SlideShare a Scribd company logo
Phillip LiPari, Writing for Intelligence
23 September 2015
Routers Hijackings pose new Threatto Cybersecurity
Executive Summary:
Malware that hijacks and replaces the integrated operating system (IOS) of internet routers is
likely to become a more commonplace tactic among threat actors. By hijacking routers, threat
actors create a beachhead for further cyber-attacks and can view all data accessed via the
internet. Countermeasures for these attacks are currently ineffective due to their unique and
unprecedented nature.
Discussion:
SYNful Knock is the name given to
the malware used in router
hijacking attacks through default
login codes. Default login codes
are the maintenance usernames and
passwords to routers. These logins
have long been areas of concern for
cybersecurity professionals but
went unexploited prior to SYNful.1
Rewriting a router`s IOS allows
SYNful to become integrated
within the infected router. The
SYNful software updates itself
regularly once inside the router to
ensure an appearance of normal
operations.2 These factors allow SYNful to remain undetected for undetermined periods of
time.
Router based cyber-attacks were only theorized prior to the SYNful attacks on Cisco brand
routers revealed on 15 September 2015. The initial estimate of routers compromised was 14
routers in four countries but it has since risen to over 200 routers in 31 countries. As many as
60 of these routers are located in the US and so far they have only been found in networks used
by private companies.3 “This attack vector is very much a reality and will most likely grow in
popularity and prevalence” stated David Dewalt, CEO of the cybersecurity firm FireEye. 4
Dewalt also stated that Cisco brand routers were not the only brand susceptible to these
attacks. Due to the complexity and scope of the attacks, Dewalt claims a state actor is likely
responsible. 5 Thus far there have been no accusations toward any specific state or group.
Infected routers send data to the threat actors controlling them as well as the intended
destination via the internet. In addition to compromising massive amounts of data, infected
routers serve as a beachhead for further attacks on a network.6 Reformatting infected routers is
Basic diagram of a router connected to the internet,
SYNful would have access to anything connected to
the router (in this case the two computers)
the only way to eliminate SYNful due to the IOS integration. FireEye recommends a thorough
examination of networks compromised by infected routers.7
Cisco stated that routers are both valuable to threat actors as well as key points of defense
within a network. Since SYNful and router attacks in general are still vague and difficult to
prevent, they will remain an effective attack method.8 Considering the lack of a defensive
strategy, Cisco`s security division is currently developing methods to detect and repel router
attacks.9
Source Reliability: Moderate
With questions or concerns, please contact the author:
Email: plipar35@lakers.mercyhurst.edu
Phone: (585) 752-9449
Peer reviewed by: Austin Wood
Graphic source: http://www.microsoft.com/library/media/1033/windowsxp/images/using/networking/setup/68573-
router-diagram.gif
Endnotes
1 http://news.softpedia.com/news/some-wifi-routers-can-be-hacked-using-a-hard-coded-default-login-
490207.shtml (L)
2 http://searchsecurity.techtarget.com/news/4500253817/Cisco-router-malware-in-the-wild-more-widespread-
than-first-believed (H)
3 http://fcw.com/articles/2015/09/15/cisco-router.aspx (M)
4 http://www.networkworld.com/article/2984124/security/attackers-can-take-over-cisco-routers-other-routers-
at-risk-too.html (M)
5 http://www.fierceenterprisecommunications.com/story/even-more-cisco-devices-found-be-infected-synful-
knock/2015-09-21 (M)
6 http://www.crn.com/news/networking/300078193/hundreds-of-cisco-routers-infected-with-synful-knock-
partners-say-attack-changing-sales-strategy.htm (M)
7 http://www.infosecurity-magazine.com/news/cisco-synful-knock-threat-victims/ (M)
8 http://www.ibtimes.com/router-hack-creates-ultimate-listening-device-monitor-countrys-entire-internet-
2097511 (M)
9 http://www.eweek.com/security/synful-knock-malware-found-on-almost-200-cisco-routers.html (M)

More Related Content

What's hot

What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
Vikram Khanna
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
Pankaj Jha
 
