• Home
  • Managed Security
    • Managed Security
    • Managed Detection and Response
    • Security as a Service
  • Services
    • Cyber Risk and Technical Assurance
      • Segmentation and Zero Trust
      • Penetration Testing
      • Infrastructure security assessment
      • Secure Architecture Development
  • About Us
  • Resources
    • Cyber Security Blog
    • Case Studies
    • Cyber Security FAQs
  • Contact Us
  • Menu Menu

Own the Router Own the Traffic – Australian firms targeted by Russian state hackers

Assessment and Insights, Cube News, Enterprise, Industry

 

How resilient is your network security? Following recent tensions between Russia and a number of NATO member countries, Russian state-sponsored cyber actors have begun targeting network infrastructure devices belonging to governments and organisations of countries such as the US, UK and Australia.

The U.K. and the U.S. have blamed Russian hackers for a campaign aimed at taking control of routers inside government, critical infrastructure, internet service providers and within small and home offices. The warning came in a joint announcement from British intelligence, the National Security Council (NSC), the DHS and the FBI.

Specifically, these attacks are targeting devices such as Wide Area Network (WAN) routers that tend to reside on the external or outside of firewalls.

But how? In order to infiltrate these devices, hackers are using compromised routers to conduct spoofing (i.e., man-in-the-middle) activity to support espionage, extract intellectual property, maintain persistent access to victim networks, and potentially lay a foundation for future offensive operations.

So, if such major organisations are being proven to be vulnerable, this then raises the question ‘how can I ensure my small-scale business data is protected?’ To answer this question, let’s first take a look at some common network security vulnerabilities.

Network vulnerabilities

Network devices such as external routers are easy targets, so if not correctly secured and hardened, they can provide attackers with an excellent point at which they can access your data. Once installed, many network devices are not maintained at the same security level as other general-purpose desktops and servers. In addition to this, the following factors can also contribute to the vulnerability of network devices:

  • Few network devices-especially SOHO and residential-class routers are subject to the same level of integrity-maintenance as devices located at head-office, these maintenance activities would include regular patching and software updates.
  • Manufacturers build and distribute these network devices with exploitable services, which are enabled for ease of installation, operation, and maintenance.
  • Owners and operators of network devices do not change vendor default settings or security harden them for operations.
  • ISPs do not replace equipment on a customer’s property when that equipment is no longer supported by the manufacturer or vendor.
  • Owners and operators often overlook network devices when they investigate, examine for intruders, and restore general-purpose hosts after cyber intrusions.

So how can you protect your business?

Protecting your business from hackers and malicious attacks don’t need to be stressful or even costly. In order to protect your data and safeguard your networks, our team recommend some general mitigation techniques that can be employed to ensure your external devices such as Internet routers are correctly hardened and not an easy target.

  • Do not allow unencrypted plaintext management protocols (e.g. Telnet) to enter an organization from the Internet. When encrypted protocols such as SSH, HTTPS, or TLS are not possible, management activities from outside the organization should be done through an encrypted Virtual Private Network (VPN) where both ends are mutually authenticated.
  • Do not allow Internet access to the management interface of any network device. The best practice is to block Internet-sourced access to the device management interface and restrict device management to an internal trusted and whitelisted host or LAN. If access to the management interface cannot be restricted to an internal trusted network, restrict remote management access via encrypted VPN capability where both ends are mutually authenticated. Whitelist the network or host from which the VPN connection is allowed and deny all others.
  • Disable legacy unencrypted protocols such as Telnet and SNMPv1 or v2c. Where possible, use modern encrypted protocols such as SSHv2 and SNMPv3. Harden the encrypted protocols based on current best security practice. Where possible, replace legacy devices that cannot be configured to use modern protocols.
  • Immediately change default passwords and enforce a strong password policy. Do not reuse the same password across multiple devices. Where possible, avoid legacy password-based authentication, and implement two-factor authentication based on public-private keys.

As an initial step, the team at Cube Cyber can remotely scan your external network infrastructure to ensure a basic level of security is in place and insecure protocols and services are identified where in use. We will also recommend ways to secure and harden your external infrastructure to ensure your business assets are protected and your peace of mind restored.

For more information about securing your network to mitigate risk and prevent data breaches, have a chat with the experts at Cube Cyber today on 1300 085 366 or online via this link.

