• 407 days Will The ECB Continue To Hike Rates?
  • 408 days Forbes: Aramco Remains Largest Company In The Middle East
  • 409 days Caltech Scientists Succesfully Beam Back Solar Power From Space
  • 809 days Could Crypto Overtake Traditional Investment?
  • 814 days Americans Still Quitting Jobs At Record Pace
  • 816 days FinTech Startups Tapping VC Money for ‘Immigrant Banking’
  • 819 days Is The Dollar Too Strong?
  • 819 days Big Tech Disappoints Investors on Earnings Calls
  • 820 days Fear And Celebration On Twitter as Musk Takes The Reins
  • 822 days China Is Quietly Trying To Distance Itself From Russia
  • 822 days Tech and Internet Giants’ Earnings In Focus After Netflix’s Stinker
  • 826 days Crypto Investors Won Big In 2021
  • 826 days The ‘Metaverse’ Economy Could be Worth $13 Trillion By 2030
  • 827 days Food Prices Are Skyrocketing As Putin’s War Persists
  • 829 days Pentagon Resignations Illustrate Our ‘Commercial’ Defense Dilemma
  • 830 days US Banks Shrug off Nearly $15 Billion In Russian Write-Offs
  • 833 days Cannabis Stocks in Holding Pattern Despite Positive Momentum
  • 834 days Is Musk A Bastion Of Free Speech Or Will His Absolutist Stance Backfire?
  • 834 days Two ETFs That Could Hedge Against Extreme Market Volatility
  • 836 days Are NFTs About To Take Over Gaming?
  1. Home
  2. News
  3. Breaking News

Massive Malware Attack Infects Half A Million Routers

Hacker

With more than 500,000 routers in homes and small offices worldwide hacked with malware that can spy on, attack and destroy devices, according to software giant Cisco, the FBI is urging everyone to reboot their routers, pinning the malware on Russia.

In a public service announcement Friday, the FBI said that “foreign cyber actors” are targeting home and office routers and networked devices worldwide using “VPNFilter” malware that can engage in “information collection, device exploitation and blocking network traffic”.

And the defense against the electronic dark arts here, says the agency, is to reboot—immediately and temporarily disabling the malware and helping the FBI to identify the infected devices.

The malware is attacking consumer-grade routers manufactured by Linksys, MikroTik, Netgear and TP-Link, as well as on network-attached storage devices by QNAP.

While the attacks have been building in strength since 2016, the sudden urgency comes as the number of infected devices has abruptly increased over the past three weeks, affecting 54 countries. The attack has intensified to the point that Cisco’s Talos cyber intelligence unit released its warning report, based on months of monitoring efforts, earlier than scheduled and prior to the conclusion of its full investigation.

“We assess with high confidence that this malware is used to create an expansive, hard-to-attribute infrastructure that can be used to serve multiple operational needs of the threat actor,” Cisco researcher William Largent wrote. “Since the affected devices are legitimately owned by businesses or individuals, malicious activity conducted from infected devices could be mistakenly attributed to those who were actually victims of the actor. The capabilities built into the various stages and plugins of the malware are extremely versatile and would enable the actor to take advantage of devices in multiple ways.”

But the FBI’s reboot call only works if the malware is still in stage one. Once it gets to stage two, according to Talos, a reboot won’t help. Phase 2 is where the malware becomes a spy with “workhorse intelligence-collection” capabilities including file collection, command execution, data exfiltration and device management.

By stage three, these capabilities are further boosted, including two plugin modules that are enabled for collecting traffic that passes through the device and theft of website credentials, among other things. Since Talos hasn’t completed its research yet, the depth of the malware’s potential isn’t even known.

(Click to enlarge)

Source: Talosintelligence

Cisco is confident that the attack is being controlled by the Russian government based on forensic study of hacking software share codes with malware used in earlier attacks attributed to Russia, though the Kremlin has repeatedly denied any involvement. Related: Does The Turkish Lira Need A New Leader?

"With a network like this you could do anything," Cisco researcher Craig Williams told Reuters.

On Wednesday, a federal judge in Pennsylvania gave the FBI permission to seize an internet domain linked to the Russian hacking group, ‘Sofacy’, which was allegedly being used to control the devices, according to Reuters.

But the ultimate target of the hack is likely Ukraine, says Cisco.

"In particular, the code of this malware overlaps with versions of the BlackEnergy malware — which was responsible for multiple large-scale attacks that targeted devices in Ukraine," Talos said.

Earlier, Russia was blamed for major malware attacks that disabled part of Ukraine’s energy grid and forced factories to close down.

 While there are no signs that the malware attack is affecting share prices for the router giants in question, much is at stake beyond information theft apparently originating from Russia.

The global wireless router market is expected to reach over $16 billion by 2025, up from $8.5 billion just last year fueled by massive demand for mobility.  

By Jan Bauer for Safehaven.com

More Top Reads From Safehaven.com

Back to homepage

Leave a comment

Leave a comment