nearly 2,400 routers infected with a variant of the Marai botnet code are being used to carry out (DDoS) attacks.
Researchers have said nearly 2,400 routers infected with a variant of the Marai botnet code are being used to carry out distributed denial of service (DDoS) attacks.
According to researchers at security firm Imperva, a quick scan revealed over 99% of the malware-infected home routers belonged to the TalkTalk Telecom network.
The release of the Marai malware code raised fears of a surge in DDoS attacks using hijacked devices such as routers that make up the internet of things (IoT).
Within weeks a Marai variant caused the mass shutdown of Deutsche Telekom routers, which was said to have affected over 900,000 customers.
Deutsche Telecom issued a patch for its customers, however a similar router-based Marai botnet was found to be operating out of the UK just days later.
Researchers from Imperva said: “The offenders’ persistence, as well as its choice of targets, shows this to be a premeditated offensive – not the typical random burst launched from a rented DDoS-for-hire service,”
According to the BBC TalkTalk maintains there is no need for users to change their router settings.
A spokesperson for the firm said customers may change their password if they “wish to” and that she believed there was “no risk to their “personal information”.
View Internet News Archive