FBI Seeks To Thwart Cyber-attack On Ukraine
Preparations for a cyber-attack on Ukraine have been thwarted by the FBI.
It seized a website that was helping communicate with home routers infected with malware that would carry out the digital bombardment.
More than 500,000 routers in 54 countries had been infected by the "dangerous" malware and the FBI is now trying to clean up infected machines.
The Kremlin has denied an allegation by Ukraine that Russia was planning a cyber-attack on the country.
A key step in thwarting the attack came on 23 May when a US court ordered website registrar Verisign to hand over control of the ToKnowAll.com domain to the FBI.
Infected machines regularly contacted that domain to update the malware with which they were infected.
By taking control of the domain, the FBI will be able to log the location of infected machines and co-ordinate efforts to clean them up.
A state-sponsored group known as Sofacy/Fancy Bear has been identified as both developing the malware and preparing the attack.
"This operation is the first step in the disruption of a botnet that provides the Sofacy actors with an array of capabilities that could be used for a variety of malicious purposes," said John Demers, assistant attorney general for National Security, in a statement.
Details of the preparation were shared by Cisco's Talos security team which said it had been monitoring the "advanced, state-sponsored" attack for months. In a blog it said malware, which it dubbed VPNFilter, used several sophisticated methods to compromise routers.
In particular, it said, the malicious software had been coded to survive even when infected devices were turned off and on. In the past, infected devices have only needed a reboot to remove the malicious code.
Cisco added that the malware included a "kill" command that would render devices unusable if it were used.
In all, 14 models of home routers made by Linksys, Mikrotik, Negear and Qnap were targeted by the malware. Cisco said it had seen widespread scans seeking out routers with known vulnerabilities that the malware could exploit.
Cleaning out the infection involves returning devices to their initial factory settings. Users are also being urged to update the firmware on their router to remove vulnerabilities exploited by the malware.
Cisco said it went public with the information it had gathered because earlier this month it saw a sudden spike in scanning and a particular focus on home routers in Ukraine. The VPNFilter code shares some similarities with the Black Energy malware used in attacks on Ukraine's power grid.
The target of the expected attack is not clear but Reuters suggested the network of infected machines could be used to cause disruption on Saturday when the Champions League final is played in Kiev.
From Chip War To Cloud War: The Next Frontier In Global Tech Competition
The global chip war, characterized by intense competition among nations and corporations for supremacy in semiconductor ... Read more
The High Stakes Of Tech Regulation: Security Risks And Market Dynamics
The influence of tech giants in the global economy continues to grow, raising crucial questions about how to balance sec... Read more
The Tyranny Of Instagram Interiors: Why It's Time To Break Free From Algorithm-Driven Aesthetics
Instagram has become a dominant force in shaping interior design trends, offering a seemingly endless stream of inspirat... Read more
The Data Crunch In AI: Strategies For Sustainability
Exploring solutions to the imminent exhaustion of internet data for AI training.As the artificial intelligence (AI) indu... Read more
Google Abandons Four-Year Effort To Remove Cookies From Chrome Browser
After four years of dedicated effort, Google has decided to abandon its plan to remove third-party cookies from its Chro... Read more
LinkedIn Embraces AI And Gamification To Drive User Engagement And Revenue
In an effort to tackle slowing revenue growth and enhance user engagement, LinkedIn is turning to artificial intelligenc... Read more