HIGHLY sophisticated hackers have found a way to take control of people’s computers through their router – and it’s been happening for years.

Experts claim it could infect some routers made by the likes of Asus, Cisco, DrayTek and Netgear.

A number of household routers could be susceptible

2

A number of household routers could be susceptibleCredit: Getty

Lumen Technologies believe it’s been “living undetected on the edge of targeted networks for years”.

And they suspect a nation state is behind it due to the complexity and scale.

Attacks on WiFi routers are nothing new.

But the use of two particular techniques in this campaign suggests the hackers behind it have a “high level of sophistication”.

Apple warning for MILLIONS as gadget has hacker flaw that CAN'T be fixed via update
Future metaverse scams could involve hackers ‘wearing your skin’

And with so many people regularly working from home after Covid-19, experts have even more reason to be concerned.

The malware – dubbed ZuoRAT – is able attack routers, before taking network information that allows hackers to access Windows, macOS, and Linux machines.

There are four pieces of malware involved in total.

Researchers warn that those behind it have intentionally made it complex to hide what they’re up to.

Most read in Tech

But thankfully there is a way to avoid falling victim if you’ve not already infected.

“Users should follow best practices of regularly rebooting routers and installing security updates and patches,” experts recommend.

You’re washing your hair ALL wrong - and it’s bad news if you love shampoo
Woman splits opinion after hotel cleaner enters room while she was naked

“The rapid shift to remote work in spring of 2020 presented a fresh opportunity for threat actors to subvert traditional defense-in-depth protections by targeting the weakest points of the new network perimeter — devices which are routinely purchased by consumers but rarely monitored or patched — small office/home office (SOHO) routers.

“Actors can leverage SOHO router access to maintain a low-detection presence on the target network and exploit sensitive information transiting the LAN (local area network).”

KHERCP Silhouette of man in the hood, dark mysterious man hoodie, murderer, hacker, anonymus on the black background with free space

2

KHERCP Silhouette of man in the hood, dark mysterious man hoodie, murderer, hacker, anonymus on the black background with free spaceCredit: Alamy

Best Phone and Gadget tips and hacks

Looking for tips and hacks for your phone? Want to find those secret features within social media apps? We have you covered…


We pay for your stories! Do you have a story for The Sun Online Tech & Science team? Email us at [email protected]


This post first appeared on Thesun.co.uk

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

Why Are People in the US Becoming Radicalized?

Extremist movements can make people feel significant, give them a sense of…

Silent Hill games apparently found ahead of official announcements with three rumoured to be shown

A SILENT Hill Transmission showcase will be shown later today (October 19).…

Online Voting Has Worked So Far. That Doesn’t Mean It’s Safe

“If the software-hardware industry is this bad across the board, this does…

The Battle Over Women’s Data

2023 will be the year that the battle over data ownership takes…