AudioGuy writes:
"Researchers say they have uncovered an ongoing attack that infects home and small-office wireless routers from Linksys with self-replicating malware, most likely by exploiting a code-execution vulnerability in the device firmware.
The worm works by injecting vulnerable devices with a URL-encoded shell script that carries out the same seek-and-hijack behavior. The exploit may also change some routers' domain name system server to 8.8.8.8 or 8.8.4.4, which are IP addresses used by Google's DNS service. Compromised routers remain infected until they are rebooted. Once the devices are restarted, they appear to return to their normal state. People who are wondering if their device is infected should check for heavy outbound scanning on port 80 and 8080, and inbound connection attempts to miscellaneous ports below 1024.
This blog post at Sans contains more technical details including a way to test if you have a vulnerable device."
(Score: 1) by applesmasher on Friday February 14 2014, @09:53PM
Of course it looks as if it goes away after a reboot. They can't hide it completely, but they can make you think that you've made it go away.
The reboot just fixes it in place, and then your own router is part of PRISM, reporting directly through dark channels to the NSA!
Wake up, sheeple!
Ever seen an apple hit by a