May 10, 2018/by CubeCyber Team
https://cubecyber.com/wp-content/uploads/2018/05/route-traffic.jpg 400 744 CubeCyber Team http://cubecyber.com/wp-content/uploads/2023/01/cubecyberlogo-top.svg CubeCyber Team2018-05-10 00:40:402022-11-24 11:22:40Own the Router Own the Traffic – Australian firms targeted by Russian state hackers

Cisco Advanced Security Architecture Partner

Advanced Development Capability, Assessment and Insights, Expert Advice, Managed Protection

How safe is your business data? With the rapid and continuing increase in digital transformation, the ways in which we need to protect our information assets has seen an undeniable shift. Although we’re all aware of this change, implementing strategies to safeguard digital assets is complex and requires more than simply purchasing the latest security widget or application. To really ensure the safety of your important data and business reputation, you’ll generally need the assistance of a highly qualified team of professionals with the knowledge and expertise to ensure every aspect of your business is protected, to implement risk mitigation techniques and to provide solid rectification processes should your cybersecurity be threatened. But how do you know which cybersecurity provider to trust? The short answer: find one that is certified.

What is the Cisco Advanced Architecture Specialisation Program?

The Cisco Advanced Architecture Specialisation program identifies highly specialised partners that can work with customers to design and implement Cisco most advanced technology solutions.

The Cisco Advanced Security Architecture Specialisation acknowledges organisations who have achieved comprehensive and specialised knowledge providing solutions used to detect and mitigate cyber security threats. Continually setting the industry standard for cybersecurity, Cisco provides partners with comprehensive training and upskilling required to enhance sales, design and technical knowledge in addition to validation of this knowledge through annual recertification and arbitrary auditing.

 

Why should you choose a certified cyber security provider?

When installing complex business security systems, design, deployment and maintenance must be completed with absolute precision to ensure seamless integration with your environment, which is why using a certified partner is so essential.

As all partners are required to undergo rigorous training and strict assessment in order to obtain their certification, and are required to re-certify on a yearly basis, you can be confident that they have the most advanced skills and knowledge to deploy and manage Cisco’s industry-leading systems.

Moreover, through undertaking continuous retraining and upskilling, Cisco’s partners are always at the forefront of systems and technological advances. For this reason, Cisco partners are better equipped to provide customised cybersecurity solutions to align with technical and other business requirements.

For many businesses, having an in-house IT team isn’t feasible for many reasons ranging from practicality to affordability and beyond. Engaging an outsourced Cisco partner allows you to be confident that you’ll receive the most up-to-date advice and support by an industry leading professional.

Cisco Australia’s Cyber Security Partner Specialist, Anthony Miller said “In today’s world where cyber threats can go undetected in a customer network for over 100 days, it is vital that organisations use specialised Partners such as Cube Cyber who have undergone significant training around Cisco’s security solutions. These partners bring unique abilities to be able to build out security solutions that leverage the integrations Cisco has built throughout our product set. In addition, leveraging Cisco’s Threat Research arm (TALOS) who has over 250 threat researchers and blocking 20 billion threats daily, TALOS is the co-ordination point for all Cisco’s Security Products. Cisco’s TALOS provides you access to the richest set of threat intelligence in the world. So, if we see something malicious anywhere in the world, we can block everywhere – see once, block everywhere.”

 

What should you expect from a cybersecurity provider?

When approaching cybersecurity providers, you want to ensure they’re equipped to provide and maintain the best possible solution for your individual business needs. As such, you should expect your potential provider to have a strong reputation in the industry paired with a multitude of experience in design, implementation and support of security systems that safeguard business information and reputation. To achieve this, they should be able to demonstrate a blended technology portfolio that utilises products and systems from industry leading security providers.

Cube Cyber

Through rigorous training and certification, Cube Cyber has attained the status of Advanced Security Architecture Specialisation from Cisco. This specialisation identifies Cube Cyber as having satisfied Cisco’s stringent requirements to design, sell and deploy complex Cisco security solutions. Through achieving such a high level of certification, Cube Cyber has demonstrated our ability to deliver sophisticated solutions through superior sales capabilities, technological knowledge and service offerings. Our portfolio of previous works demonstrates our superior expertise and proven track record on complex cybersecurity projects whilst always maintaining a best-for-business attitude. Our clients depend on our team to understand their individual challenges and provide recommendations for the most appropriate and secure cybersecurity solutions for their unique needs.

Cube Cyber Cisco Specialisations

Through attaining a Cisco Advanced Security Architecture partner status, Cube Cyber are certified to deliver the following products and services from Cisco:

Advanced Malware Protection (AMP)

Endpoint Security & VPN Security Clients

Network Visibility and Enforcement using Identity Services Engine

Next Generation Firewalls

Next Generation Intrusion Detection and Prevention Systems

Cloud Security, Web Security & Email Security

Security Management

 

Don’t leave your data security to chance! If you’re ready to take control of your vital business information, get in touch with the experts at Cube Cyber and organise your complimentary cybersecurity assessment today on 1300 085 366.

