• Latest
  • Trending
  • All
  • Industry
  • Compliance
  • Global Trade
  • Industry
  • Sustainability & Ethics
  • Video
  • Security & Risk
4.2-Million-Internet-Hosts-Hijacked-via-Vulnerabilities-in-Tunneling-Protocols

4.2 Million Internet Hosts Hijacked via Vulnerabilities in Tunneling Protocols

01/16/2025

ICTTM Announces ADAMftd: Instant, Tailored Market-Entry Reports Powered by Real-World Trade Data

02/04/2026

International Trade Council Announces Breakthrough AI Market-Entry Intelligence Powered by Real-World Government Trade Data

02/04/2026
China Resumes Canadian Canola Imports After Trade Tensions Ease

China Resumes Canadian Canola Imports After Trade Tensions Ease

01/29/2026
Port of Montreal Posts Container Growth in 2025 Despite Global Trade Uncertainty

UAE Logistics Network Expands Pakistan Shipping Options Through New Partnership

01/29/2026
UK Rail Freight Interchange Project Seeks Government Decision Amid Infrastructure Debate

Saudi Rail Authority Issues Tender for 10 New Passenger Trains to Boost Northern Network Capacity

01/29/2026
U.S. Trade Gap Nearly Doubles in Latest Data as Imports Outpace Exports

U.S. Trade Gap Nearly Doubles in Latest Data as Imports Outpace Exports

01/29/2026
U.S. Truck Parking Expansion Funding at Risk Amid Congressional Budget Battle

U.S. Truck Parking Expansion Funding at Risk Amid Congressional Budget Battle

01/29/2026
U.S. Weekly Rail Traffic Falls 4% as Intermodal and Carload Moves Slow Early in 2026

U.S. Major Rail Carrier to Submit Revised Merger Application in March After Regulatory Setback

01/29/2026
Global EV Market’s Continued Renaissance

New Truck‑to‑Air Multimodal Service Emerges on Asia–Europe Trade Lane

01/29/2026
Transportation Mergers & Acquisitions Set to Rise in 2026 as Deal Activity Heats Up

U.S. Trucking Regulator Stands Firm on Foreign Driver Rules Despite Multi‑State Pushback

01/30/2026
UK Postal Delays Over Christmas Hit Highest Levels in Five Years, Consumer Watchdog Warns

UK Postal Delays Over Christmas Hit Highest Levels in Five Years, Consumer Watchdog Warns

01/29/2026
Global Survey Shows 60% of Executives Prioritise Cyber Risk as Strategic Threat

Global Survey Shows 60% of Executives Prioritise Cyber Risk as Strategic Threat

01/29/2026
supplychainreport
Saturday, February 7, 2026
  • Home
  • Industry
    • Supply Chain
    • Logistics & Transportation
    • Importing & Exporting
    • Manufacturing
    • Warehousing & Distribution
  • Compliance
    • Supply Chain Transparency
    • Anti-Money Laundering (AML)
    • Know Your Customer (KYC)
    • Risk Management
    • Export Controls
    • Sanctions
  • Global Trade
    • Market Trends
    • Economic Indicators
    • Sourcing
    • Trade Policies
    • International Relations
    • Trade Agreements
    • Tariffs & Duties
    • Import/Export Statistics
  • Luxury Goods
  • Industry
    • Blockchain in Supply Chain
    • Importing & Exporting
    • Automation & Robotics
    • Artificial Intelligence in Trade
    • Data & Analytics
  • Sustainability & Ethics
    • Green Supply Chains
    • Sustainable Logistics
    • Ethical Sourcing
    • Corporate Social Responsibility
    • Environmental Policies
  • Security & Risk
    • Cybersecurity in Trade
    • Fraud & Scams
    • Risk Mitigation
    • Security Protocols
    • Data Protection
  • ITC News
    • ITC Featured Members
    • ITC Business Councils Highlights
  • Events
    • Upcoming Conferences
    • Upcoming FREE Educational Webinars
No Result
View All Result
supplychainreport
No Result
View All Result

4.2 Million Internet Hosts Hijacked via Vulnerabilities in Tunneling Protocols

by Giezel Garcia
01/16/2025
in Cybersecurity in Trade, Security & Risk

New vulnerabilities discovered in four tunneling protocols have led to the hijacking of 4.2 million internet hosts, including VPN servers, home routers, and enterprise routers, allowing attackers to exploit these devices and access both corporate and home networks.

The vulnerable hosts can be misused as one-way proxies, facilitating anonymous attacks on private networks, according to a blog post from Top10VPN researchers published on January 15. These attacks include new denial-of-service (DoS) techniques and DNS spoofing, which can enable additional forms of cyberattacks such as TCP hijacking, SYN floods, and Wi-Fi attacks.

