US Dept of Justice used existing router malware to quietly purge a Russia-backed 'vast spearphishing

Author: Unit 734 | Date: 0001.01.01

There aren't many stories in the world of technology that could easily make it as a plot for a tense spy-thriller movie, but this one sure has all the right hallmarks for one. Last month, the US Justice Department carried out an authorised operation in which it neutralised a botnet, comprising hundreds of routers in homes [[link]] and offices, that was used to carry out spearphishing and other credentials stealing. And it was achieved by using the very same malware as that by the botnet itself.

As reported by Ars Technica, the network was created by the officially titled GRU Military Unit 26165 (also known by the names Forest Blizzard, Fancy Bear, Sednit, and others), a state-sponsored hacking group that reported has direct ties to the Main Intelligence Directorate of the General Staff of the Armed Forces of the Russian Federation (GRU, for short).

But rather than using its own malware, or anything developed by the GRU, the group used a piece of malware called Moobot that's been used before to insecure routers. In this instance, it infected the operating system on certain Ubiquiti Edge routers that were still using the default, publicly-known admin passwords

To counter it, the DoJ cleverly used the same malware [[link]] to hack back into the routers, copy and delete any stolen data, as well as remove the malicious scripts, and alter the routers’ firewalls to prevent any further remote management of them. To coin a simple phrase, it hacked the hack.

Your next machine

Gaming PC group shot

(Image credit: Future)

Best gaming PC: The top pre-built machines.
Best gaming laptop: Great devices for mobile gaming.

As one can't always rely on the authorities to prevent one's router from being used for criminal activities, there are simple steps that anyone running a small business or office from home can follow.

Start by resetting the router back to its factory default settings (which will clear anything stored on it), then update it to the latest firmware version, followed by changing all of the default usernames and passwords, and then finally use its firewall to block any remote management access.

It can be quite hard to tell if your router is infected with malware or not, but the above actions will certainly help to nip that in the bud. What are you waiting for?

Access Point Comments

@BetQueen584

The bonuses are nice and offer great value, although they could be a bit more frequent. I love being part of the VIP program, which gives me extra rewards and makes me feel appreciated as a loyal player.

@CoinCollector698

Some games are a bit laggy on my phone at times, but the variety of games and the smooth desktop experience make up for it. Overall, the website offers a great gaming experience for both casual and serious players.

@SlotFanatic955

The deposit process is smooth and fast. I was able to fund my account instantly and start playing without any hassle. Plus, the multiple payment options make it convenient for everyone regardless of location.

Recommended Reading

Scribblenauts Stumpability Update

Summary: The claim behind fall DS puzzle-action title Scribblenauts is that the game will render any kid-safe concrete noun that a player types into it. Today, we got our [[link]] second crack at stumping it. When last...

SOE Sells EQ Loot For Child’s Play

Summary: Sony Online Entertainment has announced a month-long Child’s Play fund raising campaign, which will allow players of EverQuest [[link]] and EverQuest II to buy in-game goodies that generate donations. Basicall...

So, How Does The Tony Hawk Controller Work_

Summary: You’ve [[link]] heard the announcement, you’ve seen what the controller looks like, you’ve already formed half-informed opinions on the whole thing, but do you know just how the new Tony Hawk peripheral actual...