Connect with us

GRBusiness

Preventing your network from becoming a Botnet

Published

on

Not having sufficient network protection may allow your organization’s devices to be part of the next cyber-attack explains Harish Chib, vice president, Middle East & Africa, Sopho

Botnets are large volumes of distributed networked computers and devices that have been taken over by a cybercriminal. Botnets, also referred to as bots, are usually taken over by malicious software to enable remote control by a threat actor.

They are set up and developed by a hacker to provide a powerful and dark, cloud computing network to conduct cyberattacks of a criminal nature.

The growth in mobile and network devices has created large scale social and productivity benefits for us. We can now remotely access computers, security systems, cameras, appliances, and a growing list of devices, interconnected with cloud. Collectively this is referred to as the Internet of Things or IoT.

A worrying aspect of the growth of Internet-connected devices is the absence of basic security precautions. Most end users rarely change factory defaults, which can be exploited by hackers to take control of the devices.

Another door for cybercriminals to take control of connected devices is called the back-door entry. This is a manufacturer’s access to the device through an undisclosed connection, used for remote testing and updates.

This large distributed, network of computers, under the control of threat actors, represents an aggregation of computing power that can be used for a devastating effect.

Inside the network

Malicious software designed to exploit IoT devices are usually not sophisticated. They operate by scanning network ports, looking for access opportunities, and gaining access through default credentials, or brute-force hacking to gain access.

This software is much easier to defend against, as it merely requires configuring the network firewall protection devices.

Similar to other malware, botnets can enter an organization through multiple points of entry. This includes email attachments, hacked web sites, connected sensors and other IoT devices, and USB sticks.

Once a malicious software has entered an organization, it will call home – the hackers command and control server – to register its success in gaining entry and to request further instructions.

It may be told to lie low and wait, or be instructed to move laterally on the network to infect other devices, or to participate in an attack. This attempt by the malicious software to call-home represents an opportunity to detect infected systems on the network that are becoming part of a botnet.

Once an attack has got underway, the attack itself can be difficult to detect. From a network traffic point of view, the device will simply be sending emails out as spam, transferring data or mining bitcoins, or performing DNS lookups and a variety of other requests, usually seen in large scale attacks. In isolation, none of these types of activities are noteworthy.

Building protection

The most important ingredient for effective protection from botnets is the organization’s network firewall. The following can help to get best protection from the firewall.

  • Advanced Threat Protection can identify botnets already operating on the network. Ensure the firewall has malicious traffic detection, botnet detection, and command and control, call-home traffic detection.
  • Intrusion prevention can detect hackers attempting to penetrate and take over the network. Ensure the firewall has next-gen intrusion prevention system that is capable of identifying attack patterns inside the network.
  • Sandboxing can pick up the latest malicious software before it reaches the organization’s computers. Ensure the organization firewall offers advanced sandboxing that can identify suspicious web or email files and activate them in a safe environment.
  • Effective web and email protection can prevent malware from getting onto the network. Ensure the firewall has behavioral-based web protection that can simulate JavaScript code in web content to determine behavior before it reaches the browser.
  • Ensure the firewall has top-shelf anti-spam and antivirus technology to detect malware in email attachments.
  • Web Application Firewall can protect servers, devices, and business applications from being hacked. Ensure the firewall offers WAF protection for any system that requires remote access. 

Best-practices

  • Change the password for all your network devices to a unique complex password, and use a password manager if necessary.
  • Minimize use of IoT devices and update all essential connected devices. Also disconnect unnecessary devices from the network and upgrade older devices to newer models.
  • Avoid using IoT devices that require ports to opened in the network firewall or router to provide remote access. Instead, use cloud-based devices that connect only to the cloud provider’s servers and do not offer direct remote access.
  • Do not enable UPnP on your firewall or router. This protocol enables devices to open ports on the firewall on demand without your knowledge increasing the surface area of attack.
  • Use secure VPN technologies to manage your connected devices remotely.

Botnets have a massive slowdown effect on the global Internet traffic. They can also have a devastating impact on an organization, if the objective of the attack is to steal sensitive information.

Even if the botnet operating on the organization’s network is not after its data, it could be using devices and network resources to cause devastating harm to another organization.

Do not let your network become part of the next global botnet attack.

GrassRoots.ng is on a critical mission; to objectively and honestly represent the voice of ‘grassrooters’ in International, Federal, State and Local Government fora; heralding the achievements of political and other leaders and investors alike, without discrimination. This daily, digital news publication platform serves as the leading source of up-to-date information on how people and events reflect on the global community. The pragmatic articles reflect on the life of the community people, covering news/current affairs, business, technology, culture and fashion, entertainment, sports, State, National and International issues that directly impact the locals.

Continue Reading

Finance

Banks To Now Charge 0.5% Cybersecurity Levy As Directed By CBN; Netizens React

Published

on

The Central Bank of Nigeria (CBN) has directed deposit money banks in the country to start charging 0.5% cybersecurity levy on some transactions done by their customers.

