Logo of Abilene Advisors
Design in Switzerland
Free Trial
Book a call

How 4.2 Million Internet Hosts Were Hijacked: What You Need to Know

how-4-2-million-internet-hosts-were-hijacked-what-you-need-to-know

What happened?

Researchers have discovered vulnerabilities in four tunneling protocols that allowed attackers to hijack 4.2 million internet hosts, including VPN servers, home routers, and enterprise devices. These attacks target both corporate and home networks, letting cybercriminals abuse these devices as one-way proxies for anonymous attacks.

How do these attacks work?

Attackers exploit bugs in tunneling protocols to launch:

  • Denial-of-Service (DoS) attacks: Overloading systems to cause disruptions.
  • DNS spoofing: Redirecting users to malicious websites.
  • Unauthorized access: Gaining entry to private networks or IoT devices.
  • SYN floods: Sending a flood of TCP requests to crash systems.
  • These attacks can make malicious traffic appear legitimate by spoofing source addresses, bypassing basic defenses.

    Where are these attacks happening?

    Image representing Brazil, China, France, Japan, and the United States

    Most of these attacks have occurred in:

    This highlights how widespread and impactful these vulnerabilities are.

    What should you do to stay protected?

    Experts recommend taking these steps to safeguard your systems:

    1. Use trusted endpoints: Ensure tunneling traffic is only accepted from verified sources.
    2. Update software: Apply vendor patches for affected devices and services.
    3. Harden configurations: Secure your network with strict firewall rules and robust authentication checks.
    4. Disable unused services: Turn off tunneling services if you don’t need them.

    Why this matters for your supply chain and TPRM

    Supply chains and third-party relationships depend heavily on secure networks and devices. Vulnerabilities in tunneling protocols can expose businesses to risks, including:

    How TPRM can help mitigate these risks

    Supplier shield's dashboard showing the supplier's view of the complete chain in an easy and friendly UX

    By adopting a Third-Party Risk Management (TPRM) approach, businesses can:

    Take the next step with our TPRM services

    Our TPRM cloud-solution are designed to protect your supply chain by identifying and managing vendor risks. Whether it’s securing tunneling protocols or safeguarding IoT devices, we help you:

    The recent tunneling protocol vulnerabilities are a wake-up call for businesses relying on digital systems. By taking proactive steps to secure your network and embracing TPRM, you can stay ahead of threats while ensuring your supply chain remains robust and resilient.

    Menos Riesgos, Más Sonrisas

    ¿Sabías que, según Cybersecurity Ventures, se predice que el costo anual global del cibercrimen alcanzará $9.5 billones USD en 2024. (¡Ay!)

    Si deseas simplificar la Gestión de Riesgos de Terceros, haz clic aquí para una consulta gratuita.

    Reservar ahora
    window.lintrk('track', { conversion_id: 18991738 });

    Cumplimiento sin complejidad

    Cuando se trata de riesgo, la claridad y la simplicidad son importantes. Te proporcionamos las herramientas y la experiencia para mantenerte a la vanguardia, sin la frustración.
    Contáctanos
    Sin compromiso,
    sin complicaciones
    Empieza gratis. Creemos en ganarnos tu confianza. No forzarlo.
    Claras,
    perspectivas accionables
    Mantente preparado para auditorías de DORA, NIS2 y más
    Precios
    transparentes
    Sin tarifas ocultas, sin sorpresas.
    Contáctanos