Technology

500,000 router devices affected so far by VPNFilter Malware

Due to a VPNFilter Malware, the FBI had advised rebooting the router to destroy a malicious virus two weeks ago. But, the virus remained unaffected and have spread over various devices in more than 54 countries.

The VPNFilter Malware has affected over 500,000 routers so far. It has proved to be far more deadly than intended. Cisco Talos, a leading-edge cyber threat intelligence, stated in a report that the virus is showing more capabilities and is badly affecting more devices. It can auto-transform further viruses to other devices and can also leak private data of a common man which can be easily misused.

Talos further explained the malware by reporting in their blog:

One significant discovery is the “ssler” (pronounced Esler) — a module that lets hackers intercept traffic passing through the compromised device or router

The FBI had intended to destroy the malware with the public’s help; it would have been destroyed if everyone rebooted their routers. But it seems as if either not everyone did as they were told, or the malware has proved to be stronger than anticipated, which in both cases have become a huge problem as the virus is spreading uncontrollably.

Talos senior Craig Williams stated in an interview with Ars Technica that:

I’m concerned that the FBI gave people a false sense of security. VPNFilter is still operational. It infects even more devices than we initially thought, and its capabilities are far in excess of what we initially thought. People need to get it off their network.

The devices affected by the virus are:

  1. ASUS
  2. D-Link
  3. Huawei
  4. Ubiquiti
  5. UPVEL
  6. ZTE

According to Talos, the newly affected devices are:

  1. MikroTik
  2. Netgear
  3. TP-Link
  4. Linksy

The FBI, however, is still trying their best to resolve the matter with cyber threat intelligence company, Cisco Talos. The Hacker News explains the botnet’s working:

Stage 1 of the malware can survive a reboot, gaining a persistent foothold on the infected device and enabling the deployment of stages 2 and 3 malware. So, each time an infected device is restarted, stages 2 and 3 are re-installed on the device.

This shows that rebooting a router is not going to make matters simpler. Contacting the manufacturing company is probably the best solution so far. Although for some devices, restoring the settings to factory reset may solve the issues in some cases.

Sponsored
TechJuice

Pakistan's premier website covering everything about Technology, Startups and Entrepreneurship! Email: editors@techjuice.pk

Share
Published by
TechJuice

Recent Posts

Google to Enhance iOS Search with AI Suggestions for More Precise Results

Google is currently testing a new AI-powered feature for its iOS app aimed at enhancing…

9 hours ago

IT Minister Responds to Social Media Shutdown Concerns, Emphasizes Privacy and Security

Islamabad: During a National Assembly session on Wednesday, Minister for IT Shaza Fatima Khawaja addressed…

10 hours ago

Over 1.4 Million Websites Blocked by PTA Under PECA

ISLAMABAD: The Pakistan Telecommunications Authority (PTA) has taken decisive action against illegal online activities by…

11 hours ago

Samsung Galaxy S25+ Live Images and Ultra Design Details Leak Ahead of Release

The highly anticipated Samsung Galaxy S25 series, which includes the Galaxy S25, Galaxy S25+, and…

11 hours ago

Winter Vacation Plan for Punjab Schools Suddenly Changed: Here’s New Update

LAHORE: The Punjab Education Department has issued a revised schedule for winter vacations in schools…

11 hours ago

Punjab Govt to Introduce Conceptual Exams in Schools and Colleges to Revamp Education System

Rawalpindi: Punjab to introduce conceptual exams in schools and colleges as part of a broader…

11 hours ago