The apex bank gave the directive in a circular dated May 6, 2024 and sent to all commercial, merchant, non-interest and payment service banks as well as mobile money operators and payment service providers.

“Following the enactment of the Cybercrime (Prohibition, Prevention, etc) (amendment) Act 2024 and pursuant to the provision of Section 44 (2) (a) of the Act, ‘a levy of 0.5% (0.005) equivalent to a half percent of all electronic transactions value by the business specified in the Second Schedule of the Act’, is to be remitted to the National Cybersecurity Fund (NCF), which shall be administered by the Office of the National Security Adviser (ONSA),” the circular partly read.

The Cybersecurity Levy implementation notice

The apex bank said that the implementation of the levy would start two weeks from the date of the circular.

“The levy shall be applied at the point of electronic transfer origination, then deducted and remitted by the financial institution. The deducted amount shall be reflected in the customer’s account with the narration, ‘Cybersecurity Levy’. Deductions shall commence within two weeks from the date of this circular for all financial institutions and the monthly remittance of the levies collected in bulk to the NCF account domiciled at the CBN by the fifth business day of every subsequent month,” the circular said

The apex bank added that this new levy will not be applied on transactions such as loan disbursements and repayments, salary payments, intra-account transfers within the same bank or between different banks for the same customer, intra-bank transfers between customers of the same bank.

Also exempted from the levy were inter-branch transfers within a bank, cheque clearing and settlements, ⁠Letters of Credits, ⁠Banks’ recapitalisation-related funding only bulk funds movement from collection accounts, savings and deposits including transactions involving long-term investments, among others.

This current implementation however is not sitting well with some netizens as they reacted to the new development.

Here were some of their reactions from X.

Continue Reading

Finance

EFCC Chairman Tasks Nigerian Youths Against Crimes And Fraudulent Acts

Published

on

The Chairman of Economic Finance Crime Commission (EFCC), Ola Olukoyede, has stressed the need for Nigerian Youth to see themselves as agents of positive change that have a lot to contribute to the socioeconomic development of the Nation.

Speaking at the 2nd edition of a Leadership Trainings Programme in Abuja, Olukoyede, who was represented by the Head Enlightenment and Re-orientation unit, (EFCC), Aisha Mohammed, said the commission’s dream is to see the youth contribute meaningfully to the society, emphasizing on the need to work together in bringing positive change to society.

The Economic and Financial Crimes Commission Boss declared the readiness of his agency to work with all Stakeholders, including the youth towards changing the narrative and reposition the country to greater exploit.
Also speaking, the representative of the Executive Secretary of Tertiary Education Trust Fund (TETFUND), Sonny Echono, appealed to the youths is to eschew social vices that could deter their full potential in life.

Other speakers at the event, including the Chairperson, Zero Tolerance for Social Immoralities Initiative (ZEITI) Africa, Rasak Jeje called on all stakeholders to join hands in collective pursuit of empowering new generation of leaders to curb the rising tides of social Vice among Nigerian youths.

The Chairperson, Zero Tolerance for Social Immoralities Initiative (ZEITI) Africa, Rasak Jeje made the call while addressing journalists at the 2nd edition of it Leadership Trainings Programme in Abuja on Thursday.
He said the training was aimed to intimate students leaders with knowledge and insights that will help them drive positive change and become exemplary leaders in their respective spheres.

Continue Reading

Finance

AISA Has Refunded The Fees Paid By Yahaya Bello To EFCC

Published

on

The Economic and Financial Crimes Commission (EFCC) says the American International School Abuja (AISA) has refunded the fees paid by the immediate past governor of Kogi state, Yahaya Bello, for his children attending the school.

In response to a letter addressed to the Lagos zonal commander of the EFCC, the school said $845,852 was paid in tuition “since the 7th of September 2021 to date”.

AISA said the sum to be refunded is $760,910 because it had deducted educational services already rendered.

“Please forward to us an official written request, with the authentic banking details of the EFCC, for the refund of the above-mentioned funds as previously indicated as part of your investigation into the alleged money laundering activities by the Bello family.

Since the 7th September 2021 to date, $845,852.84 (Eight Hundred and Forty-Five Thousand, Eight Hundred and Fifty Two US Dollars and eighty four cents) in tuition and other fees has been deposited into our Bank account.

We have calculated the net amount to be transferred and refunded to the State, after deducting the educational services rendered as $760,910.84. (Seven Hundred and Sixty Thousand, Nine Hundred and Ten US Dollars and Eighty Four cents).

No further additional fees are expected in respect of tuition as the students’ fees have now been settled until they graduate from ASIA.”

In a chat with The Cable, the spokesperson of the EFCC, Dele Oyewale, confirmed that the school has refunded the money.

‘’The money has been paid into public account,” Dele Oyewale was quoted as saying

Continue Reading

Trending