![]() Unfortunately, that means you have to change your password,” Linksys wrote. “Out of an abundance of caution, we locked all Linksys Smart Wi-Fi accounts to prevent further intrusions. “ attack targets home routers and changes their DNS settings to redirect victims to a malware-serving website that delivers the Oski infostealer as a final payload,” wrote Bitdefender researchers in a post March 25.Īccording to a Linksys security bulletin, on April 2 Smart Wi-Fi users were locked out of their accounts as mitigation efforts to were kicked off by Linksys. Once compromised, attackers manipulated the device’s domain name system routing function so victims would unintentionally visit malicious webpages.Īttacks primarily target United States followed by Germany. ![]() The Linksys Smart Wi-Fi app is a password-protected webpage that allows customers to easily manage their Wi-Fi and router settings. Hackers gained access to at least 1,200 Linksys Smart Wi-Fi accounts via what is believed to be credential-stuffing attacks, according to Linksys, owned by parent company Belkin. Linksys representatives told Threatpost that customers are being notified gradually and that all customers should be made aware of the incident and forced password reset “over the next week or so”. Researchers identified the attack last month, and earlier this week Linksys hit reset on users of its Linksys Smart Wi-Fi application to mitigate against future and past attacks. Home Linksys router users were targeted in a cyberattack that changed router settings, and redirected requests for specific webpages and domains to malicious Coronavirus-themed landing pages that were booby-trapped with malware.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |