<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: It&#8217;s finally happened: Hackers are coming for home routers en masse • The Register</title>
	<atom:link href="http://www.epanorama.net/blog/2016/10/26/its-finally-happened-hackers-are-coming-for-home-routers-en-masse-%e2%80%a2-the-register/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2016/10/26/its-finally-happened-hackers-are-coming-for-home-routers-en-masse-%e2%80%a2-the-register/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Fri, 03 Apr 2026 21:03:02 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/26/its-finally-happened-hackers-are-coming-for-home-routers-en-masse-%e2%80%a2-the-register/comment-page-2/#comment-1724774</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 20 Sep 2021 06:20:54 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=48565#comment-1724774</guid>
		<description><![CDATA[Router protection for MikroTik users
https://www.kaspersky.com/blog/how-to-protect-mikrotik-from-meris-botnet/41972/
Recent large-scale DDoS attacks using a new botnet called Mris peaked at almost 22 million requests per second. According to Qrator research, MikroTik&#039;s network devices generated a fair share of the botnet&#039;s traffic. Having analyzed the situation, MikroTik experts found no new vulnerabilities in the company&#039;s routers; however, old ones may still pose a threat. Therefore, to ensure your router has not joined the Mris botnet (or any other botnet, for that matter), you need to follow a few recommendations.]]></description>
		<content:encoded><![CDATA[<p>Router protection for MikroTik users<br />
<a href="https://www.kaspersky.com/blog/how-to-protect-mikrotik-from-meris-botnet/41972/" rel="nofollow">https://www.kaspersky.com/blog/how-to-protect-mikrotik-from-meris-botnet/41972/</a><br />
Recent large-scale DDoS attacks using a new botnet called Mris peaked at almost 22 million requests per second. According to Qrator research, MikroTik&#8217;s network devices generated a fair share of the botnet&#8217;s traffic. Having analyzed the situation, MikroTik experts found no new vulnerabilities in the company&#8217;s routers; however, old ones may still pose a threat. Therefore, to ensure your router has not joined the Mris botnet (or any other botnet, for that matter), you need to follow a few recommendations.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/26/its-finally-happened-hackers-are-coming-for-home-routers-en-masse-%e2%80%a2-the-register/comment-page-1/#comment-1690030</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 03 Sep 2020 06:46:41 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=48565#comment-1690030</guid>
		<description><![CDATA[Cloud firewall management API SNAFU put 500k SonicWall customers at
risk
https://www.pentestpartners.com/security-blog/cloud-firewall-management-api-snafu-put-500k-sonicwall-customers-at-risk/
I found a security issue so serious that we then spent £££ on our own
SonicWall products in order to independently validate the issue, to be
certain it wasn&#039;t just our client that was affected. What I discovered
was a trivial method to compromise every single cloud managed device
attached to mysonicwall.com, affecting around 1.9 million user groups
across hundreds of thousands of organisations. At least 10 million
individual devices were affected. Disclosure was initially very
positive, then went rapidly downhill as SonicWall procrastinated with
a fix and refused to take down the vulnerable functionality in the
meantime, knowingly leaving their customers exposed for a full 17
days.]]></description>
		<content:encoded><![CDATA[<p>Cloud firewall management API SNAFU put 500k SonicWall customers at<br />
risk<br />
<a href="https://www.pentestpartners.com/security-blog/cloud-firewall-management-api-snafu-put-500k-sonicwall-customers-at-risk/" rel="nofollow">https://www.pentestpartners.com/security-blog/cloud-firewall-management-api-snafu-put-500k-sonicwall-customers-at-risk/</a><br />
I found a security issue so serious that we then spent £££ on our own<br />
SonicWall products in order to independently validate the issue, to be<br />
certain it wasn&#8217;t just our client that was affected. What I discovered<br />
was a trivial method to compromise every single cloud managed device<br />
attached to mysonicwall.com, affecting around 1.9 million user groups<br />
across hundreds of thousands of organisations. At least 10 million<br />
individual devices were affected. Disclosure was initially very<br />
positive, then went rapidly downhill as SonicWall procrastinated with<br />
a fix and refused to take down the vulnerable functionality in the<br />
meantime, knowingly leaving their customers exposed for a full 17<br />
days.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/26/its-finally-happened-hackers-are-coming-for-home-routers-en-masse-%e2%80%a2-the-register/comment-page-1/#comment-1676672</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 28 Apr 2020 06:16:33 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=48565#comment-1676672</guid>
