Skip to main content

Really, How Bad Do Routers Have It?

In recent years, the United States government has warned the public that state-sponsored cyber actors conduct worldwide exploitation of network devices, particularly small business and home office routers, to support their campaigns.Quantitative analysis of ten years of Internet Storm Center data and current Shodan data was conducted to explore the scope of the router attack surface compared to that of host devices.This investigation determined that hosts are targeted more than twice as much as routers on average, even when controlled for relative number of devices.While the data shows that routers are not targeted as often as hosts, router security must be scrutinized from the early stages of research and development through field deployment.Recommendations for device manufacturers, Internet Service Providers, and cyber security practitioners are provided.

SANS-really-how-bad-do-routers-have-it (PDF, 2.04MB)

22 Feb 2023
ByJesse Schibilia
Share
All papers are copyrighted

No re-posting of papers is permitted

Related Content

Structural Vulnerability: Autodesk Revit Server WAN Exposure Versus Cost of Autodesk Construction Cloud

Research Paper

Autodesk Revit Server, a critical collaboration tool in the architecture, engineering, and construction (AEC) industry, was designed to operate within trusted networks.

  • 7 Nov 2025

Privacy Protections: Are Stronger Laws Changing What We Reveal?

Research Paper

As U.S. states enact privacy laws aimed at giving consumers more control over their personal data, little is known about whether privacy legislation influences individuals’ willingness to disclose their identity on public platforms.

  • 26 Sep 2025

Forensic Investigation of Bluetooth-Based Credit Card Skimmers

Research Paper

Hidden Bluetooth Low Energy (BLE) credit skimmers are a growing threat to credit card fraud. Criminals can set up practical and inexpensive systems built on top of modules, such as the HM-19, to collect and transmit stolen data covertly across wireless channels.

  • 3 Sep 2025

A Pebble In the Ocean: Maximizing Log Fidelity In Container Environments

Research Paper

Log fidelity is crucial for Incident Response Teams to investigate and contain cyber incidents but...

  • 17 Apr 2025

Unveiling the Dependency on Network Telemetry: Optimizing Lateral Movement Detection

Research Paper

This study investigates the dependency on network and endpoint telemetry for identifying lateral...

  • 17 Jan 2025

Beyond Detection: Using Real Phishing Data to Gauge Security Training Program Success

Research Paper

Identification of phishing emails can be cumbersome, accomplished by rule-based filters, machine...

  • 7 Jan 2025

Revolutionizing Enterprise Security: The Exciting Future of Passkeys Beyond Passwords

Research Paper

As digital threats grow increasingly sophisticated, traditional password-based authentication...

  • 23 Dec 2024
  • Rich Greene

Protecting the Poor: A Deep Dive into EBT Skimming and Solutions to Combat It

Research Paper

Electronic Benefits Transfer (EBT) cards provide individuals receiving government assistance for...

  • 23 Dec 2024

The Open-Source Trap: Unraveling Open-Source Threats in the Software Supply Chain

Research Paper

The risk to the software supply chain is increasingly clear, as breaches like SolarWinds, Equifax,...

  • 5 Dec 2024

Hook, Line, and Sinker: The Best Free Tools to Catch Phishing

Research Paper

Phishing has become a widespread threat that organizations and IT security teams face daily. As...

  • 5 Dec 2024

SANS 2024 State of ICS/OT Cybersecurity

Research Paper

This white paper, SANS Certified Instructor Jason Christopher explores the growing trends in cyber...

  • 9 Oct 2024
  • SANS Institute

Shining a Light on AI: Ensuring Vendor Transparency in Data Sourcing and Delivery

Research Paper

Amidst the proliferation of AI solutions, the focus lies in evaluating transparency, undisclosed...

  • 29 Jan 2024

Building a Resilient Offensive Security Strategy

Research Paper

In this white paper, SANS Certified Instructor Matt Bromiley explores the results of our survey that...

  • 13 Oct 2023
  • Matt Bromiley

Inoculating the Masses: Evaluating Cybersecurity Awareness Training

Research Paper

Like a disease, cybercrime is spreading across the world. The sums of money lost to these criminals...

  • 22 Sep 2022

Building an Intelligent, Automated Tiered Phishing System: Matching the Message Level to User Ability

Research Paper

Phishing campaigns and the procedures to run them have remained unchanged since the dawn of the...

  • 12 Jan 2022

Expired Domain Dumpster Diving

Research Paper

Every day 200,000 domains expire ("DomCop FAQ," n.d.), become available for purchase and possible...

  • 1 Sep 2021

Information Security Starts with the Employees

Research Paper

Organizations continue to spend exorbitant budgets to combat the issue of insider threat with one...

  • 8 Jul 2021

A Swipe and a Tap: Does Marketing Easier 2FA Increase Adoption?

Research Paper

Data breaches and Internet-enabled fraud remain a costly and troubling issue for businesses and home...

  • 19 Nov 2018

Online Safety in a Foreign Language - Connecting with Teens

Research Paper

The inescapable dangers of our increasingly connected world are likely most threatening to our young...

  • 16 Oct 2017

Complement a Vulnerability Management Program with PowerShell

Research Paper

A vulnerability management program is a critical task that all organizations should be running. Part...

  • 10 Aug 2017