• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Recycled Network Devices Exposing Corporate Secrets

You are here: Home / Cyber Security News / Recycled Network Devices Exposing Corporate Secrets

About 50 % (56%) of corporate network equipment marketed next-hand nonetheless have delicate business information, according to a new research from ESET.

The security vendor bought 16 recycled gadgets routers and observed that nine of them contained a single or far more IPsec or VPN qualifications, or hashed root passwords, as very well as ample facts to detect the prior owner.

This data could theoretically allow risk actors who got maintain of the products to achieve network accessibility to the business that recycled the router, ESET claimed.

Some of the analyzed routers also contained:

  • Consumer info
  • Qualifications for connecting to other networks as a dependable social gathering
  • Relationship details for precise programs
  • Router-to-router authentication keys

More specially, the scientists located the full maps of key regional and cloud-dependent software platforms applied by organizations that formerly owned the routers. These ranged from corporate email to physical building security and business enterprise apps.

ESET researchers were being in a position to get the job done out over which ports and from which hosts those applications talk and theoretically could have probed for acknowledged vulnerabilities, the vendor claimed.

In some cases they have been also ready to map network topology, which includes the spot of remote offices and operators, which could be utilized in subsequent exploitation endeavours.

The close final result of this failure to thoroughly decommission was to expose several of these corporations, their shoppers and companions to elevated cyber risk.

The routers were being at first owned by mid-sized and world companies running throughout multiple verticals, which include datacenter companies, law corporations, tech sellers, suppliers, imaginative firms and program builders.

Despite the fact that some taken care of the party as a severe details breach, many others apparently unsuccessful to reply to ESET’s recurring attempts to notify.

Exploration lead, Cameron Camp, stated the findings must serve as a wake-up simply call, irrespective of whether companies dispose of devices them selves or contract an e-squander business to do so.

“We would expect medium-sized to enterprise companies to have a demanding set of security initiatives to decommission devices, but we located the opposite,” he added.

“Organizations need to be much extra mindful of what remains on the equipment they place out to pasture, given that a the vast majority of the gadgets we received from the secondary sector contained a digital blueprint of the enterprise associated, including, but not restricted to, core networking data, software facts, company credentials, and info about partners, vendors and shoppers.”

Some parts of this article are sourced from:
www.infosecurity-magazine.com

Previous Post: « Raspberry Robin Adopts Unique Evasion Techniques
Next Post: NSO Group Used 3 Zero-Click iPhone Exploits Against Human Rights Defenders »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware
  • Anatsa Android Banking Trojan Hits 90,000 Users with Fake PDF App on Google Play
  • Malicious Pull Request Infects 6,000+ Developers via Vulnerable Ethcode VS Code Extension
  • 5 Ways Identity-based Attacks Are Breaching Retail
  • RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS Attacks

Copyright © 2025 · AllTech.News, All Rights Reserved.