HIGHLY sophisticated hackers have found a way to take control of people’s computers through their router – and it’s been happening for years.

Experts claim it could infect some routers made by the likes of Asus, Cisco, DrayTek and Netgear.

A number of household routers could be susceptible

2

A number of household routers could be susceptibleCredit: Getty

Lumen Technologies believe it’s been “living undetected on the edge of targeted networks for years”.

And they suspect a nation state is behind it due to the complexity and scale.

Attacks on WiFi routers are nothing new.

But the use of two particular techniques in this campaign suggests the hackers behind it have a “high level of sophistication”.

Apple warning for MILLIONS as gadget has hacker flaw that CAN'T be fixed via update
Future metaverse scams could involve hackers ‘wearing your skin’

And with so many people regularly working from home after Covid-19, experts have even more reason to be concerned.

The malware – dubbed ZuoRAT – is able attack routers, before taking network information that allows hackers to access Windows, macOS, and Linux machines.

There are four pieces of malware involved in total.

Researchers warn that those behind it have intentionally made it complex to hide what they’re up to.

Most read in Tech

But thankfully there is a way to avoid falling victim if you’ve not already infected.

“Users should follow best practices of regularly rebooting routers and installing security updates and patches,” experts recommend.

You’re washing your hair ALL wrong - and it’s bad news if you love shampoo
Woman splits opinion after hotel cleaner enters room while she was naked

“The rapid shift to remote work in spring of 2020 presented a fresh opportunity for threat actors to subvert traditional defense-in-depth protections by targeting the weakest points of the new network perimeter — devices which are routinely purchased by consumers but rarely monitored or patched — small office/home office (SOHO) routers.

“Actors can leverage SOHO router access to maintain a low-detection presence on the target network and exploit sensitive information transiting the LAN (local area network).”

KHERCP Silhouette of man in the hood, dark mysterious man hoodie, murderer, hacker, anonymus on the black background with free space

2

KHERCP Silhouette of man in the hood, dark mysterious man hoodie, murderer, hacker, anonymus on the black background with free spaceCredit: Alamy

Best Phone and Gadget tips and hacks

Looking for tips and hacks for your phone? Want to find those secret features within social media apps? We have you covered…


We pay for your stories! Do you have a story for The Sun Online Tech & Science team? Email us at [email protected]


This post first appeared on Thesun.co.uk

You May Also Like

Bitcoin price latest – Ethereum price hits all-time high as cryptocurrency market SOARS

ETHEREUM has today soared over $3,000 to quadruple its value in 2021.…

Microsoft’s Digital Crime Unit Goes Deep on How It Disrupts Cybercrime

The DCU’s hybrid technical and legal approach to chipping away at cybercrime…

What a Crossword AI Reveals About Humans’ Way With Words

At last week’s American Crossword Puzzle Tournament, held as a virtual event…

NASA: Iceberg A68, 3.5 times the size of London, has disintegrated

Once three-and-a-half times bigger than London, the enormous A68 iceberg has now disintegrated…