		<description><![CDATA[&quot;Asnarök&quot; Trojan targets firewalls
https://news.sophos.com/en-us/2020/04/26/asnarok/
Customized malware used to compromise physical and virtual firewalls.
As we described last week in this KBA, Sophos and its customers were
the victims of a coordinated attack by an unknown adversary. This
attack revealed a previously unknown SQL injection vulnerability that
led to remote code execution on some of our firewall products. As
described in the KBA, the vulnerability has since been remediated.
There was significant orchestration involved in the execution of the
attack, using a chain of Linux shell scripts that eventually
downloaded ELF binary executable malware compiled for a firewall
operating system. This attack targeted Sophos products and apparently
was intended to steal sensitive information from the firewall.]]></description>
		<content:encoded><![CDATA[<p>&#8220;Asnarök&#8221; Trojan targets firewalls<br />
<a href="https://news.sophos.com/en-us/2020/04/26/asnarok/" rel="nofollow">https://news.sophos.com/en-us/2020/04/26/asnarok/</a><br />
Customized malware used to compromise physical and virtual firewalls.<br />
As we described last week in this KBA, Sophos and its customers were<br />
the victims of a coordinated attack by an unknown adversary. This<br />
attack revealed a previously unknown SQL injection vulnerability that<br />
led to remote code execution on some of our firewall products. As<br />
described in the KBA, the vulnerability has since been remediated.<br />
There was significant orchestration involved in the execution of the<br />
attack, using a chain of Linux shell scripts that eventually<br />
downloaded ELF binary executable malware compiled for a firewall<br />
operating system. This attack targeted Sophos products and apparently<br />
was intended to steal sensitive information from the firewall.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/26/its-finally-happened-hackers-are-coming-for-home-routers-en-masse-%e2%80%a2-the-register/comment-page-1/#comment-1675732</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 17 Apr 2020 05:22:20 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=48565#comment-1675732</guid>
		<description><![CDATA[Linksys asks users to reset passwords after hackers hijacked home
routers last month
https://www.zdnet.com/article/linksys-asks-users-to-reset-passwords-after-hackers-hijacked-home-routers-last-month/
Linksys locks Smart WiFi cloud accounts and asks users to reset
passwords after hackers hijacked routers to redirect traffic to
malware sites.]]></description>
		<content:encoded><![CDATA[<p>Linksys asks users to reset passwords after hackers hijacked home<br />
routers last month<br />
<a href="https://www.zdnet.com/article/linksys-asks-users-to-reset-passwords-after-hackers-hijacked-home-routers-last-month/" rel="nofollow">https://www.zdnet.com/article/linksys-asks-users-to-reset-passwords-after-hackers-hijacked-home-routers-last-month/</a><br />
Linksys locks Smart WiFi cloud accounts and asks users to reset<br />
passwords after hackers hijacked routers to redirect traffic to<br />
malware sites.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/26/its-finally-happened-hackers-are-coming-for-home-routers-en-masse-%e2%80%a2-the-register/comment-page-1/#comment-1667450</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 13 Jan 2020 09:02:13 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=48565#comment-1667450</guid>
		<description><![CDATA[https://cablehaunt.com/
Cable Haunt is a critical vulnerability found in cable modems from
various manufacturers across the world. The vulnerability enables
remote attackers to gain complete control of a cable modem, through an
endpoint on the modem. Your cable modem is in charge of the internet
traffic for all devices on the network. Cable Haunt might therefore be
exploited to intercept private messages, redirect . traffic, or
participation in botnets.. [...]]]></description>
		<content:encoded><![CDATA[<p><a href="https://cablehaunt.com/" rel="nofollow">https://cablehaunt.com/</a><br />
Cable Haunt is a critical vulnerability found in cable modems from<br />
various manufacturers across the world. The vulnerability enables<br />
remote attackers to gain complete control of a cable modem, through an<br />
endpoint on the modem. Your cable modem is in charge of the internet<br />
traffic for all devices on the network. Cable Haunt might therefore be<br />
exploited to intercept private messages, redirect . traffic, or<br />
participation in botnets.. [...]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/26/its-finally-happened-hackers-are-coming-for-home-routers-en-masse-%e2%80%a2-the-register/comment-page-1/#comment-1665159</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 20 Dec 2019 06:25:25 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=48565#comment-1665159</guid>
		<description><![CDATA[A Zero-day Vulnerability in TP-link Router Let Hackers Gain Admin Privilege &amp; Take Full Control of It Remotely
https://gbhackers.com/tp-link-router/

