Technology

500,000 router devices affected so far by VPNFilter Malware

Due to a VPNFilter Malware, the FBI had advised rebooting the router to destroy a malicious virus two weeks ago. But, the virus remained unaffected and have spread over various devices in more than 54 countries.

The VPNFilter Malware has affected over 500,000 routers so far. It has proved to be far more deadly than intended. Cisco Talos, a leading-edge cyber threat intelligence, stated in a report that the virus is showing more capabilities and is badly affecting more devices. It can auto-transform further viruses to other devices and can also leak private data of a common man which can be easily misused.

Talos further explained the malware by reporting in their blog:

One significant discovery is the “ssler” (pronounced Esler) — a module that lets hackers intercept traffic passing through the compromised device or router

The FBI had intended to destroy the malware with the public’s help; it would have been destroyed if everyone rebooted their routers. But it seems as if either not everyone did as they were told, or the malware has proved to be stronger than anticipated, which in both cases have become a huge problem as the virus is spreading uncontrollably.

Talos senior Craig Williams stated in an interview with Ars Technica that:

I’m concerned that the FBI gave people a false sense of security. VPNFilter is still operational. It infects even more devices than we initially thought, and its capabilities are far in excess of what we initially thought. People need to get it off their network.

The devices affected by the virus are:

  1. ASUS
  2. D-Link
  3. Huawei
  4. Ubiquiti
  5. UPVEL
  6. ZTE

According to Talos, the newly affected devices are:

  1. MikroTik
  2. Netgear
  3. TP-Link
  4. Linksy

The FBI, however, is still trying their best to resolve the matter with cyber threat intelligence company, Cisco Talos. The Hacker News explains the botnet’s working:

Stage 1 of the malware can survive a reboot, gaining a persistent foothold on the infected device and enabling the deployment of stages 2 and 3 malware. So, each time an infected device is restarted, stages 2 and 3 are re-installed on the device.

This shows that rebooting a router is not going to make matters simpler. Contacting the manufacturing company is probably the best solution so far. Although for some devices, restoring the settings to factory reset may solve the issues in some cases.

Sponsored
TechJuice

Pakistan's premier website covering everything about Technology, Startups and Entrepreneurship! Email: editors@techjuice.pk

Share
Published by
TechJuice

Recent Posts

SECP Exposes Illegal Trading Platform “Interactive Brokers Group (IBKR)”

The Securities and Exchange Commission of Pakistan (SECP) has issued a warning about an illegal…

8 hours ago

Punjab Schools Remain Closed for Another Week Due to Severe Smog

LAHORE: The Punjab government has announced an extension of school closures throughout the province, except…

11 hours ago

2,500 Employees Laid Off by Microsoft After $69 Billion Activision Blizzard Purchase

Microsoft has laid off approximately 2,500 employees, sparking criticism in the wake of its $69…

12 hours ago

Illegal SIM Card Trade Exposed in PTA and FIA Raids Across Islamabad and KPK

The Pakistan Telecommunication Authority (PTA), in collaboration with the Federal Investigation Agency (FIA) Cyber Crime…

13 hours ago

Unemployment Rate in Pakistan Reaches 6.3%

ISLAMABAD: The Secretary of Pakistan's Ministry of Overseas Pakistanis and Human Resource Development has revealed…

13 hours ago

Bank Alfalah Gains Approval to End Operations in Bangladesh

Bangladesh Bank and State Bank of Pakistan have both given Bank Alfalah Limited (PSX: BAFL)…

15 hours ago