Top 5 wi fi security threats
Top 5 wi fi security threatsTop 5 wi fi security threats
Top 5 wi fi security threatsgruzabb
 
Network Security
Network SecurityNetwork Security
Network Security
Manoj Singh
 
Network security
Network securityNetwork security
Network security
Nkosinathi Lungu
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Security
noornabi16
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
Fabiha Shahzad
 
Cyber Attack Analysis
Cyber Attack AnalysisCyber Attack Analysis
Cyber Attack Analysis
codefortomorrow
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internetdpd
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
krishh sivakrishna
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
Mark Silver
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IJNSA Journal
 
IoT Device Security Tips
IoT Device Security TipsIoT Device Security Tips
IoT Device Security Tips
Centextech
 
Trusted Wireless Environment (TWE)
Trusted Wireless Environment (TWE)Trusted Wireless Environment (TWE)
Trusted Wireless Environment (TWE)
Ryan Orsi
 
IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfua
Andy Shutka
 
Presentation network security
Presentation network securityPresentation network security
Presentation network securitycegonsoft1999
 
SS7 Vulnerabilities
SS7 VulnerabilitiesSS7 Vulnerabilities
SS7 Vulnerabilities
PositiveTechnologies
 
Network security
Network security Network security
Network security
Madhumithah Ilango
 
A Guide to 802.11 WiFi Security by US-CERT
A Guide to 802.11 WiFi Security by US-CERTA Guide to 802.11 WiFi Security by US-CERT
A Guide to 802.11 WiFi Security by US-CERT
David Sweigert
 
Is Security Optional20100608
Is Security Optional20100608Is Security Optional20100608
Is Security Optional20100608
aljapaco
 

What's hot (20)

What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
 
Top 5 wi fi security threats
Top 5 wi fi security threatsTop 5 wi fi security threats
Top 5 wi fi security threats
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network security
Network securityNetwork security
Network security
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Security
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Cyber Attack Analysis
Cyber Attack AnalysisCyber Attack Analysis
Cyber Attack Analysis
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
 
IoT Device Security Tips
IoT Device Security TipsIoT Device Security Tips
IoT Device Security Tips
 
Trusted Wireless Environment (TWE)
Trusted Wireless Environment (TWE)Trusted Wireless Environment (TWE)
Trusted Wireless Environment (TWE)
 
IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfua
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
 
SS7 Vulnerabilities
SS7 VulnerabilitiesSS7 Vulnerabilities
SS7 Vulnerabilities
 
Network security
Network security Network security
Network security
 
A Guide to 802.11 WiFi Security by US-CERT
A Guide to 802.11 WiFi Security by US-CERTA Guide to 802.11 WiFi Security by US-CERT
A Guide to 802.11 WiFi Security by US-CERT
 
Is Security Optional20100608
Is Security Optional20100608Is Security Optional20100608
Is Security Optional20100608
 

Viewers also liked

Angola ulke raporu_2013
Angola ulke raporu_2013Angola ulke raporu_2013
Angola ulke raporu_2013
UlkeRaporlari2013
 
Untitled Powtoon 56
Untitled Powtoon 56Untitled Powtoon 56
Untitled Powtoon 56ttest9569
 
Iscon Platinum Details
Iscon Platinum DetailsIscon Platinum Details
Iscon Platinum Details
REMAXRealtySolutions1
 
Venda de roses
Venda de rosesVenda de roses
Venda de roses
Lamitjana5 Lamitjana
 
Untitled Powtoon 47
Untitled Powtoon 47Untitled Powtoon 47
Untitled Powtoon 47ttest9569
 
Financial management
Financial managementFinancial management
Financial management
Nalitye Nghitewapo
 
Hindistan ulke raporu_2013
Hindistan ulke raporu_2013Hindistan ulke raporu_2013
Hindistan ulke raporu_2013
UlkeRaporlari2013
 
Nijer ulke raporu_2013
Nijer ulke raporu_2013Nijer ulke raporu_2013
Nijer ulke raporu_2013
UlkeRaporlari2013
 