Researchers discovered a new firmware vulnerability in TP-link Archer C5 (v4) routers Let the attacker gain an Admin Password, and allow them remote takeover the router.

Once the vulnerability has successfully exploited, a remote attacker takes over the router configurated through Telnet on the local area network (LAN) and connects to a File Transfer Protocol (FTP) server via both LAN and WAN.

The vulnerability marked as “Critical” severity since it grants access to unauthorized third-party access due to the improper authentication, and it affects the TP-link Archer C5 router that deployed in both home and business environments.

will allow an attacker to enable the Guest WiFi, through which an attacker enters into the internal network.

An attacker could trigger the vulnerability by just sending the vulnerable HTTP request to be granted access to the device.]]></description>
		<content:encoded><![CDATA[<p>A Zero-day Vulnerability in TP-link Router Let Hackers Gain Admin Privilege &amp; Take Full Control of It Remotely<br />
<a href="https://gbhackers.com/tp-link-router/" rel="nofollow">https://gbhackers.com/tp-link-router/</a></p>
<p>Researchers discovered a new firmware vulnerability in TP-link Archer C5 (v4) routers Let the attacker gain an Admin Password, and allow them remote takeover the router.</p>
<p>Once the vulnerability has successfully exploited, a remote attacker takes over the router configurated through Telnet on the local area network (LAN) and connects to a File Transfer Protocol (FTP) server via both LAN and WAN.</p>
<p>The vulnerability marked as “Critical” severity since it grants access to unauthorized third-party access due to the improper authentication, and it affects the TP-link Archer C5 router that deployed in both home and business environments.</p>
<p>will allow an attacker to enable the Guest WiFi, through which an attacker enters into the internal network.</p>
<p>An attacker could trigger the vulnerability by just sending the vulnerable HTTP request to be granted access to the device.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/26/its-finally-happened-hackers-are-coming-for-home-routers-en-masse-%e2%80%a2-the-register/comment-page-1/#comment-1662244</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 01 Dec 2019 23:34:55 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=48565#comment-1662244</guid>
		<description><![CDATA[https://www.zdnet.com/article/this-aggressive-iot-malware-is-forcing-wi-fi-routers-to-join-its-botnet-army/?ftag=COS-05-10aaa0h&amp;utm_campaign=trueAnthem%3A+Trending+Content&amp;utm_content=5dbaf0108021ed000132d25e&amp;utm_medium=trueAnthem&amp;utm_source=facebook]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.zdnet.com/article/this-aggressive-iot-malware-is-forcing-wi-fi-routers-to-join-its-botnet-army/?ftag=COS-05-10aaa0h&#038;utm_campaign=trueAnthem%3A+Trending+Content&#038;utm_content=5dbaf0108021ed000132d25e&#038;utm_medium=trueAnthem&#038;utm_source=facebook" rel="nofollow">https://www.zdnet.com/article/this-aggressive-iot-malware-is-forcing-wi-fi-routers-to-join-its-botnet-army/?ftag=COS-05-10aaa0h&#038;utm_campaign=trueAnthem%3A+Trending+Content&#038;utm_content=5dbaf0108021ed000132d25e&#038;utm_medium=trueAnthem&#038;utm_source=facebook</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/26/its-finally-happened-hackers-are-coming-for-home-routers-en-masse-%e2%80%a2-the-register/comment-page-1/#comment-1633414</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 08 Apr 2019 12:19:51 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=48565#comment-1633414</guid>
		<description><![CDATA[Ongoing DNS Hijacking Campaign Targets Gmail, PayPal, Netflix Users
https://www.securityweek.com/ongoing-dns-hijacking-campaign-targets-gmail-paypal-netflix-users

A DNS hijacking campaign that has been ongoing for the past three months is targeting the users of popular online services, including Gmail, PayPal, and Netflix. 

As part of the campaign, the attackers compromised consumer routers to modify their DNS settings and redirect users to rogue websites to steal their login credentials. 

Bad Packets security researchers, who have been following the attacks since December, have identified four distinct rogue DNS servers being used to redirect web traffic for malicious purposes.

“All exploit attempts have originated from hosts on the network of Google Cloud Platform (AS15169),” the researchers reveal. 

The first DNS hijacking exploit targeted D-Link DSL modems such as D-Link DSL-2640B, DSL-2740R, DSL-2780B, and DSL-526B. The rogue DNS server used in this attack was hosted by OVH Canada (IP address 66.70.173.48). 

