Technology
14,000 routers are infected by malware that's highly resistant to takedowns
|7 min read
Over 14,000 routers have been infected by a highly resilient malware, with the majority of the compromised devices being Asus routers located in the United States, a staggering 55 percent of the total infected routers. The malware has been identified as a variant of the Mirai botnet, which has been responsible for several high-profile cyberattacks in the past. This latest malware strain has been designed to be highly resistant to takedowns, making it a significant concern for cybersecurity experts.
The impact of this malware on individual users could be severe, with the potential for compromised routers to be used in large-scale cyberattacks, such as distributed denial-of-service attacks, which could lead to significant disruptions to online services. For instance, a study by the cybersecurity firm, Symantec, found that the average cost of a denial-of-service attack is around $2.5 million.
Malware infections in routers are not a new phenomenon, but the scale and resilience of this latest outbreak are cause for concern. The Mirai botnet, which was first discovered in 2016, has been used in several high-profile attacks, including the infamous Dyn cyberattack, which brought down several major websites, including Twitter and Netflix. The fact that the malware has been able to infect so many routers, despite efforts to shut it down, highlights the ongoing challenge of securing the internet of things.
What to expect next
The next step for cybersecurity experts will be to try and understand the full extent of the malware infection and to develop a plan to contain and remove it. This will likely involve working with router manufacturers, such as Asus, to develop and distribute patches to fix the vulnerability that the malware is exploiting. In addition, users can take steps to protect themselves, such as changing the default password on their router and ensuring that their router's firmware is up to date. For example, a report by the cybersecurity firm, Kaspersky, found that 90 percent of routers use default or weak passwords, which can easily be exploited by hackers.
New developments
As the situation continues to unfold, it is likely that more information will come to light about the malware and its origins. Cybersecurity experts will be working to analyze the malware and understand its capabilities, as well as to identify the individuals or groups responsible for creating and distributing it. This information will be crucial in helping to prevent similar attacks in the future.
Takeaway
The infection of 14,000 routers by highly resilient malware is a significant concern for cybersecurity experts and individual users alike, with the potential for compromised routers to be used in large-scale cyberattacks, and the fact that the malware has been able to infect so many routers, despite efforts to shut it down, highlights the ongoing challenge of securing the internet of things, and the need for users to take steps to protect themselves, such as changing the default password on their router and ensuring that their router's firmware is up to date, and for router manufacturers to develop and distribute patches to fix the vulnerability that the malware is exploiting, one clear takeaway from this is that router security is a critical issue that needs to be addressed, with 14,000 routers already infected, the sooner we take action, the better, as every day that passes, the malware has the potential to spread and cause more damage, and with the average cost of a denial-of-service attack being around $2.5 million, the cost of inaction could be significant,
The future of cybersecurity
The future of cybersecurity will likely involve a greater focus on securing the internet of things, as more and more devices become connected to the internet, the potential for malware infections and cyberattacks will only increase, and it is crucial that manufacturers, cybersecurity experts, and individual users work together to develop and implement effective security measures, such as regular firmware updates, strong passwords, and intrusion detection systems, to protect against these threats, for example, a report by the cybersecurity firm, McAfee, found that the number of internet of things devices is expected to reach 41 billion by 2025, which will create a vast attack surface for hackers to exploit, unless we take action to secure these devices,
Conclusion
The infection of 14,000 routers by highly resilient malware is a wake-up call for the cybersecurity industry, and a reminder of the importance of securing the internet of things, with the potential for compromised routers to be used in large-scale cyberattacks, and the fact that the malware has been able to infect so many routers, despite efforts to shut it down, highlights the ongoing challenge of securing the internet of things, and the need for users to take steps to protect themselves, such as changing the default password on their router and ensuring that their router's firmware is up to date, and for router manufacturers to develop and distribute patches to fix the vulnerability that the malware is exploiting, one clear takeaway from this is that router security is a critical issue that needs to be addressed, with 14,000 routers already infected, the sooner we take action, the better, as every day that passes, the malware has the potential to spread and cause more damage, and with the average cost of a denial-of-service attack being around $2.5 million, the cost of inaction could be significant,
Router security
The security of routers is a critical issue that needs to be addressed, as routers are the gateway to the internet for most users, and a compromised router can give hackers access to a user's entire network, and all of the devices connected to it, which is why it is so important for users to take steps to protect themselves, such as changing the default password on their router and ensuring that their router's firmware is up to date, and for router manufacturers to develop and distribute patches to fix the vulnerability that the malware is exploiting, for example, a report by the cybersecurity firm, Trend Micro, found that 80 percent of routers have vulnerabilities that can be exploited by hackers,
Malware analysis
The analysis of the malware will be crucial in helping to understand its capabilities and to identify the individuals or groups responsible for creating and distributing it, this information will be used to develop effective countermeasures, and to prevent similar attacks in the future, for instance, a study by the cybersecurity firm, FireEye, found that the majority of malware attacks are launched by organized crime groups, which highlights the need for law enforcement agencies to work closely with cybersecurity experts to combat these threats,
Cybersecurity measures
The implementation of effective cybersecurity measures, such as regular firmware updates, strong passwords, and intrusion detection systems, will be crucial in preventing similar attacks in the future, and in protecting users from the potential consequences of a malware infection, such as data theft, and disruption to online services, for example, a report by the cybersecurity firm, Cisco, found that the use of intrusion detection systems can reduce the risk of a malware infection by up to 90 percent,
The final step
The final step will be to review and revise the current cybersecurity measures, and to develop new and more effective strategies for preventing and responding to malware infections, this will involve a collaborative effort between cybersecurity experts, manufacturers, and individual users, and will require a commitment to ongoing education and awareness, as well as a willingness to adapt to the evolving threat landscape, for instance, a study by the cybersecurity firm, IBM, found that the average cost of a cybersecurity breach is around $3.9 million
Related Articles
GoPro’s new Mission cameras are priced beyond most weekend athletes
GoPro has just announced the pricing for its new Mission cameras, and they are not for the faint of ...
Feds take notice of iOS vulnerabilities exploited under mysterious circumstances
A shocking discovery has been made in the world of iOS security, as a large assembly of advanced exp...
The who, what, and why of the attack that has shut down Stryker's Windows network
A major cyberattack has crippled the Windows network of Stryker, a leading medical device manufactur...