Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
FBI Warns Users to Reboot All SOHO Routers
Newest First  |  Oldest First  |  Threaded View
johnsmith247
johnsmith247,
User Rank: Apprentice
10/31/2018 | 4:12:51 AM
Re: The FBI is widening its guidance
I read some news before some days ago, According to the FBI warning, "the malware targets IP Address Conflict  routers produced by several manufacturers and network-attached storage devices by at least one manufacturer." 
RyanSepe
RyanSepe,
User Rank: Ninja
5/31/2018 | 3:37:45 PM
Re: SOHO Only?
Many SOHO's have also already released patches for the exploit. The reboot will allow those patches to be applied. But you are definitely correct, you would be hard pressed to see Commercial grade networking gear and SOHO's sharing the same threat landscape.
Norman.Neil
Norman.Neil,
User Rank: Apprentice
5/31/2018 | 8:43:32 AM
Re: SOHO Only?
SOHO = small office, home office

It is meant to include all consumer-grade routers.

Commercial-grade routers (i.e. CISCO, HP, etc.) generally have much stronger security associated with their operation, like requiring administrative privileges to install anything on them.   
Dr.T
Dr.T,
User Rank: Ninja
5/30/2018 | 6:24:39 PM
SOHO Only?
Is this only about this router, what about others?
Dr.T
Dr.T,
User Rank: Ninja
5/30/2018 | 6:23:53 PM
Re: The FBI is widening its guidance
rather than just more "Russia! Russia! Russia!" in order to distract domestic attention Good point, never thought in that way.
Dr.T
Dr.T,
User Rank: Ninja
5/30/2018 | 6:23:05 PM
Re: The FBI is widening its guidance
Perhaps the concentrated volume of reestablishing connections with the botnet ... Or giverment know something and they do not let us know.
Dr.T
Dr.T,
User Rank: Ninja
5/30/2018 | 6:21:46 PM
Re: The FBI is widening its guidance
Hard to see the rationale behind call for reboot of all SOHO routers I am also not sure about the real objective of this action.
Dr.T
Dr.T,
User Rank: Ninja
5/30/2018 | 6:20:24 PM
Reboot?
Wondering how reboot would remove the flow, how did happen in the first place?
BrianN060
BrianN060,
User Rank: Ninja
5/30/2018 | 3:48:48 PM
The FBI is widening its guidance
Hard to see the rationale behind call for reboot of all SOHO routers (given ...that the first-stage loader for the botnet is persistent...).  Perhaps the concentrated volume of reestablishing connections with the botnet command/control will be useful, at least as an indication of scope and scale.  Hope it's something like that, rather than just more "Russia! Russia! Russia!" in order to distract domestic attention away from other issues and concerns. 


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Promise and Reality of Cloud Security
Cloud security has been part of the cybersecurity conversation for years but has been on the sidelines for most enterprises. The shift to remote work during the COVID-19 pandemic and digital transformation projects have moved cloud infrastructure front-and-center as enterprises address the associated security risks. This report - a compilation of cutting-edge Black Hat research, in-depth Omdia analysis, and comprehensive Dark Reading reporting - explores how cloud security is rapidly evolving.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-48093
PUBLISHED: 2023-02-01
Seacms v12.7 was discovered to contain a remote code execution (RCE) vulnerability via the ip parameter at admin_ ip.php.
CVE-2022-48094
PUBLISHED: 2023-02-01
lmxcms v1.41 was discovered to contain an arbitrary file read vulnerability via TemplateAction.class.php.
CVE-2023-23135
PUBLISHED: 2023-02-01
An arbitrary file upload vulnerability in Ftdms v3.1.6 allows attackers to execute arbitrary code via uploading a crafted JPG file.
CVE-2023-23136
PUBLISHED: 2023-02-01
lmxcms v1.41 was discovered to contain an arbitrary file deletion vulnerability via BackdbAction.class.php.
CVE-2023-24997
PUBLISHED: 2023-02-01
Deserialization of Untrusted Data vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.1.0 through 1.5.0. Users are advised to upgrade to Apache InLong's latest version or cherry-pick https://github.com/apache/inlong/pull/7223 https://github.com/apache/i...