The latest technology and digital news on the web

Powered by

415,000 routers common hijacked to secretly mine cryptocurrency

Researchers have apparent over 415,000 routers across the globe have been adulterated with malware advised to steal their accretion power and secretly mine cryptocurrency.

The attack, which is still ongoing, affects MikroTik routers in particular. For the record, the string of crypto-jacking attacks on the brand first began in August, when aegis experts apparent over 200,000 accessories had been infected. The number has more than angled since then.

While the majority of afflicted accessories was initially concentrated in Brazil, data suggests there are tons of afflicted accessories worldwide.

It is worth pointing out that the number of breached devices might be hardly off, since the data reflects IP addresses known to have been adulterated with crypto-jacking scripts. Still, the total amount of compromised routers is still pretty high.

“It wouldn’t abruptness me if the actual number of actual adulterated routers in total would be about around 350,000 to 400,000,” aegis researcher VriesHD told Hard Fork. 

Interestingly, while attackers used to favor CoinHive – a mining software for privacy-oriented cryptocurrency Monero (XMR) – the researcher notes there has been a cogent shift to other mining software.

CoinHive, Omine, and CoinImp are the better casework used,” VriesHD told Hard Fork. “It used to be like 80-90 percent CoinHive, but a big actor has confused to using Omine in recent months.”

Cryptocurrency mining malware epidemic

The swath of compromised routers was first apparent in August, after advisers appear over 200,000 devices in Brazil had been hijacked to secretly mine cryptocurrency.

By September, the total number of accessible accessories had added to a amazing 280,000.

The good thing is that there is commodity victims can do to assure themselves. Aegis expert Troy Mursch from Bad Packets Report advises owners of the afflicted MikroTik accessories to anon download the latest firmware adaptation accessible for their device.

VriesHD additionally points out that internet account providers (ISPs) can also help battle the spread of malware by banishment over-the-air updates to the routers.

Users should indeed update their routers, yet the better bunch of them are broadcast by ISPs to their customers, who often have no idea what to do or how to update the router,” the researcher told Hard Fork. “Often these broadcast routers are bound in their rights as well, not acceptance users to update the routers themselves.”

“The patch for this specific botheration has been out for months and I’ve seen ISPs with bags of infections abandon from the list,” he added. Unfortunately, it appears tons of ISPs simply won’t take action to abate the attacks.

You can find the latest adaptation of RouterOS on MikroTik’s website here.

Published December 4, 2018 — 17:38 UTC

Explore our
decentralized future


hero__character1 hero__character2

Hottest related news

No articles found on this category.