HIGHLY sophisticated hackers have found a way to take control of people’s computers through their router – and it’s been happening for years.

Experts claim it could infect some routers made by the likes of Asus, Cisco, DrayTek and Netgear.

A number of household routers could be susceptible

2

A number of household routers could be susceptibleCredit: Getty

Lumen Technologies believe it’s been “living undetected on the edge of targeted networks for years”.

And they suspect a nation state is behind it due to the complexity and scale.

Attacks on WiFi routers are nothing new.

But the use of two particular techniques in this campaign suggests the hackers behind it have a “high level of sophistication”.

Apple warning for MILLIONS as gadget has hacker flaw that CAN'T be fixed via update
Future metaverse scams could involve hackers ‘wearing your skin’

And with so many people regularly working from home after Covid-19, experts have even more reason to be concerned.

The malware – dubbed ZuoRAT – is able attack routers, before taking network information that allows hackers to access Windows, macOS, and Linux machines.

There are four pieces of malware involved in total.

Researchers warn that those behind it have intentionally made it complex to hide what they’re up to.

Most read in Tech

But thankfully there is a way to avoid falling victim if you’ve not already infected.

“Users should follow best practices of regularly rebooting routers and installing security updates and patches,” experts recommend.

You’re washing your hair ALL wrong - and it’s bad news if you love shampoo
Woman splits opinion after hotel cleaner enters room while she was naked

“The rapid shift to remote work in spring of 2020 presented a fresh opportunity for threat actors to subvert traditional defense-in-depth protections by targeting the weakest points of the new network perimeter — devices which are routinely purchased by consumers but rarely monitored or patched — small office/home office (SOHO) routers.

“Actors can leverage SOHO router access to maintain a low-detection presence on the target network and exploit sensitive information transiting the LAN (local area network).”

KHERCP Silhouette of man in the hood, dark mysterious man hoodie, murderer, hacker, anonymus on the black background with free space

2

KHERCP Silhouette of man in the hood, dark mysterious man hoodie, murderer, hacker, anonymus on the black background with free spaceCredit: Alamy

Best Phone and Gadget tips and hacks

Looking for tips and hacks for your phone? Want to find those secret features within social media apps? We have you covered…


We pay for your stories! Do you have a story for The Sun Online Tech & Science team? Email us at [email protected]


This post first appeared on Thesun.co.uk

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

Apple fans will go wild for £140 discount on iPhone 14 plan from Three

If you’re hunting for an Apple phone and you’ve got your sights…

Handsome face of beardy Neanderthal man ‘who lived 56K yrs ago’ unveiled along with surprising feature of ‘human cousin’

A NEW digitalized photo shows how humanly handsome a Neanderthal man was…

Stunning candidates for the Miss United Kingdom pageant are revealed – but there’s a HUGE catch

Researchers have used artificial intelligence to create ‘ideal’ pageant queen candidates as…

FIFA 23: All Premier League rankings from Arsenal to the Wolves

WE have reached FIFA season. In less than a month, FIFA fans…