FBI Warns About Hackers Infecting Routers to Collect Information

Adjust Comment Print

"The FBI recommends any owner of small office and home office routers power cycle (reboot) the devices". Among the affected networking equipment it found during its research were devices from manufacturers including Linksys, MikroTik, Netgear and TP-Link.

Hundreds of thousands have been infected with malware in the latest cyber threat. Most devices in homes and businesses come equipped with default credentials which are easily stolen by hackers.

Rebooting a router clears the "advanced" stages of VPNFilter from a device, but the first stage remains in place.

Cisco released the report on Wednesday after observing a spike this month in infections in the Ukraine, which accused Russian Federation of planning an attack to coincide with Saturday's Champions Cup final in Kiev.

The attack is said to be from some Russian actors and devices in more than 50 countries have been affected by it.

Cheap petrol: Not a chance! Supermarkets raise fuel prices every day
A litre of petrol now costs 141c on average - a rise of more than three cents when compared with last month's figure of 137.6c. He also said that the weakening of the Indian rupee against the U.S. dollar was causing the fuel price hike .


The easiest way to protect your internet connection is to simply reboot your router.

Last week, Cisco Talos researchers announced the malware had infected around 500,000 home and small office routers and NAS devices. This will help neuter the threat and help the Federal Bureau of Investigation identify infected devices.

The FBI is urging owners of office and home office routers to reboot after a "significant" malware attack. You can also disable remote management settings on devices, and make sure your password protection is strong. Users should also upgrade their devices' firmware.

To disrupt the Sofacy network, the Justice Department sought and received permission to seize the web domain toknowall.com, which it said was a critical part of the malware's "command-and-control infrastructure".

See: What is phishing?

Comments