Nikaragua ulke raporu_2013
Nikaragua ulke raporu_2013Nikaragua ulke raporu_2013
Nikaragua ulke raporu_2013
UlkeRaporlari2013
 
(343)long populismo, neoliberalismo y neonacionalism odocx
(343)long  populismo, neoliberalismo y neonacionalism odocx(343)long  populismo, neoliberalismo y neonacionalism odocx
(343)long populismo, neoliberalismo y neonacionalism odocx
ManfredNolte
 
(350)pdf long los regalos de los magos
(350)pdf long los regalos de los magos(350)pdf long los regalos de los magos
(350)pdf long los regalos de los magos
ManfredNolte
 

Viewers also liked (13)

Davis Vision Decison
Davis Vision DecisonDavis Vision Decison
Davis Vision Decison
 
Angola ulke raporu_2013
Angola ulke raporu_2013Angola ulke raporu_2013
Angola ulke raporu_2013
 
Untitled Powtoon 56
Untitled Powtoon 56Untitled Powtoon 56
Untitled Powtoon 56
 
ID Card
ID CardID Card
ID Card
 
Iscon Platinum Details
Iscon Platinum DetailsIscon Platinum Details
Iscon Platinum Details
 
Venda de roses
Venda de rosesVenda de roses
Venda de roses
 
Untitled Powtoon 47
Untitled Powtoon 47Untitled Powtoon 47
Untitled Powtoon 47
 
Financial management
Financial managementFinancial management
Financial management
 
Hindistan ulke raporu_2013
Hindistan ulke raporu_2013Hindistan ulke raporu_2013
Hindistan ulke raporu_2013
 
Nijer ulke raporu_2013
Nijer ulke raporu_2013Nijer ulke raporu_2013
Nijer ulke raporu_2013
 
Nikaragua ulke raporu_2013
Nikaragua ulke raporu_2013Nikaragua ulke raporu_2013
Nikaragua ulke raporu_2013
 
(343)long populismo, neoliberalismo y neonacionalism odocx
(343)long  populismo, neoliberalismo y neonacionalism odocx(343)long  populismo, neoliberalismo y neonacionalism odocx
(343)long populismo, neoliberalismo y neonacionalism odocx
 
(350)pdf long los regalos de los magos
(350)pdf long los regalos de los magos(350)pdf long los regalos de los magos
(350)pdf long los regalos de los magos
 

Similar to LiPari_Assignment8

Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security
Lancope, Inc.
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
online Marketing
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
IJCSIS Research Publications
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
Shreya Pohekar
 
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMPCo-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
IJNSA Journal
 
Ransomware protection in loT using software defined networking
Ransomware protection in loT using software  defined networking  Ransomware protection in loT using software  defined networking
Ransomware protection in loT using software defined networking
IJECEIAES
 
LIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveLIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep Dive
Robert Herjavec
 
Deterring hacking strategies via
Deterring hacking strategies viaDeterring hacking strategies via
Deterring hacking strategies via
IJNSA Journal
 
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIESDETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
IJNSA Journal
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
IRJET Journal
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
Mohit Belwal
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
Skillmine Technology Consulting
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
Koenig Solutions Ltd.
 
Network_Security1.pdf.pdf
Network_Security1.pdf.pdfNetwork_Security1.pdf.pdf
Network_Security1.pdf.pdf
ahmed53254
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
Education
 
System and web security
System and web securitySystem and web security
System and web security
chirag patil
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi Security
IRJET Journal
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
IRJET Journal
 
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
cyberprosocial
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of Things
Cognizant
 

Similar to LiPari_Assignment8 (20)

Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMPCo-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
 
Ransomware protection in loT using software defined networking
Ransomware protection in loT using software  defined networking  Ransomware protection in loT using software  defined networking
Ransomware protection in loT using software defined networking
 
LIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveLIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep Dive
 
Deterring hacking strategies via
Deterring hacking strategies viaDeterring hacking strategies via
Deterring hacking strategies via
 
