Uk households issued wifi warning after top-brand routers hacked in attack

Birminghammail

Uk households issued wifi warning after top-brand routers hacked in attack"


Play all audios:

Loading...

ANALYSTS WHO UNCOVERED THE HACK SAID IT HAS ALREADY IMPACTED OVER 9,000 DEVICES AND IS STILL ONGOING. 15:30, 30 May 2025 An urgent Wi-Fi warning has been issued after THOUSANDS of top-brand


routers were hacked in a mystery attack. Analysts who uncovered the hack said it has already impacted over 9,000 devices and is still ongoing. Routers are being added to a 'botnet


army', with experts urging users to perform a factory reset. At the time of publication, only Asus routers have been hit. Hackers are breaching routers through brute-force login


attempts and authentication bypasses that rely on a command injection vulnerability, tracked as CVE-2023-39780, to execute system commands, GreyNoise researchers said in a blog post on


Wednesday. READ MORE LLOYDS BANK BRINGS IN BIG CHANGE AND ANYONE WHO IS IN A 'COUPLE' WILL BENEFIT A GreyNoise report on the hack said: "The techniques used reflect long-term


access planning and a high level of system knowledge." Article continues below GreyNoise first detected suspicious activity in March, when it flagged three suspicious HTTP POST requests


made to ASUS routers, according to Matthew Remacle, senior researcher at GreyNoise. ASUS has issued a firmware update that includes a patch addressing the recently discovered vulnerability.


However, according to cybersecurity firm GreyNoise, initial attempts to bypass this patch have yet to be assigned CVE identifiers. Researchers warn that if a router was compromised prior to


applying the update, a persistent backdoor could remain on the device unless Secure Shell (SSH) access is explicitly disabled. GreyNoise’s estimation of the number of affected devices is


derived from data collected through Censys scans. Article continues below While the hacking campaign has not been definitively linked to any specific group, the techniques employed are


consistent with those typically used by advanced persistent threat (APT) actors. Notably, the attackers maintain control over infected devices even after they are rebooted or undergo


firmware upgrades. GreyNoise also revealed that government officials and industry stakeholders requested a temporary delay in the public disclosure of the vulnerability. This pause was


intended to allow time for coordinated efforts to address the security flaws and implement effective fixes.


Trending News

Pardon Our Interruption

Pardon Our Interruption As you were browsing something about your browser made us think you were a bot. There are a few ...

The s-component fold: a link between bacterial transporters and receptors

ABSTRACT The processes of nutrient uptake and signal sensing are crucial for microbial survival and adaptation. Membrane...

Colonel, cop son & fraudster nabbed at midnight party in ahmedabad

Cops yet to ascertain if the girls were drunk too. Guess who is the biggest catch for the police in the booze party bust...

6 most common interview mistakes to avoid

Memorial Day Sale! Join AARP for just $11 per year with a 5-year membership Join now and get a FREE gift. Expires 6/4  G...

He Had the Beef All Along - Los Angeles Times

Yes, his hamburgers are fresh and square like his public persona. Yes, the orphaned onetime busboy was a modern Horatio ...

Latests News

Uk households issued wifi warning after top-brand routers hacked in attack

ANALYSTS WHO UNCOVERED THE HACK SAID IT HAS ALREADY IMPACTED OVER 9,000 DEVICES AND IS STILL ONGOING. 15:30, 30 May 2025...

Fixing price instability can improve access to affordable prescription drugs

The high cost of prescription drugs is a very real problem in the United States. The average American spends approximate...

Who 'took lead' in buckingham palace's response to prince harry and meghan markle 'tell-all'?

"I think the Prince of Wales has also taken the lead on how the Palace has responded,” the expert wrote, as quoted ...

Free on bail, nurse quizzed as suspect after baby murders

Police have been probing the deaths of 17 babies, who died from 2015 to 2016, at the Countess of Chester Hospital. Foren...

Locations | san diego vet center | veterans affairs

MAIN LOCATION 2790 Truxtun Road Suite 130 San Diego, CA 92106 * Mon. 8:00 a.m. to 7:00 p.m. * Tue. 8:00 a.m. to 7:00 p.m...

Top