Article 69H8Z Threat actors are using advanced malware to backdoor business-grade routers

Threat actors are using advanced malware to backdoor business-grade routers

by
Dan Goodin
from Ars Technica - All content on (#69H8Z)
router-800x534.jpeg

Enlarge (credit: Getty Images)

Researchers have uncovered advanced malware that's turning business-grade routers into attacker-controlled listening posts that can sniff email and steal files in an ongoing campaign hitting North and South America and Europe.

Besides passively capturing IMAP, SMTP, and POP email, the malware also backdoors routers with a remote-access Trojan that allows the attackers to download files and run commands of their choice. The backdoor also enables attackers to funnel data from other servers through the router, turning the device into a covert proxy for concealing the true origin of malicious activity.

figure5-640x393.png

(credit: Black Lotus Labs)

This type of agent demonstrates that anyone with a router who uses the Internet can potentially be a target-and they can be used as proxy for another campaign-even if the entity that owns the router does not view themselves as an intelligence target," researchers from security firm Lumen's Black Lotus Labs wrote. We suspect that threat actors are going to continue to utilize multiple compromised assets in conjunction with one another to avoid detection."

Read 8 remaining paragraphs | Comments

External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments