MENU × BUSINESS
Banking And InsuranceCryptocurrencyDigital MarketingErpFood And BeveragesHealthcareLegalMarketing And AdvertisingMedia And EntertainmentMetals And MiningOil And GasRetailTelecom
TECHNOLOGY
Artificial IntelligenceBig DataCloudCyber SecurityE CommerceEducationGaming And VfxIT ServiceMobileNetworkingSAPScience And TechnologySecuritySoftwareStorage
PLATFORM
CiscoDatabaseGoogleIBMJuniperM2MMicrosoftOracleOracleRed Hat
LEADERSHIP
CEO ReviewCompany Review
MAGAZINE
ASIA INDIA
STARTUPS CLIENT SPEAK CONTACT US

The Silicon Review Asia

Botnet Army of 500,000 Compromised Routers Found

Botnet Army of 500,000 Compromised Routers Found

Researchers from Cisco's Talos cyber intelligence unit have recently discovered more than half a million infected routers and storage devices in dozens of countries. Created by a Russian group of hackers, the devices were compromised with a highly sophisticated IoT botnet malware.

According to the cyber intelligence unit, the botnet malware is tagged as “VPNFilter” and it was created to collect information, manipulate online communications, and carry out destructive cyber-attack operations.

This notorious malware, VPNFilter has already pwned at least 500,000 routers and storage devices in almost 54 nations. Most of the routers and devices are from small and home offices which include routers of some of the renowned companies like Linksys, MikroTik, NETGEAR, and TP-Link.

"VPNFilter has a highly destructive abilityto render an infected device unusable, later which can be used to trigger on the machines of individual victims,”William Largent, a researcher from Talos said in a blog post. “It has also the abilityto shutdown internet access for hundreds of thousands of victims’ systems worldwide."

VPNFilter is believed to be one of the most powerful malware ever created to date. It is a modular malware with capabilities like stealing website credentials and monitoring admin controls. To carry out an entire operation, this nasty malware communicates using Tor network. Hold on! That is not all; the malware even contains a killswitch for routers to willfullykill itself when needed.

So, to secure yourself, it is recommended to factory reset your router to remove the potentially destructive malware, update the firmware of the router and also change the default credentials for your device, ASAP.

YOU MAY ALSO LIKE

Tariff plans will cost higher from the next financial year as telecom companies are gearing up to increase rates

The ongoing Covid pandemic had significantly increased the number of mobile and internet users worldwide. The high amount of usage is expected to drop...

Business Travelers to Stay at Singapore’s Changi Airport Bubble

Singapore’s open economy depends heavily on tourism and business. But its vibrant but small economy has been hurting as the circumstances due to...

Countries in Asia-Pacific are marching towards ‘green recovery’ amidst Covid-19 crisis

2020 has been an unforgettable year for many of us. The ongoing Covid crisis has reminded people that it is very important to have an uninterrupted an...

Department of Telecommunication to announce the new schedule for 5G trials

Department of Telecommunications (DoT) is all set to announce the new schedule for 5G trials. The Dot made this decision after being pulled by the par...

RECOMMENDED