YOU MAY ALSO LIKE

U.S. Trucking Regulator Stands Firm on Foreign Driver Rules Despite Multi‑State Pushback

Global Survey Shows 60% of Executives Prioritise Cyber Risk as Strategic Threat

Researchers noted that the majority of the attacks have been concentrated in Brazil, China, France, Japan, and the United States.

Jason Soroko, senior fellow at Sectigo, explained that these vulnerabilities allow attackers to spoof source addresses and route packets through compromised hosts, making malicious traffic appear legitimate. Soroko emphasized the risk of various attacks this vulnerability enables, including stealthy DDoS, DNS spoofing, unauthorized network access, and potential IoT device infiltration.

“Security and networking teams should ensure that tunneled traffic is only accepted from trusted endpoints,” Soroko advised. “Proper source validation, applying vendor patches, and deploying strict firewall rules can significantly reduce exposure. Strengthening tunneling configurations and ensuring that authentication checks are in place can help prevent attackers from exploiting these protocols for anonymous attacks.”

Trey Ford, chief information security officer at Bugcrowd, noted that tunneling and amplification-based attacks have been a recurring issue for several decades, with a range of protocols targeted over time, including SYN flood DoS attacks in the ’90s, DNS recursion in the early 2000s, and more recently, protocols such as NTP, LDAP, and Memcached.

“Security teams should focus on strengthening edge devices,” Ford recommended. “Devices connected to the internet are vulnerable to unexpected and uninvited traffic. Limiting the scope of where services accept requests and disabling unused services can reduce potential risks.”


Explore supply chain logistics news updates at The Supply Chain Report. Learn more about international trade at ADAMftd.com.

#InternetSecurity #TunnelingProtocols #CyberSecurity #HostHijacking #DataProtection #NetworkVulnerabilities #TechNews

ShareTweet

Share Your News

Whether it’s a groundbreaking achievement, a heartwarming tale, or an insightful perspective, we want to hear it. Share your news with us, and let’s amplify your voice in the digital symphony of stories.

Submit

A man is riding a bike on a hill.

The Supply Chain Report is your essential daily news website, serving as a trusted source for comprehensive coverage of the complex and ever-evolving global supply chain dynamics. Our expert team delves into the intricacies of international trade, manufacturing, logistics, importing, exporting, and supply chain management; providing in-depth analysis and up-to-date news on the latest trends, disruptions, and technological advancements affecting industries worldwide. From detailed reports on international trade through to insights into procurement strategies and inventory management, we offer valuable content that helps professionals stay informed and make knowledgeable decisions in a fast-paced market.

Each day, we bring you cutting-edge news and expert commentary that dissect significant international trade and supply chain issues Our coverage spans a wide array of sectors including manufacturing, retail, healthcare, food, consumer goods, and technology, ensuring that no matter your field, you have the strategic information needed to navigate the challenges and opportunities of today’s supply chain landscape. By synthesizing complex data and presenting actionable insights, The Supply Chain Report empowers business leaders, policymakers, and logistics professionals to optimize their operations and drive forward with confidence in an interconnected world.

Connect With Us

  • About
  • Events
  • Privacy Policy
  • Contact Us

© 2024 International Centre for Trade Transparency Limited. Incorporated in the United Kingdom.

No Result
View All Result
  • Home
  • Industry
    • Supply Chain
    • Logistics & Transportation
    • Importing & Exporting
    • Manufacturing
    • Warehousing & Distribution
  • Compliance
    • Supply Chain Transparency
    • Anti-Money Laundering (AML)
    • Know Your Customer (KYC)
    • Risk Management
    • Export Controls
    • Sanctions
  • Global Trade
    • Market Trends
    • Economic Indicators
    • Sourcing
    • Trade Policies
    • International Relations
    • Trade Agreements
    • Tariffs & Duties
    • Import/Export Statistics
  • Luxury Goods
  • Industry
    • Blockchain in Supply Chain
    • Importing & Exporting
    • Automation & Robotics
    • Artificial Intelligence in Trade
    • Data & Analytics
  • Sustainability & Ethics
    • Green Supply Chains
    • Sustainable Logistics
    • Ethical Sourcing
    • Corporate Social Responsibility
    • Environmental Policies
  • Security & Risk
    • Cybersecurity in Trade
    • Fraud & Scams
    • Risk Mitigation
    • Security Protocols
    • Data Protection
  • ITC News
    • ITC Featured Members
    • ITC Business Councils Highlights
  • Events
    • Upcoming Conferences
    • Upcoming FREE Educational Webinars

© 2024 International Centre for Trade Transparency Limited. Incorporated in the United Kingdom.