• zelifcam@lemmy.world
    link
    fedilink
    English
    arrow-up
    135
    arrow-down
    3
    ·
    edit-2
    1 个月前

    Mystery malware destroys 600,000 routers

    “Mystery”

    The actor took deliberate steps to cover their tracks by using commodity malware known as Chalubo, rather than a custom-developed toolkit. A feature built into Chalubo allowed the actor to execute custom Luascripts on the infected devices. The researchers believe the malware downloaded and ran code that permanently overwrote the router firmware.

    So… not a “mystery.”

    Proper headline: “ Commodity malware known as Chalubo infected 600k routers from the ISP Windstream. “

    • subtext@lemmy.world
      link
      fedilink
      English
      arrow-up
      44
      arrow-down
      11
      ·
      1 个月前

      It’s possible the “mystery” they refer to could be related to the identity of the hacker(s), how it got onto the routers in the first place, or the purpose for the attack

      • zelifcam@lemmy.world
        link
        fedilink
        English
        arrow-up
        22
        arrow-down
        12
        ·
        1 个月前

        The headline reads: “Mystery malware … “

        Not sure what you’re on about.

          • zelifcam@lemmy.world
            link
            fedilink
            English
            arrow-up
            7
            ·
            edit-2
            1 个月前

            The second unique aspect is that this campaign was confined to a particular ASN. Most previous campaigns we’ve seen target a specific router model or common vulnerability and have effects across multiple providers’ networks. In this instance, we observed that both Sagemcom and ActionTec devices were impacted at the same time, both within the same provider’s network.This led us to assess it was not the result of a faulty firmware update by a single manufacturer, which would normally be confined to one device model or models from a given company.

            Our analysis of the Censys data shows the impact was only for the two in question. This combination of factors led us to conclude the event was likely a deliberate action taken by an unattributed malicious cyber actor, even if we were not able to recover the destructive module.

            “Mystery” is a term I’d use if there was no explanation for how something could have happened. They are pretty sure they know what and how. They just don’t have proof. Either way , I’ve already spent more time on this thread than it deserves. Take care.

        • Odelay42@lemmy.world
          link
          fedilink
          English
          arrow-up
          18
          arrow-down
          13
          ·
          1 个月前

          You posses extremely niche knowledge. Being catty because the headline doesn’t suit your preferences comes off as fairly rude and pretentious. Good for you for understanding that the headline is misleading, but there are more relatable ways to say that.

      • BearOfaTime@lemm.ee
        link
        fedilink
        English
        arrow-up
        6
        arrow-down
        7
        ·
        1 个月前

        “mystery malware”

        The article clarifies the name of the malware.

        Clickbait BS. Why are you being disingenuous?

        • subtext@lemmy.world
          link
          fedilink
          English
          arrow-up
          9
          arrow-down
          1
          ·
          1 个月前

          Your reply reads to me as if you’re calling me disingenuous, which I can’t for the life of me understand. I’m not the author. I offered a possible explanation.

      • Max-P@lemmy.max-p.me
        link
        fedilink
        English
        arrow-up
        9
        ·
        1 个月前

        OpenWRT uses Lua for its web UI. The interpreter can be really small which works well for tiny embedded devices with mere megabytes of storage, and it’s much safer than writing a web GUI entirely in C.

        • StarDreamer@lemmy.blahaj.zone
          link
          fedilink
          English
          arrow-up
          2
          ·
          1 个月前

          Yeah I completely forgot about the consumer side of things. I was expecting there being Cisco iOS/FRR router configs, not a full web dashboard.

      • redcalcium@lemmy.institute
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 个月前

        I imagine the malware binary includes a lua interpreter for executing scripts fetched from its command and control server.