Security risks of people working remotely

If you found this blog post interesting you might also enjoy our regular series of webinars about practical ways to improve the security of people working outside the office.

In the age of remote and hybrid work, organizations face a daunting challenge: securing access to sensitive data and systems outside the traditional office environment. One of the biggest blind spots? Home routers. These devices, often overlooked, are increasingly becoming a prime target for cyberattacks, creating serious vulnerabilities for businesses.

The Growing Threat Landscape
Routers are far less secure than most people assume. They’re often shipped with default settings that users rarely change, and the belief that these devices automatically update to fix security flaws is largely unfounded.

Real-world examples illustrate the risk:
DrayTek Routers: Researchers discovered a Remote Code Execution (RCE) vulnerability that could allow attackers to take control of the device.
TP-Link Firmware Exploits: Threat actors have been found infecting router firmware to target entities in the EU.

These examples are part of a growing trend where vulnerabilities in widely used routers are publicly documented and easily exploitable by malicious actors.

Why Are Routers a Target?
The answer is simple: routers are gateways to entire networks. An attacker who gains control of a router can intercept traffic, compromise connected devices, or use it as a foothold for larger attacks. Targeting routers is both lucrative and relatively easy for threat actors compared to other attack vectors.

The Informational Black Hole
From an IT perspective, home routers are a logistical nightmare. These devices are personal property, making it impossible to audit or monitor them effectively. The challenge is even greater for employees working from public locations like coffee shops or shared office spaces, where the network infrastructure is entirely out of the organization’s control.

The Scale of the Problem
For organizations with remote or hybrid teams, the scale of the issue is staggering. Managing the security of dozens, hundreds, or even thousands of home routers is a nearly impossible task for most IT teams. Yet, every single device represents a potential entry point for attackers.

Dangerous Assumptions
Many people assume that Internet Service Providers (ISPs) supply secure and always up to date routers. Unfortunately, this is rarely the case. Studies have shown that many ISP-provided routers run outdated firmware, leaving them vulnerable to attacks.

Another common misconception is the belief that “it won’t happen to me.” This false sense of security can lead to complacency, exposing organizations to avoidable risks.

The Real-World Consequences
The risks associated with insecure routers aren’t hypothetical. Exploits targeting Netgear Orbi routers or TP-Link devices infected with Mirai malware have had real-world consequences. The UK’s National Cyber Security Centre (NCSC) has even issued advisories highlighting the dangers of employees connecting to corporate systems via insecure home routers.

What Organizations Can Do
Addressing the security risks posed by home routers requires a proactive approach. Here are some key steps organizations can take:

  1. User Education: Empower employees with knowledge about router security risks and how to mitigate them.
  2. Deploy Secure Managed Routers: Solutions like Loxada’s managed routers provide an easy-to-use, secure alternative that ensures work data is always protected, regardless of the home router’s state.
  3. Encourage Network Separation: Employees should create separate networks for work and personal devices. This limits the risk of compromise if an individual device is infected with malware.
  4. Ensure Regular Firmware Updates: Work with employees to confirm that their routers’ firmware is up to date, addressing known vulnerabilities.
  5. Partner with ISPs: Encourage employees to use ISPs that provide modern, secure routers with automatic updates.
  6. Multi-Factor Authentication (MFA): Implement MFA wherever possible to add an additional layer of security against unauthorized access.

A Call to Action
The risks posed by insecure home routers are real and growing. Addressing these vulnerabilities for organizations embracing remote and hybrid work isn’t optional – it’s essential. Solutions like Loxada’s managed routers can eliminate these risks, ensuring that every remote connection is as secure as if made from within the office.

By taking these proactive steps, organizations can turn one of their weakest links into a fortified part of their cybersecurity strategy.


Sources

[^1^]: Trellix – RCE in DrayTek Routers

[^2^]: Bleeping Computer – Hackers Infect TP-Link Router Firmware

[^3^]: Wired UK – Router WiFi Security Settings

[^4^]: Bleeping Computer – PoC Exploits for Netgear Orbi Router

[^5^]: Bleeping Computer – TP-Link Archer WiFi Router Flaw

[^6^]: NCSC UK, NSA – APT28 Exploitation of Cisco Routers

[^7^] NCSC – Cyber Threat Report: UK Legal Sector

If you found this blog post interesting you might also enjoy our regular series of webinars about practical ways to improve the security of people working outside the office.