How 4.2 Million Internet Hosts Were Hijacked: What You Need to Know

how-4-2-million-internet-hosts-were-hijacked-what-you-need-to-know

What happened?

Researchers have discovered vulnerabilities in four tunneling protocols that allowed attackers to hijack 4.2 million internet hosts, including VPN servers, home routers, and enterprise devices. These attacks target both corporate and home networks, letting cybercriminals abuse these devices as one-way proxies for anonymous attacks.

How do these attacks work?

Attackers exploit bugs in tunneling protocols to launch:

  • Denial-of-Service (DoS) attacks: Overloading systems to cause disruptions.
  • DNS spoofing: Redirecting users to malicious websites.
  • Unauthorized access: Gaining entry to private networks or IoT devices.
  • SYN floods: Sending a flood of TCP requests to crash systems.
  • These attacks can make malicious traffic appear legitimate by spoofing source addresses, bypassing basic defenses.

    Where are these attacks happening?

    Image representing Brazil, China, France, Japan, and the United States

    Most of these attacks have occurred in:

    This highlights how widespread and impactful these vulnerabilities are.

    What should you do to stay protected?

    Experts recommend taking these steps to safeguard your systems:

    1. Use trusted endpoints: Ensure tunneling traffic is only accepted from verified sources.
    2. Update software: Apply vendor patches for affected devices and services.
    3. Harden configurations: Secure your network with strict firewall rules and robust authentication checks.
    4. Disable unused services: Turn off tunneling services if you don’t need them.

    Why this matters for your supply chain and TPRM

    Supply chains and third-party relationships depend heavily on secure networks and devices. Vulnerabilities in tunneling protocols can expose businesses to risks, including:

    How TPRM can help mitigate these risks

    Supplier shield's dashboard showing the supplier's view of the complete chain in an easy and friendly UX

    By adopting a Third-Party Risk Management (TPRM) approach, businesses can:

    Take the next step with our TPRM services

    Our TPRM cloud-solution are designed to protect your supply chain by identifying and managing vendor risks. Whether it’s securing tunneling protocols or safeguarding IoT devices, we help you:

    The recent tunneling protocol vulnerabilities are a wake-up call for businesses relying on digital systems. By taking proactive steps to secure your network and embracing TPRM, you can stay ahead of threats while ensuring your supply chain remains robust and resilient.

    If you want to simplify your Third Party Risk Management, click here for a free consultation.

    Book Now
    window.lintrk('track', { conversion_id: 18991738 });