 

April 11, 2018/by CubeCyber Team
https://cubecyber.com/wp-content/uploads/2018/04/Cisco.jpg 400 744 CubeCyber Team http://cubecyber.com/wp-content/uploads/2023/01/cubecyberlogo-top.svg CubeCyber Team2018-04-11 09:00:472022-11-24 11:23:13Cisco Advanced Security Architecture Partner

Quick Search

Latest Insights

  • SASE – Secure Access Service Edge: A Simple OverviewApril 21, 2022 - 11:01 pm

    Over the past couple of years businesses and corporations have had to quickly adjust to a significant increase in employees working from home. With increasing data coming from online sources into corporate networks, more SaaS apps being adopted and new types of traffic taking up increasing bandwidth (videos, collaboration, and shared editing of online documents), […]

  • Beginners Guide to Cloud Computing & How it Can Help Small BusinessesMay 13, 2021 - 5:16 am

    With more businesses working from home, it may be time to invest in cloud computing for your company. In fact, it is more than likely you are already using some form of cloud computing. If you have ever used Dropbox or Google Docs, as two examples, then you are already familiar with working from cloud-based […]

  • Top 7 Cyber Attacks Threatening SME’s (and how to prevent them)May 13, 2021 - 5:14 am

    Small and medium sized enterprises (SME’s) frequently underestimate the need for cyber security protection. This miscalculation could end up being a risky strategy for those not willing to invest in the best preventative measures for their business. Just because an enterprise is small, does not mean it is not at risk from the top cyber […]

  • GDPR Cyber Security and How It Might Impact Your BusinessMarch 2, 2021 - 11:45 am

    The European Union’s General Data Protection Regulation (GDPR), came into effect back in May 2018, but what does that mean for Australian businesses and cyber security? What is GDPR? First of all, what actually is GDPR? The GDPR is short for General Data Protection Regulation. It was brought in by the European Union on 25th […]

  • How to Prepare A Cyber Defence Plan for Your EnterpriseFebruary 12, 2021 - 4:56 am

    No business, small or large is not at risk from a cyber attack. From small businesses to huge government organisations, all companies must ensure they have an excellent cyber defence plan in place. Planning what to do in a cyber attack is just as important as managing active preventative measures. Many smaller enterprises do not […]

  • Cyber Security Australia: Increasing Attacks on BusinessesFebruary 12, 2021 - 3:21 am

    Cyber security in Australia is an essential tool to protect businesses both large and small, from advancing cyber crime threats. In this current environment it is vital that no matter the size of the company, everyone is doing what they can to stay secure online. In the past, businesses only had to really worry about […]

  • Cyber Security Risk: What would it cost if your company could not work for one day?February 12, 2021 - 2:56 am

    Cyber security risk is a problem all companies face, from large corporations to small, independent businesses. But cyber security is much more than a simple IT issue, it can have a huge impact on your revenue…and reputation. Have you ever thought about what you could lose if your business were to go offline from a […]

Choose Category

  • Advanced Development Capability
  • Assessment and Insights
  • Case Studies
  • Cloud Services
  • Cube News
  • Cyber Attacks
  • Cyber Crime Australia
  • Enterprise
  • Expert Advice
  • Incident Response
  • Industry
  • Internet of Things
  • Large Corporation
  • Managed Protection
  • Operational Technology
  • Remote Working
  • SME's
  • Threat Protection
  • Vulnerability Assessments

Tag Cloud

Cloud Computing Cyber Tips Data Breach emergency plan GDPR Hackers Malware News Office 365 Phishing Attacks Ransomware

Wondering how much our solutions cost?

GET A FREE QUOTE

Not sure yet? Get a Free Trial now.

GET A FREE TRIAL

ABOUT CUBE CYBER

About Us
Contact Us

CALL 1300 085 366

SERVICES

Cyber Risk & Technical Assurance
Segmentation and Zero Trust
Penetration Testing
Infrastructure security assessment
Secure Architecture Development

MANAGED SECURITY

Managed Security
Managed Detection & Response
Security-as-a-Service

RESOURCES

Cyber Security Blog
Case Studies
Cyber Security FAQs

ISO 27001 CERTIFIED

© CubeCyber 2023. All Right Reserved | Designed & Developed by Escope

Scroll to top

We use cookies to make your experience of our websites better. By using and further navigating this website you accept this.

Accept & Close

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

Other external services

We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Google reCaptcha Settings:

Vimeo and Youtube video embeds:

Privacy Policy

You can read about our cookies and privacy settings in detail on our Privacy Policy Page.

Privacy Policy