Sercomm

from Wikipedia, the free encyclopedia
Sercomm Corporation
legal form Corporation
ISIN TW0005388003
founding July 29, 1992
Seat Taipei , TaiwanTaiwanRepublic of China (Taiwan) 
management
  • Paul Wang (Chairman)
  • James Wang (President & CEO)
sales 35 billion NT $ (1 billion euro )
Branch Information technology
Website www.sercomm.com
Status: 2015

The SERCOMM Corporation is a company based in Taipei in Taiwan , which as a contract manufacturer devices for computer networks develops and manufactures.

Sercomm was founded in 1992 in Taipei and, according to the company website, employs thousands of people worldwide.

Sercomm manufactures devices for broadband internet access , WLAN and home automation as well as devices for home, commercial, telecommunications, security monitoring and cloud- based applications. While Sercomm works with telecommunications companies around the world, Sercomm products are mainly to be found on the German market as OEM devices, for example as router models from Deutsche Telekom ( Speedport ).

Backdoor

Sercomm was found to be the origin of the port 32764 backdoor , which affected not only Netgear devices but also devices from Deutsche Telekom ( Speedport ). In 2014 it became known that devices that are based entirely or partially on Sercomm solutions had had unsecured remote access ( backdoor ) since at least 2003 , which, unnoticed by the owner, enabled complete remote control of the device and in many products accessible via the Internet was. After it became known, manufacturers initially hesitated to respond with security updates , which, however, for some manufacturers such as Netgear did not remove the back door, but merely hid it. It is not known whether and to what extent this backdoor was used for less obvious purposes such as identity theft .

Individual evidence

  1. ^ A b Company Profile
  2. Annual Report 2015
  3. About Sercomm
  4. Archived copy ( Memento of the original from April 24, 2014 in the Internet Archive ) Info: The archive link was inserted automatically and has not yet been checked. Please check the original and archive link according to the instructions and then remove this notice. @1@ 2Template: Webachiv / IABot / www.netgear-forum.com
  5. http://www.pc-magazin.de/news/router-backdoor-port-32764-sicherheit-hintertuer-luecke-spionage-1932338.html
  6. http://www.synacktiv.com/ressources/TCP32764_backdoor_again.pdf
  7. https://www.derwesten.de/staedte/nachrichten-aus-moers-kamp-lintfort-neukirchen-vluyn-rheurdt-und-issum/hacker-greifen-telefonkunden-an-id8922516.html
  8. Benedikt Fuest: IT security: router companies repaired data leak only to appear. In: welt.de . April 21, 2014, accessed October 7, 2018 .
  9. https://www.heise.de/security/meldung/Netgear-Update-Router-Backdoor-nur-versteckt-2173996.html