gizmodo.com
Open in
urlscan Pro
151.101.130.166
Public Scan
URL:
https://gizmodo.com/massive-russian-botnet-targeting-asus-routers-disrupted-1848757190
Submission: On April 11 via api from US — Scanned from DE
Submission: On April 11 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
* The A.V. Club * Deadspin * Gizmodo * Jalopnik * Jezebel * Kotaku * Lifehacker * The Root * The Takeout * * The Onion * * The Inventory Tech. Science. Culture. ShopSubscribe HomeLatestTechReviewsHow ToScienceEartherio9EN ESPAÑOL Tech. Science. Culture. * Home * Latest * Tech * Reviews * How To * Science * Earther * io9 * EN ESPAÑOL AboutGizmodo AdvisorGizmodo Store Explore our other sites * * * * * * * * * * * AdvertisingPrivacyJobsTerms of Use * * * * * © 2022 G/O Media HomeLatestTechReviewsHow ToScienceEartherio9EN ESPAÑOL Privacy and Security MASSIVE RUSSIAN BOTNET TARGETING ASUS ROUTERS DISRUPTED BEFORE IT COULD ATTACK, FBI SAYS IN MARCH, U.S. LAW ENFORCEMENT CONDUCTED AN OPERATION TO DISRUPT "CYCLOPS BLINK," A BOTNET RUN BY ONE OF RUSSIA'S MOST FEARSOME HACKER GANGS. By Lucas Ropek Wednesday 3:30PM Comments (3) Alerts Photo: seksan Mongkhonkhamsao (Getty Images) U.S. officials have revealed a previously undisclosed law enforcement operation against “Sandworm,” the powerful Russian hacking team known for its dexterous and destructive capabilities. Advertisement The operation, which took place in March, saw the FBI secure court authorization to hack and disrupt “Cyclops Blink,” a large botnet of thousands of malware-infected devices allegedly operated by the Russian hackers. During a press conference Wednesday morning, Justice Department and FBI officials explained that they had recently secured legal authorization from courts in California and Pennsylvania to hack command and control servers used by Sandworm to operate the malicious network. The hacking of the C2 servers removed the malware that had infected the machines, effectively severing the botnet operators from their bot herds and disabling the malicious network at its source. While the devices that were previously controlled by the C2s, i.e., the “bots,” are still infected by Sandworm’s malware, they can no longer be controlled by the network’s operators, officials said. “This operation is an example of the FBI’s commitment to combatting cyber threats through our unique authorities, capabilities, and coordination with our partners,” said Assistant Director Bryan Vorndran of the FBI’s Cyber Division during the media appearance. “As the lead domestic law enforcement and intelligence agency, we will continue pursuing cyber actors that threaten the national security and public safety of the American people, our private sector partners and our international partners.” Sponsored LinksSponsored Links Promoted LinksPromoted Links Forge Of Empires - Free Online Game Wenn du Zeit am Computer totschlagen musst, ist dieses Vintage Spiel ein Muss. Kein Install.Forge Of Empires - Free Online Game 9 Cringiest Moments From the Windows 95 LaunchGizmodo Forge Of Empires Advertisement Wenn du gerne spielst, ist dieses Vintage Spiel ein Muss. Kein Install.Forge Of Empires Squid Change Color to Hide in Plain SightGizmodo Hausfrage.de Ist jetzt der richtige Zeitpunkt für den Hausverkauf?Hausfrage.de G/O Media may get a commission Save $35 Viofo A119 V3 Dash Cam Never miss and event while driving This car insurance saver comes equipped with a 5mp IMX335 Sony Starvis sensor and an F1.6 7G lens that allows you to record crystal clear video during the day and night. Buy for $85 at Amazon The menacing entity at the center of this operation, Sandworm, is thought to be one of the Russian government’s most fearsome and talented hacking groups. Threat researchers believe it’s operated by the General Main Intelligence Directorate of the General Staff of the Russian Armed Forces, or GRU—one of Russia’s top intelligence agencies. In the past, it has been blamed for numerous large, destructive hacks—including a cyberattack on Ukraine’s power grid in 2015 that temporarily led to widespread outages. “Cyclops Blink,” the modular malware deployed by Sandworm, is a malicious Linux ELF executable that officials say has been used to infect thousands of network hardware devices scattered throughout the world. Most recently, Sandworm pivoted to using “Blink” to infect products from WatchGuard Technologies and ASUSTek Computer (ASUS) firewalls. Such devices are used for network security, primarily in home office environments and by small to mid-size businesses. In February, law enforcement officials in the U.S. and Europe warned of Sandworm’s new campaign to infect devices using the “Blink” malware, noting that it was mostly targeted at WatchGuard devices. Advertisement When reached for comment, WatchGuard told Gizmodo that after hearing of the infections it had worked quickly to release “detection and remediation tools to protect its partners and customers” and that the “Cyclops” infections had ultimately affected “less than 1% of WatchGuard appliances.” Botnets’ malicious networks are commonly used to conduct cyberattacks and aid in malicious criminal activity. However, U.S. officials say they were able to disrupt “Blink” before it could be effectively “weaponized.” Advertisement During Wednesday’s press conference, Attorney General Merrick Garland explained that the takedown of “Cyclops Blink” had been part of a broader push by U.S. agencies to stamp out Russian criminal activity—and to punish Russia for its recent military invasion of Ukraine. “The Russian government has recently used similar infrastructure to attack Ukrainian targets. Fortunately, we were able to disrupt this botnet before it could be used,” said Garland. “Thanks to our close work with international partners, we were able to detect the infection of thousands of network hardware devices. We were then able to disable the GRU’s control over those devices before the botnet could be weaponized.” Advertisement Garland also noted America’s role in Tuesday’s takedown of the “Russia-affiliated” darknet marketplace Hydra, which was initially announced by German federal police. Garland added that charges had been filed against a “Russian national” who is believed to be the administrator of the “market’s technical infrastructure.” Subscribe to our newsletter! Give us your email address or the robot gets it. Enter your emailSign Me Up By subscribing you agree to our Terms of Use and Privacy Policy. TechPrivacy and Security Featured Videos Video Player is loading. Play Video Play Unmute Current Time 0:00 / Duration 2:07 Loaded: 4.71% Stream Type LIVE Seek to live, currently playing liveLIVE Remaining Time -2:07 Playback Rate 1x Chapters * Chapters Descriptions * descriptions off, selected Captions * captions off, selected * Quality * 240p * 480p * 720p * 1080p * Auto, selected Audio Track * default, selected Fullscreen This is a modal window. 9 Cringiest Moments From the Windows 95 Launch Squid Change Color to Hide in Plain Sight Thursday 5:15PM Unreleased 1986 Nuclear Attack Simulation 3/30/22 9:20AM You may also like Lifehacker Stop Telling Kids to 'Be Careful' (and What to Say Instead) Thursday 1:00PM Kotaku Hello Yaddle, Goodbye Weekends Yesterday 6:00PM Kotaku RIP Sora's Big-Ass Clown Shoes, 2002-2022 Yesterday 12:15PM Recommended from G/O Media 8 Black Women Who Have Shattered The Political Glass Ceiling 4/7/2022, 8:20 PM 23 Hot Dogs That Will Show You What America Tastes Like 4/5/2022, 2:30 PM 14 of the Greatest Baseball Movies for People Who Don’t Care About Baseball 4/6/2022, 8:30 PM