Stories
Slash Boxes
Comments

SoylentNews is people

posted by robind on Friday February 14 2014, @01:39AM   Printer-friendly
from the entry-level dept.

AudioGuy writes:

"Researchers say they have uncovered an ongoing attack that infects home and small-office wireless routers from Linksys with self-replicating malware, most likely by exploiting a code-execution vulnerability in the device firmware.

The worm works by injecting vulnerable devices with a URL-encoded shell script that carries out the same seek-and-hijack behavior. The exploit may also change some routers' domain name system server to 8.8.8.8 or 8.8.4.4, which are IP addresses used by Google's DNS service. Compromised routers remain infected until they are rebooted. Once the devices are restarted, they appear to return to their normal state. People who are wondering if their device is infected should check for heavy outbound scanning on port 80 and 8080, and inbound connection attempts to miscellaneous ports below 1024.

This blog post at Sans contains more technical details including a way to test if you have a vulnerable device."

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 1) by Khyber on Saturday February 15 2014, @03:49AM

    by Khyber (54) on Saturday February 15 2014, @03:49AM (#130) Journal
    Of course, it seems my two more recent wireless router purchases were less than ideal. It might be time to turn an old laptop into a wireless router running BSD or Linux.
    --
    Destroying Semiconductors With Style Since 2008, and scaring you ill-educated fools since 2013.
  • (Score: 1) by sgleysti on Saturday February 15 2014, @05:09AM

    by sgleysti (56) Subscriber Badge on Saturday February 15 2014, @05:09AM (#138)
    Your sig is incredibly appropriate, given what you said in ##altslashdot