagline_horizontal_colorido_rgb.png\" \/>\n\t<meta property=\"og:image:width\" content=\"3509\" \/>\n\t<meta property=\"og:image:height\" content=\"2482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/estudo-da-trend-micro-aponta-disputa-cibercriminosa-de-botnet-por-roteadores-domesticos\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/estudo-da-trend-micro-aponta-disputa-cibercriminosa-de-botnet-por-roteadores-domesticos\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\"},\"headline\":\"Estudo da Trend Micro aponta disputa cibercriminosa de botnet por roteadores dom\u00e9sticos\",\"datePublished\":\"2020-11-05T12:15:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/estudo-da-trend-micro-aponta-disputa-cibercriminosa-de-botnet-por-roteadores-domesticos\\\/\"},\"wordCount\":639,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"keywords\":[\"ataques cibern\u00e9ticos\",\"ciberseguran\u00e7a\",\"Dispositivos IoT\",\"malware botnet\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/estudo-da-trend-micro-aponta-disputa-cibercriminosa-de-botnet-por-roteadores-domesticos\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/estudo-da-trend-micro-aponta-disputa-cibercriminosa-de-botnet-por-roteadores-domesticos\\\/\",\"name\":\"Estudo da Trend Micro aponta disputa cibercriminosa de botnet por roteadores dom\u00e9sticos - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"datePublished\":\"2020-11-05T12:15:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/estudo-da-trend-micro-aponta-disputa-cibercriminosa-de-botnet-por-roteadores-domesticos\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/en\\\/estudo-da-trend-micro-aponta-disputa-cibercriminosa-de-botnet-por-roteadores-domesticos\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/en\\\/estudo-da-trend-micro-aponta-disputa-cibercriminosa-de-botnet-por-roteadores-domesticos\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Estudo da Trend Micro aponta disputa cibercriminosa de botnet por roteadores dom\u00e9sticos\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Estudo da Trend Micro aponta disputa cibercriminosa de botnet por roteadores dom\u00e9sticos - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/estudo-da-trend-micro-aponta-disputa-cibercriminosa-de-botnet-por-roteadores-domesticos\/","og_locale":"en_US","og_type":"article","og_title":"Estudo da Trend Micro aponta disputa cibercriminosa de botnet por roteadores dom\u00e9sticos - ABES","og_description":"Relat\u00f3rio aponta que houve um crescimento recente nos ataques focados nesses dispositivos, especialmente no quarto trimestre de 2019\u00a0 A Trend Micro, refer\u00eancia global em ciberseguran\u00e7a, divulgou uma pesquisa alertando os consumidores sobre uma nova onda de ataques que buscam comprometer os roteadores dom\u00e9sticos de suas redes particulares para o uso de botnets de Internet das [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/estudo-da-trend-micro-aponta-disputa-cibercriminosa-de-botnet-por-roteadores-domesticos\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2020-11-05T12:15:40+00:00","og_image":[{"width":3509,"height":2482,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/01\/logo_abes_marca_tagline_horizontal_colorido_rgb.png","type":"image\/png"}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/en\/estudo-da-trend-micro-aponta-disputa-cibercriminosa-de-botnet-por-roteadores-domesticos\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/en\/estudo-da-trend-micro-aponta-disputa-cibercriminosa-de-botnet-por-roteadores-domesticos\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3"},"headline":"Estudo da Trend Micro aponta disputa cibercriminosa de botnet por roteadores dom\u00e9sticos","datePublished":"2020-11-05T12:15:40+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/en\/estudo-da-trend-micro-aponta-disputa-cibercriminosa-de-botnet-por-roteadores-domesticos\/"},"wordCount":639,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"keywords":["ataques cibern\u00e9ticos","ciberseguran\u00e7a","Dispositivos IoT","malware botnet"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/en\/estudo-da-trend-micro-aponta-disputa-cibercriminosa-de-botnet-por-roteadores-domesticos\/","url":"https:\/\/abes.org.br\/en\/estudo-da-trend-micro-aponta-disputa-cibercriminosa-de-botnet-por-roteadores-domesticos\/","name":"Estudo da Trend Micro aponta disputa cibercriminosa de botnet por roteadores dom\u00e9sticos - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"datePublished":"2020-11-05T12:15:40+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/en\/estudo-da-trend-micro-aponta-disputa-cibercriminosa-de-botnet-por-roteadores-domesticos\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/en\/estudo-da-trend-micro-aponta-disputa-cibercriminosa-de-botnet-por-roteadores-domesticos\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/en\/estudo-da-trend-micro-aponta-disputa-cibercriminosa-de-botnet-por-roteadores-domesticos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Estudo da Trend Micro aponta disputa cibercriminosa de botnet por roteadores dom\u00e9sticos"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-19 18:14:05","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/25585","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=25585"}],"version-history":[{"count":1,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/25585\/revisions"}],"predecessor-version":[{"id":25586,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/25585\/revisions\/25586"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=25585"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=25585"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=25585"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}