BotenaGo Botnet Highlights Wider Gap In Cybersecurity Preparedness

BACKGROUND:

Earlier this week, researchers at AT&T Labs revealed the BotenaGo, a botnet with the potential to infect millions of routers and IoT devices. The research team at AirEye, the industry’s leading network airspace protection company, immediately recognized this as an example of “Antenna for Hire.” 

Subscribe
Notify of
guest

1 Expert Comment
Most Voted
Newest Oldest
Inline Feedbacks
View all comments
Amichai Shulman
Amichai Shulman , CTO and Cofounder
InfoSec Expert
November 19, 2021 1:28 pm

<p>With this type of botnet at hand we can definitely expect to see expansion from one Wi-Fi network to a nearby Wi-Fi network through the air. An attacker wanting to conduct a wireless attack against any company can now hire one of these compromised devices in the proximity of the target company. Not only does this allow them to bypass firewalls, NAC, and ZTNA segmentation protocols, but it removes the need to actively find and compromise an Antenna for Hire, allowing them to focus their efforts and resources on the other aspects of their attack. </p>
<p><br />Comprehensive Network Airspace Control and Protection (NACP) blocks any interaction between an Antenna for Hire and a Wireless Receptor within the organization, ultimately protecting against such a wireless attack scenario. In fact, NACP is the only type of technology that 1) can protect against such wireless attacks; and 2) is able to \"tell the story\" of such an attack, including pinpointing the Wireless Receptor that the attackers would have attempted to use as a bridge into the corporate network.</p>

Last edited 10 months ago by Amichai Shulman
Information Security Buzz
1
0
Would love your thoughts, please comment.x
()
x