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIESDETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
Network_Security1.pdf.pdf
Network_Security1.pdf.pdfNetwork_Security1.pdf.pdf
Network_Security1.pdf.pdf
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
System and web security
System and web securitySystem and web security
System and web security
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi Security
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
Unlocking the Potential: A Comprehensive Guide to Understanding and Securing ...
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of Things
 

LiPari_Assignment8

  • 1. Phillip LiPari, Writing for Intelligence 23 September 2015 Routers Hijackings pose new Threatto Cybersecurity Executive Summary: Malware that hijacks and replaces the integrated operating system (IOS) of internet routers is likely to become a more commonplace tactic among threat actors. By hijacking routers, threat actors create a beachhead for further cyber-attacks and can view all data accessed via the internet. Countermeasures for these attacks are currently ineffective due to their unique and unprecedented nature. Discussion: SYNful Knock is the name given to the malware used in router hijacking attacks through default login codes. Default login codes are the maintenance usernames and passwords to routers. These logins have long been areas of concern for cybersecurity professionals but went unexploited prior to SYNful.1 Rewriting a router`s IOS allows SYNful to become integrated within the infected router. The SYNful software updates itself regularly once inside the router to ensure an appearance of normal operations.2 These factors allow SYNful to remain undetected for undetermined periods of time. Router based cyber-attacks were only theorized prior to the SYNful attacks on Cisco brand routers revealed on 15 September 2015. The initial estimate of routers compromised was 14 routers in four countries but it has since risen to over 200 routers in 31 countries. As many as 60 of these routers are located in the US and so far they have only been found in networks used by private companies.3 “This attack vector is very much a reality and will most likely grow in popularity and prevalence” stated David Dewalt, CEO of the cybersecurity firm FireEye. 4 Dewalt also stated that Cisco brand routers were not the only brand susceptible to these attacks. Due to the complexity and scope of the attacks, Dewalt claims a state actor is likely responsible. 5 Thus far there have been no accusations toward any specific state or group. Infected routers send data to the threat actors controlling them as well as the intended destination via the internet. In addition to compromising massive amounts of data, infected routers serve as a beachhead for further attacks on a network.6 Reformatting infected routers is Basic diagram of a router connected to the internet, SYNful would have access to anything connected to the router (in this case the two computers)
  • 2. the only way to eliminate SYNful due to the IOS integration. FireEye recommends a thorough examination of networks compromised by infected routers.7 Cisco stated that routers are both valuable to threat actors as well as key points of defense within a network. Since SYNful and router attacks in general are still vague and difficult to prevent, they will remain an effective attack method.8 Considering the lack of a defensive strategy, Cisco`s security division is currently developing methods to detect and repel router attacks.9 Source Reliability: Moderate With questions or concerns, please contact the author: Email: plipar35@lakers.mercyhurst.edu Phone: (585) 752-9449 Peer reviewed by: Austin Wood Graphic source: http://www.microsoft.com/library/media/1033/windowsxp/images/using/networking/setup/68573- router-diagram.gif Endnotes 1 http://news.softpedia.com/news/some-wifi-routers-can-be-hacked-using-a-hard-coded-default-login- 490207.shtml (L) 2 http://searchsecurity.techtarget.com/news/4500253817/Cisco-router-malware-in-the-wild-more-widespread- than-first-believed (H) 3 http://fcw.com/articles/2015/09/15/cisco-router.aspx (M) 4 http://www.networkworld.com/article/2984124/security/attackers-can-take-over-cisco-routers-other-routers- at-risk-too.html (M) 5 http://www.fierceenterprisecommunications.com/story/even-more-cisco-devices-found-be-infected-synful- knock/2015-09-21 (M) 6 http://www.crn.com/news/networking/300078193/hundreds-of-cisco-routers-infected-with-synful-knock- partners-say-attack-changing-sales-strategy.htm (M) 7 http://www.infosecurity-magazine.com/news/cisco-synful-knock-threat-victims/ (M) 8 http://www.ibtimes.com/router-hack-creates-ultimate-listening-device-monitor-countrys-entire-internet- 2097511 (M) 9 http://www.eweek.com/security/synful-knock-malware-found-on-almost-200-cisco-routers.html (M)