The Borneo Post

US disrupts Russian botnet of 500,000 hacked routers

-

WASHINGTON: The US Justice Department said Wednesday that it had seized an internet domain that directed a dangerous botnet of a half- million infected home and office network routers, controlled by hackers believed tied to Russian intelligen­ce.

The move was aimed at breaking up an operation deeply embedded in small and mediumsize­d computer networks that could allow the hackers to take control of computers as well as easily steal data.

The Justice Department said the ‘ VPNFilter’ botnet was set up by a hacking group variously called APT28, Pawn Storm, Sandworm, Fancy Bear and the Sofacy Group.

The group is blamed for cyber attacks on numerous government­s, key infrastruc­ture industries like power grids, the Organisati­on for Security and Cooperatio­n in Europe, the World Anti- Doping Agency, and other bodies.

US intelligen­ce agencies also say it was involved in the operation to hack and release damaging informatio­n on the Democratic Party during the 2016 US presidenti­al election, and has engineered a number of computer network disruption­s in Ukraine.

“According to cybersecur­ity researcher­s, the Sofacy Group is a cyber- espionage group believed to have originated from Russia,” the Department of Justice said in a court filing.

“Likely operating since 2007, the group is known to typically target government, military, security organizati­ons, and other targets of intelligen­ce value, through a variety of means,” it said.

The Justice filing did not say who was behind Sofacy Group, but US intelligen­ce has in the past linked it to Russia’s GRU military intelligen­ce agency, and numerous private computer security groups have made the same connection.

In Wednesday’s action, the Justice Department said it had obtained a warrant authorizin­g the FBI to seize a computer domain that is part of the command and control system of the VPNFilter botnet.

The botnet targets home and office routers, through which it can relay orders from the botnet’s controller­s and intercept and reroute traffic back to them, virtually undetected by the users of a network.

In a report released in parallel to the Justice announceme­nt, network equipment giant Cisco said VPNFilter had infected at least 500,000 devices in at least 54 countries.

It has targeted popular router brands like Linksys, MikroTik, NETGEAR and TP-Link.

“The behavior of this malware on networking equipment is particular­ly concerning, as components of the VPNFilter malware allows for theft of website credential­s,” Cisco said.

It also has “a destructiv­e capacity that can render an infected device unusable, which can be triggered on individual victim machines or en masse.” — AFP

Newspapers in English

Newspapers from Malaysia