Ongoing DNS hijacking campaign targeting consumer routers
https://badpackets.net/ongoing-dns-hijacking-campaign-targeting-consumer-routers/]]></description>
		<content:encoded><![CDATA[<p>Ongoing DNS Hijacking Campaign Targets Gmail, PayPal, Netflix Users<br />
<a href="https://www.securityweek.com/ongoing-dns-hijacking-campaign-targets-gmail-paypal-netflix-users" rel="nofollow">https://www.securityweek.com/ongoing-dns-hijacking-campaign-targets-gmail-paypal-netflix-users</a></p>
<p>A DNS hijacking campaign that has been ongoing for the past three months is targeting the users of popular online services, including Gmail, PayPal, and Netflix. </p>
<p>As part of the campaign, the attackers compromised consumer routers to modify their DNS settings and redirect users to rogue websites to steal their login credentials. </p>
<p>Bad Packets security researchers, who have been following the attacks since December, have identified four distinct rogue DNS servers being used to redirect web traffic for malicious purposes.</p>
<p>“All exploit attempts have originated from hosts on the network of Google Cloud Platform (AS15169),” the researchers reveal. </p>
<p>The first DNS hijacking exploit targeted D-Link DSL modems such as D-Link DSL-2640B, DSL-2740R, DSL-2780B, and DSL-526B. The rogue DNS server used in this attack was hosted by OVH Canada (IP address 66.70.173.48). </p>
<p>Ongoing DNS hijacking campaign targeting consumer routers<br />
<a href="https://badpackets.net/ongoing-dns-hijacking-campaign-targeting-consumer-routers/" rel="nofollow">https://badpackets.net/ongoing-dns-hijacking-campaign-targeting-consumer-routers/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/26/its-finally-happened-hackers-are-coming-for-home-routers-en-masse-%e2%80%a2-the-register/comment-page-1/#comment-1633356</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 08 Apr 2019 07:46:31 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=48565#comment-1633356</guid>
		<description><![CDATA[Hacker group has been hijacking DNS traffic on D-Link routers for three months
https://www.zdnet.com/article/hacker-group-has-been-hijacking-dns-traffic-on-d-link-routers-for-three-months/

Other router models have also been targeted, such as ARG, DSLink, Secutech, and TOTOLINK.

For the past three months, a cybercrime group has been hacking into home routers --mostly D-Link models-- to change DNS server settings and hijack traffic meant for legitimate sites and redirect it to malicious clones.

The attackers operate by using well-known exploits in router firmware to hack into vulnerable devices and make silent changes to the router&#039;s DNS configuration, changes that most users won&#039;t ever notice.

The point of this router hacking campaign was to inject the IP addresses of rogue DNS servers inside people&#039;s routers.]]></description>
		<content:encoded><![CDATA[<p>Hacker group has been hijacking DNS traffic on D-Link routers for three months<br />
<a href="https://www.zdnet.com/article/hacker-group-has-been-hijacking-dns-traffic-on-d-link-routers-for-three-months/" rel="nofollow">https://www.zdnet.com/article/hacker-group-has-been-hijacking-dns-traffic-on-d-link-routers-for-three-months/</a></p>
<p>Other router models have also been targeted, such as ARG, DSLink, Secutech, and TOTOLINK.</p>
<p>For the past three months, a cybercrime group has been hacking into home routers &#8211;mostly D-Link models&#8211; to change DNS server settings and hijack traffic meant for legitimate sites and redirect it to malicious clones.</p>
<p>The attackers operate by using well-known exploits in router firmware to hack into vulnerable devices and make silent changes to the router&#8217;s DNS configuration, changes that most users won&#8217;t ever notice.</p>
<p>The point of this router hacking campaign was to inject the IP addresses of rogue DNS servers inside people&#8217;s routers.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/26/its-finally-happened-hackers-are-coming-for-home-routers-en-masse-%e2%80%a2-the-register/comment-page-1/#comment-1628025</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 06 Mar 2019 12:15:02 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=48565#comment-1628025</guid>
		<description><![CDATA[Hackers have started attacks on Cisco RV110, RV130, and RV215 routers
Attacks started two days after Cisco released patch, one day after researchers published demo exploit code.
https://www.zdnet.com/article/hackers-have-started-attacks-on-cisco-rv110-rv130-and-rv215-routers/]]></description>
		<content:encoded><![CDATA[<p>Hackers have started attacks on Cisco RV110, RV130, and RV215 routers<br />
Attacks started two days after Cisco released patch, one day after researchers published demo exploit code.<br />
<a href="https://www.zdnet.com/article/hackers-have-started-attacks-on-cisco-rv110-rv130-and-rv215-routers/" rel="nofollow">https://www.zdnet.com/article/hackers-have-started-attacks-on-cisco-rv110-rv130-and-rv215-routers/</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
